WO2000026749A1 - Method and software for evidencing illicit use of a computer system - Google Patents

Method and software for evidencing illicit use of a computer system Download PDF

Info

Publication number
WO2000026749A1
WO2000026749A1 PCT/US1999/025375 US9925375W WO0026749A1 WO 2000026749 A1 WO2000026749 A1 WO 2000026749A1 US 9925375 W US9925375 W US 9925375W WO 0026749 A1 WO0026749 A1 WO 0026749A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
image data
signal
detector
forensic
Prior art date
Application number
PCT/US1999/025375
Other languages
French (fr)
Inventor
Bruce L. Davis
Burt W. Perry
J. Scott Carr
Gilbert B. Shaw
Geoffrey B. Rhoads
Original Assignee
Digimarc Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digimarc Corporation filed Critical Digimarc Corporation
Priority to AU18093/00A priority Critical patent/AU1809300A/en
Priority to EP99961538A priority patent/EP1137975A1/en
Priority to JP2000580066A priority patent/JP2002539647A/en
Priority to KR1020017005591A priority patent/KR20010090816A/en
Priority to CA002347179A priority patent/CA2347179A1/en
Publication of WO2000026749A1 publication Critical patent/WO2000026749A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/16Protection against loss of memory contents
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • H04N1/0084Determining the necessity for prevention
    • H04N1/00843Determining the necessity for prevention based on recognising a copy prohibited original, e.g. a banknote
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • G07D7/0034Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements using watermarks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • H04N1/00856Preventive measures
    • H04N1/00877Recording information, e.g. details of the job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Definitions

  • the present invention relates to computer systems, and more particularly relates to techniques for establishing persistent evidence of a computer's use for possibly illicit purposes (e.g. counterfeiting).
  • covert tracing data in all printed output from color photocopiers (and some color printers) brings into play the balancing of law enforcement needs versus the widely recognized users' rights of privacy and freedom of expression. Unbounded use of such covert marking techniques can raise the spectre of an Orwellian "Big Brother.”
  • tracer data is selectively generated to assist law enforcement agencies in prosecuting counterfeiters.
  • it is secretly stored in the counterfeiter's computer. If the computer is later searched or seized, the tracer data can be recovered and employed as evidence of the computer's use in counterfeiting.
  • FIG. 1 is a diagram of a computer system according to one embodiment of the present invention.
  • Fig. 2 is a diagram illustrating certain of the principles used in the Fig. 1 embodiment.
  • a computer system 10 employed in one embodiment of the present invention includes a processor 11, a non- volatile store 12, volatile memory 14, an external interface 16, and various peripherals (e.g. a scanner 18, a printer 20, etc.).
  • the processor 11 typically comprises a CPU, such as one of the microprocessors available from Intel, Sun, AMD, Cyrix, Motorola, MIPS, etc. Alternatively, the processor can take other forms, including hardwired logic circuitry, programmable logic (e.g. FPGAs), or yet-to-be-devised processing arrangements.
  • the non- volatile store 12 typically comprises a magnetic disk, but can also include other writeable media, including optical disks, flash memory, EEPROMS, ROMBIOS, etc.
  • the non-volatile store can be physically located with the processor 11 (e.g. hard disk, CMOS memory with system setup data, etc), and/or can be remote (e.g. a networked drive, storage accessible over the Internet, etc.).
  • the volatile memory 14 typically comprises RAM, either integrated with the CPU (e.g. cache), and/or separate.
  • the external interface 16 can take various forms, including a modem, a network interface, a USB port, etc. Any link to a remote resource other than common peripherals is generally considered to employ an external interface.
  • Stored in the non-volatile store 12 is various software. This includes operating system software, applications software, and various user files (word processing documents, image files, etc.).
  • the operating system software typically includes a thousand or more files, including a registry database (detailing the resources available in the system, etc.) and various device drivers (which serve as software interfaces between the CPU and peripheral devices, such as scanner 18 and printer 20).
  • the applications software includes executable code and data. Both the operating system software and the applications software may employ shared files (e.g. DLLs) which can be utilized by different executables and/or operating system components to provide desired functionality.
  • the peripherals 18, 20 are typically connected to the computer system through a port 22 (e.g. serial, parallel, USB, SCSI, etc.) which permits bi-directional data exchange.
  • a port 22 e.g. serial, parallel, USB, SCSI, etc.
  • Each peripheral typically includes its own processor circuitry 24 that operates in conjunction with firmware 26 (software resident in memory within the printer) to perform peripheral-specific processing and control functions.
  • firmware 26 software resident in memory within the printer
  • some peripherals have other data storage.
  • the disposable "consumables" in printers increasingly include their own non-volatile memories 28 in which various calibration and/or usage data is stored.
  • the computer system writes forensic tracer data (sometimes terms an "audit trail") to a non- volatile store if it detects a possibly illicit action, e.g. the processing of image data corresponding to a banknote.
  • forensic tracer data sometimes terms an "audit trail”
  • banknote is used to refer to all manner of value documents, including paper currency, travelers checks, money orders, stamps, university transcripts, stock certificates, passports, visas, concert- or sporting event tickets, etc.
  • the data is written in a manner(s), and/or to a location(s), chosen to minimize its possible detection by a cautious perpetrator. If the computer is later inspected pursuant to a lawful search and seizure, it can be analyzed for the presence of incriminating tracer data.
  • Gross Hough processing is first performed using one or more rotationally-invariant features (e.g. U.S. Federal Reserve Seal) to quickly identify most image sets as not banknote-related. Any data that looks to be potentially bank-note related after the first check is subjected to successively more selective, higher-confidence tests (some stepping through plural rotational states) to weed out more and more non-banknote image sets. Finally, any image data passing all the screens is concluded to be, to a very high degree of certainty, a banknote. An appropriate signal is then generated (e.g. a change in state of a binary signal) to indicate detection of a banknote.
  • one or more rotationally-invariant features e.g. U.S. Federal Reserve Seal
  • Neural networks and algorithms are also suitable for detection of patterns characteristic of banknotes, as illustrated by European patent EP 731 ,961 , etc.
  • banknote-detection techniques are commonly implemented in resource-intensive form, using sophisticated processing units (e.g. the main CPU of a copier), this need not be the case.
  • the detection algorithm can be tailored to operate on parts of scan-line data, without buffering the entire set of image data for analysis.
  • the algorithm can be implemented on less- sophisticated processors, such as those used in the scanner 18 or the printer 20.
  • the processors can be programmed, by appropriate firmware, to perform such processing on any image data scanned by, or printed by, such devices.
  • modems and other interfaces SCSI, Fire Wire, IDE, ATAPI, etc.
  • software-implemented modems, network interfaces, UARTs, etc. can monitor the data traffic passing therethrough and flag any that appears to be banknote-related.
  • the full analysis operation can be performed by the interface, or the data can be copied and passed to the main processor for further analysis.
  • storage of forensic data is triggered.
  • the forensic data typically includes at least the date (and optionally the time) at which the possibly illicit action occurred.
  • the forensic data can include the file name of the banknote image data (if available), and a code indicating the nature of the event noted (e.g., banknote data detected by the printer; banknote data detected passing through the modem on COM2; banknote data detected written to removable media having volume ID 01FF38; banknote data detected in file opened by Adobe Photoshop, etc.)
  • the forensic data can additionally detail the source from which the data came, and/or the destination to which it was sent (e.g. IP/email addresses).
  • IP/email addresses e.g. IP/email addresses
  • the stored forensic data will typically include the use ID.
  • System status data can also be included, e.g. identifying peripheral devices attached to the system, code loaded into RAM memory, the amount of time the user spent working on the illicit data, etc.
  • Selected data from any operating system registry database can likewise be included.
  • the computer is on a network or on the Internet, the network address, Ethernet MAC address, AppleTalk name and zone, TraceRoute information, or IP address information can be stored.
  • payload data recovered from the watermark can be included in the forensic tracer data.
  • the foregoing (and possibly more) information can be stored in detailed forensic tracer records.
  • the forensic tracer record can comprise a single bit indicating that the computer system has been used — at least once ⁇ for a possibly illicit action.
  • such data is desirably generated, transmitted, and stored redundantly, transparently, and inconspicuously.
  • Redundant generation of the tracer data refers to detection of possibly illicit activity at various points in the computer system, and/or during various operations.
  • possibly illicit activity can be detected, e.g., during scanning of an image, printing of a document, receiving or transmitting a file through a modem connection, opening a file with an application program, saving a file with an application program, copying data to a clipboard, etc.
  • Redundant transmission of the tracer data refers to its transmission to storage media several times. When a possibly illicit activity is detected, it desirable to send tracer data to storage both immediately and on a delayed basis (e.g. five minutes after detection of banknote data, and every two minutes thereafter for a period of M minutes). By sending the data to storage repeatedly, the robustness of the system is again increased. Redundant storage of the tracer data refers to its storage at several different locations (simultaneously or sequentially). If even one instance of the redundantly generated/transmitted/stored tracer data survives the counterfeiter's attempts to redact incriminating data, it will be useful evidence in any prosecution.
  • Transparent generation/transmission/storage means that the acts associated with these operations will not arouse the counterfeiter's suspicion.
  • tracer data should be written in a manner assuring that the data will persist — either in the location originally written, or by copying during subsequent machine operation (e.g. on closing the application program, shutting down the operating system, etc.) to a location assuring longer-term availability.
  • Program-tracing tools typically monitor just the computer's main CPU so ⁇ where possible ⁇ at least some of the tracer data should be stored under the control of a different processing element, or in a location to which the tool's capabilities do not extend. Another option is to keep at least some of the tracer data in RAM memory for a period after the illicit action has been detected, and store it later.
  • Yet another option is to store at least some forensic tracer records in the operating system registry database. This resource is commonly accessed during system operation, so references to the database may not give rise to suspicion.
  • Inconspicuous storage covers a wide range of options.
  • Numerous encryption techniques are known, e.g. RSA, PGP, various private key techniques, etc., any of which can be used.
  • Encrypted tracer data can be stored with other encrypted system data, such as in a password file. Due to its encrypted nature, a hacker may not be able to discern what part of the stored data is tracer data and what part is, e.g., password data. Attempts to redact the tracer data risks corrupting the password data, jeopardizing the counterfeiter's later ability to login to the machine.
  • Another possibility is to steganographically encode the tracer data, e.g. by randomizing/obfuscating same and inconspicuously hiding it amidst other data (e.g. within graphic or audio files associated with start-up or shut-down of the computer operating system, or wherever else noise-like data can be introduced without alerting the user to its presence). Still another possibility is to create null code that resembles normal instructions or data, but instead serves as a forensic tracer record.
  • the tracer data can be patched into existing files, by appending to the end or otherwise. Or, rather than storing the tracer data as the content of a file, the data can be stored among a file's "properties.”
  • Another way to avoid creating new files is to avoid using the computer's "file system" altogether, and instead use low-level programming to effect direct writes to typically-unused or reserved physical areas on the disk.
  • the data is resident on the disk, but does not appear in any directory listing. (although such data may be lost if disk optimization tools are subsequently used, those skilled in the art will recognize that steps can be taken to minimize such risks.)
  • Yet another way to avoid creating new files is to relay at least some of the tracer data to outside the computer.
  • One expedient is to use an external interface to transmit the data for remote storage. Again, a great variety of techniques can be employed to reliably, yet effectively, effect such transmission. And the data transmission need not occur at the moment the possibly illicit action is occurring. Instead, such data can be queued and relayed away from the machine at a later time.
  • Still another way to avoid creating new files is to make use of deadwood files that commonly exist on most computers.
  • application programs typically employ installation utilities which copy compressed files onto the disk, together with code to decompress and install the software.
  • These compressed files and installation programs are usually not deleted, providing opportunities for their use as repositories of tracer data.
  • many computers include dozens or hundreds of duplicate files - only one of which is commonly used. By converting one or more of these files to use as a repository for tracer data, additional inconspicuous storage can be achieved.
  • Some application programs include hundreds of files, various of which are provided just for the occasional use of the rare super-user. Files that pass some litmus test of inactivity (e.g.
  • Some embodiments may perform self-integrity checks of old tracer records each time a new banknote is encountered, and repair any damage encountered.
  • old tracer records can be expanded to detail new illicit acts, in addition to (or in lieu of) creating independent records for each illicit act.
  • Utility software such as disk defragmenters, disk integrity checks, virus checkers, and other periodically-executed system maintenance tools can be written/patched to look in some of the places where forensic tracer records may be found and, if any are encountered, copy them to additional locations. Similar operations can be performed upon termination of selected application programs (e.g. image processing programs).
  • the computer system desirably includes several checkpoints for detecting illicit actions.
  • detectors can be implemented in some or all of the following: in image processing software applications, in DLLs commonly used with image processing, in printer drivers, in printer firmware, in scanner drivers, in scanner firmware, in modem or other external interface drivers and software, in email software, in FTP software, in the operating system (looking at the clipboard, etc.), etc., etc.
  • the checking should be done by several different processors (e.g. main CPU, programmable interface chips, scanner microcontroller, printer microprocessor, etc.).
  • computers can be employed in various other illicit or unauthorized activities.
  • Each generally is susceptible to computer-detection (e.g. threats against the president may be detected by specialized natural language analysis programs; computer-aided synthesis of illegal drugs may be indicated by certain chemical modeling instructions in software specific to that industry; unauthorized duplication of copyrighted works may be flagged by the presence of embedded watermark data in the copyrighted work; unauthorized distribution of classified or confidential business documents may be detected using known techniques, etc.).
  • the storage of forensic tracer data along the lines detailed above is equally applicable in such other contexts. In the future, support for illicit activity detection may be routinely provided in a wide variety of software and peripherals.
  • the software and peripherals may include generic services supporting the compilation of forensic tracer data, its encryption, transmission, storage, etc. These generic services can be invoked by detector modules that are customized to the particular illicit/unauthorized activity of concern. Some of the detector modules can be fairly generic too, e.g. generic pattern recognition or watermark detection services. These can be customized by data loaded into the computer (either at manufacture, or surreptitiously accompanying new or updated software) identifying particular images whose reproduction is unauthorized/illicit. As new banknotes are issued, updated customization data can be distributed. (Naturally, such detector customization data will need to be loaded and stored in a manner that is resistant against attack, e.g. using the approaches outlined above for the covert tracer data.)

Abstract

A computer (10) is provided with software that looks for certain activities that may be illicit (e.g. processing of a graphic file corresponding to a banknote). If such an activity is detected, tracer data detailing the activity is generated and secretly stored in the computer (10). If the computer (10) is later searched or seized, the tracer data can be recovered and employed as evidence of the computer's use, e.g. in counterfeiting. To detect whether graphic image data corresponds to a banknote, two analysis techniques may be used. One is based on detection of a visible pattern characteristic of a security document. The other is based on detection of a steganographic digital watermark characteristic of a security document. If either characteristic is found, the image is flagged, and appropriate anti-counterfeiting steps may be taken. Detection of the visible pattern can be performed using a series of successively more rigorous tests. If the image fails the first test, successive tests can be skipped, speeding the process. Hough transform-based pattern recognition techniques are used in some embodiments. Provision of both a visible pattern detector and a watermark detector in a single apparatus enhances reliability, while permetting various implementation efficiencies.

Description

METHOD AND SOFTWARE FOR EVIDENCING ILLICIT USE OF A COMPUTER SYSTEM
Field of the Invention The present invention relates to computer systems, and more particularly relates to techniques for establishing persistent evidence of a computer's use for possibly illicit purposes (e.g. counterfeiting).
Background and Summary of the Invention Fifty years ago, counterfeiting was a rare art practiced by a small number of skilled engravers using esoteric equipment. Today, counterfeiting is a rampant problem practiced by thousands of criminals using ubiquitous computer equipment.
Statistics from the U.S. Secret Service illustrate the magnitude of the problem in the United States. In a recent report, the Secret Service stated: The amount of counterfeit currency passed in the United States over the last three fiscal years has remained fairly consistent; however, 1998 has seen a significant increase, largely due to inkjet produced counterfeits. Inkjet produced counterfeit currency comprised only 0.5% of the total counterfeit currency passed in fiscal year 1995. In comparison, 19% of the total counterfeit currency passed in the United
States during fiscal year 1997 was inkjet produced, and 43% of the counterfeit currency passed through August 1998 has been in jet counterfeit currency.
This trend is attributed to rapid improvements in technology, and the ever-increasing availability and affordability of scanners, high- resolution inkjet and other output devices, and computer systems. Digital counterfeiting is likely to continue to increase as the capabilities of systems and devices continue to improve, and as these capabilities become more readily understood by the criminal element. Accompanying the Secret Service report was a table identifying the number of domestic counterfeiting plants raided, by type. Again, the explosive growth of inkjet counterfeiting is evident:
Figure imgf000004_0001
The problem is not limited to the United States; statistics from other countries show the above-detailed trends are worldwide.
Various means have been deployed over the years to deter the counterfeiting of banknotes and similar financial instruments. One is to incorporate design features in banknotes that are difficult to replicate. Another is to equip color photocopiers with the capability to recognize banknotes. If such a photocopier is presented with a banknote for duplication, copying is disabled or impaired.
Yet another approach is for color photocopiers to imperceptibly write their serial number on all output sheets, e.g. using small, light yellow lettering. (Such an arrangement is shown, e.g., in European laid-open application EP 554,115 and in U.S. patent 5,557,742.) While unknown to most of the public, the majority of color photocopiers employ this, or similar means, to mark all output copies with covert tracing data.
The inclusion of covert tracing data in all printed output from color photocopiers (and some color printers) brings into play the balancing of law enforcement needs versus the widely recognized users' rights of privacy and freedom of expression. Unbounded use of such covert marking techniques can raise the spectre of an Orwellian "Big Brother."
In accordance with a preferred embodiment of the present invention, tracer data is selectively generated to assist law enforcement agencies in prosecuting counterfeiters. However, instead of rotely incorporating such data into all printed output, it is secretly stored in the counterfeiter's computer. If the computer is later searched or seized, the tracer data can be recovered and employed as evidence of the computer's use in counterfeiting.
The foregoing and additional features and advantages of the present invention will be more readily apparent from the following detailed description, which proceeds with reference to the accompanying drawings.
Brief Description of the Drawings Fig. 1 is a diagram of a computer system according to one embodiment of the present invention.
Fig. 2 is a diagram illustrating certain of the principles used in the Fig. 1 embodiment.
Detailed Description Referring to Fig. 1, a computer system 10 employed in one embodiment of the present invention includes a processor 11, a non- volatile store 12, volatile memory 14, an external interface 16, and various peripherals (e.g. a scanner 18, a printer 20, etc.).
The processor 11 typically comprises a CPU, such as one of the microprocessors available from Intel, Sun, AMD, Cyrix, Motorola, MIPS, etc. Alternatively, the processor can take other forms, including hardwired logic circuitry, programmable logic (e.g. FPGAs), or yet-to-be-devised processing arrangements. The non- volatile store 12 typically comprises a magnetic disk, but can also include other writeable media, including optical disks, flash memory, EEPROMS, ROMBIOS, etc. The non-volatile store can be physically located with the processor 11 (e.g. hard disk, CMOS memory with system setup data, etc), and/or can be remote (e.g. a networked drive, storage accessible over the Internet, etc.).
The volatile memory 14 typically comprises RAM, either integrated with the CPU (e.g. cache), and/or separate.
The external interface 16 can take various forms, including a modem, a network interface, a USB port, etc. Any link to a remote resource other than common peripherals is generally considered to employ an external interface. Stored in the non-volatile store 12 is various software. This includes operating system software, applications software, and various user files (word processing documents, image files, etc.). The operating system software typically includes a thousand or more files, including a registry database (detailing the resources available in the system, etc.) and various device drivers (which serve as software interfaces between the CPU and peripheral devices, such as scanner 18 and printer 20). The applications software includes executable code and data. Both the operating system software and the applications software may employ shared files (e.g. DLLs) which can be utilized by different executables and/or operating system components to provide desired functionality.
While illustrated as resident in the non- volatile store 12, the foregoing software is generally loaded into the volatile memory 14 for execution.
The peripherals 18, 20 are typically connected to the computer system through a port 22 (e.g. serial, parallel, USB, SCSI, etc.) which permits bi-directional data exchange. Each peripheral typically includes its own processor circuitry 24 that operates in conjunction with firmware 26 (software resident in memory within the printer) to perform peripheral-specific processing and control functions. In addition to the memory in which the firmware is stored (e.g. EEPROM, flash memory, etc.), some peripherals have other data storage. For example, the disposable "consumables" in printers increasingly include their own non-volatile memories 28 in which various calibration and/or usage data is stored.
In one embodiment of the present invention, the computer system writes forensic tracer data (sometimes terms an "audit trail") to a non- volatile store if it detects a possibly illicit action, e.g. the processing of image data corresponding to a banknote. (For expository convenience, the term "banknote" is used to refer to all manner of value documents, including paper currency, travelers checks, money orders, stamps, university transcripts, stock certificates, passports, visas, concert- or sporting event tickets, etc.) The data is written in a manner(s), and/or to a location(s), chosen to minimize its possible detection by a cautious perpetrator. If the computer is later inspected pursuant to a lawful search and seizure, it can be analyzed for the presence of incriminating tracer data. There is considerable prior work in the field of detecting security documents from image data. Published European application EP 649,114, for example, describes banknote detection techniques based on the use of fuzzy inferencing to detect geometrical arrays of certain patterns that are characteristic of banknotes. U.S. patents 5,515,451, 5,533,144, 5,629,990, and 5,796,869 describe banknote detection techniques based on different pattern matching techniques (e.g. to recognize the Federal Reserve seal). Xerox has also proposed its data glyph technology (detailed, e.g., in U.S. patents 5,706,364, 5,689,620, 5,684,885, 5,680,223, 5,668,636, 5,640,647, 5,594,809) as a means to mark security documents for later machine-identification. Another means for detecting security documents is by use of Hough-based pattern matching techniques as described, e.g., in Hough's U.S. patent 3,069,654, and Ballard, "Generalizing the Hough Transform to Detect Arbitrary Shapes," Pattern Recognition, Vol. 13, No. 2, pp. 111-122, 1981. One embodiment of such a system follows the approach outlined in the Ballard paper, and employs plural tables corresponding to different patterns found on banknotes, with different confidence. Gross Hough processing is first performed using one or more rotationally-invariant features (e.g. U.S. Federal Reserve Seal) to quickly identify most image sets as not banknote-related. Any data that looks to be potentially bank-note related after the first check is subjected to successively more selective, higher-confidence tests (some stepping through plural rotational states) to weed out more and more non-banknote image sets. Finally, any image data passing all the screens is concluded to be, to a very high degree of certainty, a banknote. An appropriate signal is then generated (e.g. a change in state of a binary signal) to indicate detection of a banknote.
Neural networks and algorithms are also suitable for detection of patterns characteristic of banknotes, as illustrated by European patent EP 731 ,961 , etc.
In the present assignee's prior applications (e.g. 08/649,419, 09/074,034, 09/127,502, 60/082,228; corresponding to PCT applications US99/08252 and US99/14532) techniques are disclosed for marking security documents with generally imperceptible, or steganographic, watermark data, so as to facilitate later identification of such documents. By employing digital watermark-based banknote detection in combination with visible feature-based banknote detection, very high confidence recognition of banknote data can be achieved.
The artisan is presumed to be familiar with the various approaches for recognizing banknotes from image data, of which the foregoing is just a sampling. While such banknote-detection techniques are commonly implemented in resource-intensive form, using sophisticated processing units (e.g. the main CPU of a copier), this need not be the case. To reduce the resource requirements, the detection algorithm can be tailored to operate on parts of scan-line data, without buffering the entire set of image data for analysis. The algorithm can be implemented on less- sophisticated processors, such as those used in the scanner 18 or the printer 20. The processors can be programmed, by appropriate firmware, to perform such processing on any image data scanned by, or printed by, such devices. And as modems and other interfaces (SCSI, Fire Wire, IDE, ATAPI, etc.) continue their evolution from dedicated hardware to software-based implementations, their data processing capabilities increase commensurately. Thus, for example, software-implemented modems, network interfaces, UARTs, etc., can monitor the data traffic passing therethrough and flag any that appears to be banknote-related. The full analysis operation can be performed by the interface, or the data can be copied and passed to the main processor for further analysis. In the preferred embodiment of the present invention, when banknote image data is detected, storage of forensic data is triggered. The forensic data typically includes at least the date (and optionally the time) at which the possibly illicit action occurred. Additionally, the forensic data can include the file name of the banknote image data (if available), and a code indicating the nature of the event noted (e.g., banknote data detected by the printer; banknote data detected passing through the modem on COM2; banknote data detected written to removable media having volume ID 01FF38; banknote data detected in file opened by Adobe Photoshop, etc.) The forensic data can additionally detail the source from which the data came, and/or the destination to which it was sent (e.g. IP/email addresses). In operating systems requiring user login, the stored forensic data will typically include the use ID. System status data can also be included, e.g. identifying peripheral devices attached to the system, code loaded into RAM memory, the amount of time the user spent working on the illicit data, etc. Selected data from any operating system registry database (e.g. identifying the registered owner of certain applications software then-loaded on the computer, software serial numbers, operational parameters, etc.) can likewise be included. If the computer is on a network or on the Internet, the network address, Ethernet MAC address, AppleTalk name and zone, TraceRoute information, or IP address information can be stored. If the illicit action has been detected by reference to a watermark or other embedded data, payload data recovered from the watermark can be included in the forensic tracer data. On one extreme, the foregoing (and possibly more) information can be stored in detailed forensic tracer records. At the other extreme, the forensic tracer record can comprise a single bit indicating that the computer system has been used — at least once ~ for a possibly illicit action.
Expecting that savvy counterfeiters will attempt to defeat such forensic tracer data, such data is desirably generated, transmitted, and stored redundantly, transparently, and inconspicuously.
Redundant generation of the tracer data refers to detection of possibly illicit activity at various points in the computer system, and/or during various operations. Referring to Fig. 2, possibly illicit activity can be detected, e.g., during scanning of an image, printing of a document, receiving or transmitting a file through a modem connection, opening a file with an application program, saving a file with an application program, copying data to a clipboard, etc. By providing multiple opportunities for detection of possibly illicit activities, the robustness of the system is increased.
Redundant transmission of the tracer data refers to its transmission to storage media several times. When a possibly illicit activity is detected, it desirable to send tracer data to storage both immediately and on a delayed basis (e.g. five minutes after detection of banknote data, and every two minutes thereafter for a period of M minutes). By sending the data to storage repeatedly, the robustness of the system is again increased. Redundant storage of the tracer data refers to its storage at several different locations (simultaneously or sequentially). If even one instance of the redundantly generated/transmitted/stored tracer data survives the counterfeiter's attempts to redact incriminating data, it will be useful evidence in any prosecution.
Transparent generation/transmission/storage means that the acts associated with these operations will not arouse the counterfeiter's suspicion.
Various software tools are available to trace program execution. A savvy counterfeiter may employ such tools to monitor all disk writes performed by his system. Consider, for example, a counterfeiter using an image processing program in aid of his counterfeiting. The person may monitor the sequence of files opened and closed (and/or the data read/written) during use of the program for image processing with non-banknote data, and then be suspicious if different files, or in different orders, are opened and closed when performing the same image processing operations on banknote data. Thus, at least some of the forensic data should be stored using routine operations and routine files (e.g. writes to files that are used during normal program execution). Of course, such tracer data should be written in a manner assuring that the data will persist — either in the location originally written, or by copying during subsequent machine operation (e.g. on closing the application program, shutting down the operating system, etc.) to a location assuring longer-term availability.
Program-tracing tools typically monitor just the computer's main CPU so ~ where possible ~ at least some of the tracer data should be stored under the control of a different processing element, or in a location to which the tool's capabilities do not extend. Another option is to keep at least some of the tracer data in RAM memory for a period after the illicit action has been detected, and store it later.
Yet another option is to store at least some forensic tracer records in the operating system registry database. This resource is commonly accessed during system operation, so references to the database may not give rise to suspicion.
Inconspicuous storage covers a wide range of options. One is that the data be encrypted. This assures that simple disk-scanning operations attempting to find byte strings likely associated with tracer data will be unsuccessful. (Numerous encryption techniques are known, e.g. RSA, PGP, various private key techniques, etc., any of which can be used.) Encrypted tracer data can be stored with other encrypted system data, such as in a password file. Due to its encrypted nature, a hacker may not be able to discern what part of the stored data is tracer data and what part is, e.g., password data. Attempts to redact the tracer data risks corrupting the password data, jeopardizing the counterfeiter's later ability to login to the machine.
Another possibility is to steganographically encode the tracer data, e.g. by randomizing/obfuscating same and inconspicuously hiding it amidst other data (e.g. within graphic or audio files associated with start-up or shut-down of the computer operating system, or wherever else noise-like data can be introduced without alerting the user to its presence). Still another possibility is to create null code that resembles normal instructions or data, but instead serves as a forensic tracer record.
To avoid creation of telltale new files in the non- volatile memory, the tracer data can be patched into existing files, by appending to the end or otherwise. Or, rather than storing the tracer data as the content of a file, the data can be stored among a file's "properties."
Another way to avoid creating new files is to avoid using the computer's "file system" altogether, and instead use low-level programming to effect direct writes to typically-unused or reserved physical areas on the disk. By such techniques, the data is resident on the disk, but does not appear in any directory listing. (While such data may be lost if disk optimization tools are subsequently used, those skilled in the art will recognize that steps can be taken to minimize such risks.)
Yet another way to avoid creating new files is to relay at least some of the tracer data to outside the computer. One expedient is to use an external interface to transmit the data for remote storage. Again, a great variety of techniques can be employed to reliably, yet effectively, effect such transmission. And the data transmission need not occur at the moment the possibly illicit action is occurring. Instead, such data can be queued and relayed away from the machine at a later time.
Still another way to avoid creating new files is to make use of deadwood files that commonly exist on most computers. For example, application programs typically employ installation utilities which copy compressed files onto the disk, together with code to decompress and install the software. These compressed files and installation programs are usually not deleted, providing opportunities for their use as repositories of tracer data. Similarly, many computers include dozens or hundreds of duplicate files - only one of which is commonly used. By converting one or more of these files to use as a repository for tracer data, additional inconspicuous storage can be achieved. Some application programs include hundreds of files, various of which are provided just for the occasional use of the rare super-user. Files that pass some litmus test of inactivity (e.g. not ever used, or not accessed for at least two years) might serve as tracer data repositories. (Disk utilities are available to determine when a given file was last accessed.) Yet another option is to append data to an application's Help files, or other binary data files used to save program state information for the application. Resort may also be made to various of the known techniques employed in computer viruses to generate, transmit, store and disseminate/replicate the forensic tracer data in manners that escape common detection. Moreover, such virus techniques can be used to initially spread and install the functionality detailed above (i.e. pattern recognition, and tracer data generation/transmission/storage) onto computers without such capabilities.
Some embodiments may perform self-integrity checks of old tracer records each time a new banknote is encountered, and repair any damage encountered. Similarly, old tracer records can be expanded to detail new illicit acts, in addition to (or in lieu of) creating independent records for each illicit act.
Various tools can be used to replicate/propagate forensic tracer records to further infest the system with incriminating evidence. Utility software such as disk defragmenters, disk integrity checks, virus checkers, and other periodically-executed system maintenance tools can be written/patched to look in some of the places where forensic tracer records may be found and, if any are encountered, copy them to additional locations. Similar operations can be performed upon termination of selected application programs (e.g. image processing programs).
The foregoing is just the tip of the iceberg. Those skilled in the arts of computer programming, operating system design, disk utilities, peripheral firmware development, packet data transport, data compression, etc., etc., will each recognize many different opportunities that might be exploited to effect surreptitious, reliable banknote detection, and transmission, storage, and/or replication of tracer data. Again, if even one tracer record persists when the computer is searched by suitably-authorized law enforcement officials, incriminating evidence may be obtained. The high odds against ridding a computer of all incriminating data should serve as a deterrent against the computer's use for illegal purposes in the first place.
As noted, the computer system desirably includes several checkpoints for detecting illicit actions. In the case of banknote image processing, for example, detectors can be implemented in some or all of the following: in image processing software applications, in DLLs commonly used with image processing, in printer drivers, in printer firmware, in scanner drivers, in scanner firmware, in modem or other external interface drivers and software, in email software, in FTP software, in the operating system (looking at the clipboard, etc.), etc., etc. Similarly, where practical, the checking should be done by several different processors (e.g. main CPU, programmable interface chips, scanner microcontroller, printer microprocessor, etc.). From the foregoing, it will be recognized that techniques according to the present invention can be used to discourage counterfeiting, and to aid in its prosecution when encountered. Moreover, this approach obviates the prior art approach of marking all color photocopies with tracer data, with its accompanying privacy and first amendment entanglements. Having described and illustrated the principles of our invention with reference to an illustrative embodiment and several variations thereon, it should be recognized that the invention can be modified in arrangement and detail without departing from such principles.
For example, while the detailed embodiment has focused on a computer system, the same techniques can likewise be employed in stand-alone color copiers, etc.
Similarly, while the detailed embodiment has focused on counterfeiting, it will be recognized that computers can be employed in various other illicit or unauthorized activities. Each generally is susceptible to computer-detection (e.g. threats against the president may be detected by specialized natural language analysis programs; computer-aided synthesis of illegal drugs may be indicated by certain chemical modeling instructions in software specific to that industry; unauthorized duplication of copyrighted works may be flagged by the presence of embedded watermark data in the copyrighted work; unauthorized distribution of classified or confidential business documents may be detected using known techniques, etc.). The storage of forensic tracer data along the lines detailed above is equally applicable in such other contexts. In the future, support for illicit activity detection may be routinely provided in a wide variety of software and peripherals. In one embodiment, the software and peripherals may include generic services supporting the compilation of forensic tracer data, its encryption, transmission, storage, etc. These generic services can be invoked by detector modules that are customized to the particular illicit/unauthorized activity of concern. Some of the detector modules can be fairly generic too, e.g. generic pattern recognition or watermark detection services. These can be customized by data loaded into the computer (either at manufacture, or surreptitiously accompanying new or updated software) identifying particular images whose reproduction is unauthorized/illicit. As new banknotes are issued, updated customization data can be distributed. (Naturally, such detector customization data will need to be loaded and stored in a manner that is resistant against attack, e.g. using the approaches outlined above for the covert tracer data.)
While the invention is described in the context of an end-user computer, the principles are equally applicable in other contexts, e.g. in server computers. Moreover, the principles are not limited to use in general purpose personal computers but can also be applied in other computer devices, e.g. digital cameras, personal digital assistants, set-top boxes, handheld devices, firewalls, routers, etc.
Although not belabored above, it will be understood that law enforcement agencies will have software recovery tools that can be employed on suspect computer systems to recover whatever forensic tracer data may persist. Briefly, such tools know where to look for tracer data and, when encountered, know how to interpret the stored records. After analyzing the non-volatile stores associated with a suspect computer system, the recovery software will report the results. The implementation of such tools is well within the capabilities of an artisan. While the foregoing disclosure has focused exclusively on the storage of forensic tracer data as the response to a possibly-illicit action, more typically this is just one of several responses that would occur. Others are detailed in the previously- referenced documents (e.g. disabling output, hiding tracer data (e.g. as in patent 5,557,742, or using steganographically encoded digital watermark data) in the output, telephoning law enforcement officials, etc.). To provide a comprehensive disclosure without unduly lengthening this specification, applicants incorporate by reference the patent applications and documents referenced above. By so doing, applicants mean to teach that the systems, elements, and methods taught in such documents find application in combination with the techniques disclosed herein. The particular implementation details of such combinations are not belabored here, being within the skill of the routineer in the relevant arts.
In view of the many possible embodiments in which the principles of our invention may be realized, it should be recognized that the detailed embodiments are illustrative only and should not be taken as limiting the scope of our invention. Rather, we claim as our invention all such modifications, combinations, and implementations as may come within the scope and spirit of the following claims, and equivalents thereof.

Claims

WE CLAIM:
1. A method for discouraging use of a computer system for an illicit activity, the system having associated therewith at least one data processor and at least one nonvolatile data store, the method comprising: receiving a signal indicating possible use of a system component for an illicit activity; and in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores; wherein evidence of the possibly illicit activity persists for forensic use, long after the action itself has been concluded.
2. The method of claim 1 comprising receiving said signal from a detector responsive to image data.
3. The method of claim 1 comprising receiving said signal from a detector that includes a watermark detector.
4. The method of claim 1 comprising receiving said signal from a detector that includes a visible structure detector.
5. The method of claim 1 comprising receiving said signal from a hybrid watermark/visible structure detector.
6. The method of claim 1 comprising receiving said signal from a detector that includes a detector of a predetermined pattern characteristic of a banknote.
7. The method of claim 1 comprising receiving said signal from a detector associated with a printer.
8. The method of claim 1 comprising receiving said signal from a detector associated with a scanner.
9. The method of claim 1 comprising receiving said signal from a detector associated with software used with a computer.
10. The method of claim 1 comprising receiving said signal from a detector associated with driver software for a peripheral device.
11. The method of claim 1 comprising receiving said signal from a graphics- related executable running on said computer system.
12. The method of claim 1 comprising receiving said signal from a detector associated with an operating system.
13. The method of claim 1 comprising receiving said signal from a detector associated with an internet browser.
14. The method of claim 1 comprising receiving said signal from a network adapter.
15. The method of claim 1 comprising receiving said signal from an interface port.
16. The method of claim 1 in which the forensic tracer data includes data selected from the group consisting of: data identifying the date of said activity, data identifying the serial number of the computer system, data identifying the serial number of a system component, data identifying a user of the computer system, data identifying a file, data indicating the nature of the event detected, data indicating the status of the computer system, data from a registry database, data relating to an external network connection, and data derived from a digital watermark payload.
17. The method of claim 16 in which the forensic tracer data includes at least two data selected from said group.
18. The method of claim 16 in which the forensic tracer data includes at least three data selected from said group.
19. The method of claim 1 comprising storing the forensic tracer data by appending same to a file stored in said non-volatile data store.
20. The method of claim 1 comprising storing the forensic tracer data in a system registry associated with the computer system.
21. The method of claim 1 in which the computer system includes an external interface, and the method includes storing the forensic tracer data on a remote device by transmitting same to the remote device through the external interface.
22. The method of claim 1 comprising bypassing a computer system file system when storing the forensic tracer data, wherein the data is not reflected in a file directory listing of the computer system.
23. The method of claim 1 comprising encrypting said forensic tracer data.
24. The method of claim 1 comprising steganographically encoding said forensic tracer data.
25. The method of claim 1 including steganographically encoding said forensic tracer data within data stored in the non-volatile data store.
26. The method of claim 1 in which said illicit activity is processing image data corresponding to a banknote.
27. The method of claim 1 comprising storing said forensic tracer data redundantly in said non-volatile data store.
28. The method of claim 1 comprising storing at least some of said forensic tracer data after a delay interval.
29. The method of claim 1 which includes generating said forensic tracer data redundantly.
30. The method of claim 1 which includes transmitting said forensic tracer data redundantly.
31. The method of claim 1 which includes storing said forensic tracer data transparently.
32. The method of claim 1 which includes storing said forensic data inconspicuously.
33. A computer storage medium having instructions thereon causing a computer to inspect one or more non- volatile data stores associated with the computer searching for covert tracer data, said covert tracer data indicating possible use of the computer for an illicit activity, and producing output data indicating the results of said inspection.
34. A computer system comprising a processor and a non-volatile memory, the non-volatile memory including recognition data by which a predetermined image can be recognized, the system further including a detector that uses said recognition data to detect presence of data corresponding to said predetermined image in the computer system, the system further including means for storing an audit trail memorializing said detection.
35. A method of processing image data to screen for banknote images comprising, in the order stated:
(a) performing a first analysis on the image data;
(b) if the first analysis indicates the image data does not correspond to a banknote, skipping steps (c) - (e)
(c) performing a second analysis on the image data;
(d) if the second image analysis indicates the image data does not correspond to a banknote, skipping step (e); and
(e) flagging the image data as corresponding to a banknote.
36. The method of claim 35 that includes performing one or more additional analyses between steps (d) and (e), and skipping subsequent analyses if any of said additional analysis indicates the image data does not correspond to a banknote.
37. The method of claim 35 in which at least one of the analyses employs the Hough transform.
38. The method of claim 35 in which the first analysis is based on a rotationally invariant feature.
39. Apparatus for processing image data comprising: a steganographic watermark detector responsive to a steganographic watermark that is characteristic of a security document; and a pattern recognition detector responsive to a visible structure that is characteristic of a security document.
40. A photocopier according to claim 39.
41. A scanner according to claim 39.
42. A printer according to claim 39.
43. The apparatus of claim 39 that further includes an output having a signal that changes state when either of said detectors detects image data corresponding to a security document.
44. The apparatus of claim 43 further comprising a non- volatile memory for storing forensic tracer data in response to said signal.
45. A method of flagging image data as corresponding to a security document, comprising: loading at least a portion of the image data into a memory; analyzing the image data in the memory for the presence of a steganographic watermark indicative of a security document; and analyzing the image data in the memory for the presence of a visible structure indicative of a security document.
46. The method of claim 12 that further includes interfering with reproduction of the image data if either of said analyzing steps indicates that the image data corresponds to a security document.
47. A method of flagging image data as corresponding to a security document, comprising: re-registering the image data; analyzing the re-registered image data for the presence of a steganographic watermark indicative of a security document; and analyzing the re-registered image data for the presence of a visible structure indicative of a security document.
48. The method of claim 46 that further includes interfering with reproduction of the image data if either of said analyzing steps indicates that the image data corresponds to a security document.
49. The method of claim 46 in which the re-registering includes determining a scaling or rotation factor by reference to detection of calibration data embedded within the image data, and compensating for said determined factor.
50. The apparatus of claim 43 further comprising means for storing an audit trail memorializing detection of a security document.
51. The method of claim 45 that includes generating forensic tracer data redundantly, transmitting said forensic tracer data redundantly, and storing said forensic tracer data both transparently and inconspicuously, all in response to detection of either said steganographic watermark or said visible structure.
52. The method of claim 51 in which the forensic tracer data includes data selected from the group consisting of: data identifying the date of an activity, data identifying the serial number of a computer system, data identifying a serial number of a system component, data identifying a user of the computer system, data identifying a file, data indicating the nature of a detected event, data indicating the status of the computer system, data from a registry database, data relating to an external network connection, and data derived from a digital watermark payload.
PCT/US1999/025375 1998-11-03 1999-10-28 Method and software for evidencing illicit use of a computer system WO2000026749A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
AU18093/00A AU1809300A (en) 1998-11-03 1999-10-28 Method and software for evidencing illicit use of a computer system
EP99961538A EP1137975A1 (en) 1998-11-03 1999-10-28 Method and software for evidencing illicit use of a computer system
JP2000580066A JP2002539647A (en) 1998-11-03 1999-10-28 Methods and software for obtaining evidence of computer system fraudulent activity
KR1020017005591A KR20010090816A (en) 1998-11-03 1999-10-28 Method and software for evidencing illicit use of a computer system
CA002347179A CA2347179A1 (en) 1998-11-03 1999-10-28 Method and software for evidencing illicit use of a computer system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/185,380 1998-11-03
US09/185,380 US6549638B2 (en) 1998-11-03 1998-11-03 Methods for evidencing illicit use of a computer system or device

Publications (1)

Publication Number Publication Date
WO2000026749A1 true WO2000026749A1 (en) 2000-05-11

Family

ID=22680744

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/025375 WO2000026749A1 (en) 1998-11-03 1999-10-28 Method and software for evidencing illicit use of a computer system

Country Status (7)

Country Link
US (2) US6549638B2 (en)
EP (1) EP1137975A1 (en)
JP (1) JP2002539647A (en)
KR (1) KR20010090816A (en)
AU (1) AU1809300A (en)
CA (1) CA2347179A1 (en)
WO (1) WO2000026749A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1379966A1 (en) * 2001-03-12 2004-01-14 Vidius Inc. A system and method for monitoring unauthorized transport of digital content
US6735324B1 (en) 2000-07-31 2004-05-11 Digimarc Corporation Digital watermarks and trading cards
WO2005111926A1 (en) * 2004-05-18 2005-11-24 Silverbrook Research Pty Ltd Method and apparatus for security document tracking
US7502759B2 (en) 1999-08-30 2009-03-10 Digimarc Corporation Digital watermarking methods and related toy and game applications
US8160968B2 (en) 1999-05-19 2012-04-17 Digimarc Corporation Digital media methods

Families Citing this family (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6449377B1 (en) * 1995-05-08 2002-09-10 Digimarc Corporation Methods and systems for watermark processing of line art images
US7720249B2 (en) * 1993-11-18 2010-05-18 Digimarc Corporation Watermark embedder and reader
US6546112B1 (en) * 1993-11-18 2003-04-08 Digimarc Corporation Security document with steganographically-encoded authentication data
US7313251B2 (en) 1993-11-18 2007-12-25 Digimarc Corporation Method and system for managing and controlling electronic media
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US6424725B1 (en) * 1996-05-16 2002-07-23 Digimarc Corporation Determining transformations of media signals with embedded code signals
US5768426A (en) * 1993-11-18 1998-06-16 Digimarc Corporation Graphics processing system employing embedded code signals
US6882738B2 (en) * 1994-03-17 2005-04-19 Digimarc Corporation Methods and tangible objects employing textured machine readable data
US7286684B2 (en) * 1994-03-17 2007-10-23 Digimarc Corporation Secure document design carrying auxiliary machine readable information
US8094949B1 (en) 1994-10-21 2012-01-10 Digimarc Corporation Music methods and systems
US7724919B2 (en) * 1994-10-21 2010-05-25 Digimarc Corporation Methods and systems for steganographic processing
US7986806B2 (en) * 1994-11-16 2011-07-26 Digimarc Corporation Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network
US7620200B2 (en) 1995-05-08 2009-11-17 Digimarc Corporation Authentication of identification documents
US7555139B2 (en) * 1995-05-08 2009-06-30 Digimarc Corporation Secure documents with hidden signals, and related methods and systems
US6650761B1 (en) * 1999-05-19 2003-11-18 Digimarc Corporation Watermarked business cards and methods
US6965682B1 (en) * 1999-05-19 2005-11-15 Digimarc Corp Data transmission by watermark proxy
US9630443B2 (en) * 1995-07-27 2017-04-25 Digimarc Corporation Printer driver separately applying watermark and information
US6577746B1 (en) 1999-12-28 2003-06-10 Digimarc Corporation Watermark-based object linking and embedding
DE19750779C1 (en) * 1997-11-10 1999-01-14 Deutsche Telekom Ag Traitor tracing or unauthorised user identification method for proprietary data
US6608911B2 (en) * 2000-12-21 2003-08-19 Digimarc Corporation Digitally watermaking holograms for use with smart cards
US6978036B2 (en) 1998-07-31 2005-12-20 Digimarc Corporation Tamper-resistant authentication techniques for identification documents
US8290202B2 (en) * 1998-11-03 2012-10-16 Digimarc Corporation Methods utilizing steganography
ATE289435T1 (en) * 1998-11-19 2005-03-15 Digimarc Corp PRINTING AND VERIFICATION OF SELF-CHECKING SECURITY DOCUMENTS
US7770016B2 (en) 1999-07-29 2010-08-03 Intertrust Technologies Corporation Systems and methods for watermarking software and other media
US6608919B1 (en) * 1999-11-10 2003-08-19 Digimarc Corporation Method and apparatus for encoding paper with information
US6625297B1 (en) * 2000-02-10 2003-09-23 Digimarc Corporation Self-orienting watermarks
US7305104B2 (en) * 2000-04-21 2007-12-04 Digimarc Corporation Authentication of identification documents using digital watermarks
US7039864B1 (en) 2000-05-15 2006-05-02 Ricoh Co., Ltd. Method and apparatuses for management of unconsciously captured documents
DE10023759A1 (en) * 2000-05-15 2001-11-22 Fraunhofer Ges Forschung Digital watermark inclusion method in musical note score printing, involves altering geometric elements of note score only in digital form without reducing legibility of note score
JP2001352423A (en) * 2000-06-09 2001-12-21 Kyocera Corp Image data management system and method in network
US6952485B1 (en) 2000-09-11 2005-10-04 Digimarc Corporation Watermark encoding and decoding in imaging devices and imaging device interfaces
US7002704B1 (en) * 2000-11-06 2006-02-21 Xerox Corporation Method and apparatus for implementing anti-counterfeiting measures in personal computer-based digital color printers
US7958359B2 (en) * 2001-04-30 2011-06-07 Digimarc Corporation Access control systems
US7502937B2 (en) * 2001-04-30 2009-03-10 Digimarc Corporation Digital watermarking security systems
US7728048B2 (en) * 2002-12-20 2010-06-01 L-1 Secure Credentialing, Inc. Increasing thermal conductivity of host polymer used with laser engraving methods and compositions
US6899475B2 (en) * 2002-01-30 2005-05-31 Digimarc Corporation Watermarking a page description language file
US7606882B2 (en) * 2002-05-13 2009-10-20 Ricoh Co., Ltd. Method for obtaining an identifier of a monitored device
US7974495B2 (en) * 2002-06-10 2011-07-05 Digimarc Corporation Identification and protection of video
US20050271246A1 (en) * 2002-07-10 2005-12-08 Sharma Ravi K Watermark payload encryption methods and systems
JP4365148B2 (en) * 2002-07-19 2009-11-18 株式会社リコー Image forming apparatus, wrapping processing method, and program
CH695718A5 (en) * 2002-09-20 2006-07-31 Alpvision Sa A method of generating and applying on a support of a digital spatial marking.
AU2003285891A1 (en) * 2002-10-15 2004-05-04 Digimarc Corporation Identification document and related methods
US20040259633A1 (en) * 2003-04-16 2004-12-23 Gentles Thomas A. Remote authentication of gaming software in a gaming system environment
US7225991B2 (en) 2003-04-16 2007-06-05 Digimarc Corporation Three dimensional data storage
US9678967B2 (en) 2003-05-22 2017-06-13 Callahan Cellular L.L.C. Information source agent systems and methods for distributed data storage and management using content signatures
US8301893B2 (en) * 2003-08-13 2012-10-30 Digimarc Corporation Detecting media areas likely of hosting watermarks
WO2005076985A2 (en) * 2004-02-04 2005-08-25 Digimarc Corporation Digital watermarking image signals on-chip and photographic travel logs through digital watermarking
US8127137B2 (en) 2004-03-18 2012-02-28 Digimarc Corporation Watermark payload encryption for media including multiple watermarks
JP2005275820A (en) * 2004-03-25 2005-10-06 Canon Inc Device, method and program for recognizing business form, and recoding medium
EP1691539A1 (en) * 2005-02-15 2006-08-16 European Central Bank Two-dimensional security pattern that can be authenticated with one-dimensional signal processing
US7370190B2 (en) * 2005-03-03 2008-05-06 Digimarc Corporation Data processing systems and methods with enhanced bios functionality
CN100391745C (en) * 2005-06-13 2008-06-04 北京北大方正电子有限公司 Printing method of security file inlaid with anti-copying back-lines
US8175916B2 (en) * 2007-03-30 2012-05-08 Sharp Kabushiki Kaisha Image forming system and image forming apparatus
CN101311914B (en) * 2007-05-25 2010-05-26 佛山市顺德区顺达电脑厂有限公司 Electronic device and peripheral device matching system and its matching method
US20080065811A1 (en) * 2007-11-12 2008-03-13 Ali Jahangiri Tool and method for forensic examination of a computer
ATE546011T1 (en) 2009-09-09 2012-03-15 European Central Bank METHOD FOR GENERATING A SECURITY IMAGE ON TWO LEVELS FOR BANKNOTES
US9535994B1 (en) 2010-03-26 2017-01-03 Jonathan Grier Method and system for forensic investigation of data access
US20160132317A1 (en) 2014-11-06 2016-05-12 Intertrust Technologies Corporation Secure Application Distribution Systems and Methods
US10229250B2 (en) * 2015-02-16 2019-03-12 Arebus, LLC System, method and application for transcoding data into media files
US11582202B2 (en) 2015-02-16 2023-02-14 Arebus, LLC System, method and application for transcoding data into media files
EP3829152B1 (en) * 2019-11-26 2023-12-20 European Central Bank Computer-implemented method for copy protection, data processing device and computer program product
JP7404902B2 (en) * 2020-01-31 2023-12-26 ブラザー工業株式会社 Program, information processing device and information processing method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5377269A (en) * 1992-10-29 1994-12-27 Intelligent Security Systems, Inc. Security access and monitoring system for personal computer
US5483602A (en) * 1992-08-20 1996-01-09 Gao Gesellschaft Fur Automation Und Organisation Mbh Method and apparatus for detecting printed images on documents by testing for the presence in the images of structural elements having defined regularities which are recognizable by the eye and common to a variety of documents
US5483658A (en) * 1993-02-26 1996-01-09 Grube; Gary W. Detection of unauthorized use of software applications in processing devices
US5557742A (en) * 1994-03-07 1996-09-17 Haystack Labs, Inc. Method and system for detecting intrusion into and misuse of a data processing system
US5652802A (en) * 1990-02-05 1997-07-29 Cummins-Allison Corp. Method and apparatus for document identification
US5678155A (en) * 1994-03-29 1997-10-14 Sharp Kabushiki Kaisha Anti-counterfeiting device for use in an image-processing apparatus
US5838814A (en) * 1996-01-02 1998-11-17 Moore; Steven Jerome Security check method and apparatus
US5974548A (en) * 1996-07-12 1999-10-26 Novell, Inc. Media-independent document security method and apparatus

Family Cites Families (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3069654A (en) 1960-03-25 1962-12-18 Paul V C Hough Method and means for recognizing complex patterns
US4297729A (en) 1977-11-24 1981-10-27 Emi Limited Encoding and decoding of digital recordings
US4908873A (en) * 1983-05-13 1990-03-13 Philibert Alex C Document reproduction security system
JPS62125481A (en) 1985-11-26 1987-06-06 インターナショナル・ビジネス・マシーンズ・コーポレーション Pattern recognition equipment
US5040059A (en) 1987-08-03 1991-08-13 Vexcel Corporation Method and apparatus of image mensuration with selectively visible and invisible reseau grid marks
US5905810A (en) 1990-02-05 1999-05-18 Cummins-Allison Corp. Automatic currency processing system
US5790697A (en) 1990-02-05 1998-08-04 Cummins-Allion Corp. Method and apparatus for discriminating and counting documents
US5790693A (en) 1990-02-05 1998-08-04 Cummins-Allison Corp. Currency discriminator and authenticator
JPH0488489A (en) 1990-08-01 1992-03-23 Internatl Business Mach Corp <Ibm> Character recognizing device and method using generalized half conversion
EP0776120B1 (en) 1991-03-29 2002-09-04 Canon Kabushiki Kaisha Image processing apparatus
WO1993007580A1 (en) 1991-10-02 1993-04-15 Fujitsu Limited Method of determining direction in local region of profile segment and method of determining lines and angles
US5515451A (en) * 1992-01-08 1996-05-07 Fuji Xerox Co., Ltd. Image processing system for selectively reproducing documents
US5448375A (en) 1992-03-20 1995-09-05 Xerox Corporation Method and system for labeling a document for storage, manipulation, and retrieval
US6421145B1 (en) 1992-09-28 2002-07-16 Canon Kabushiki Kaisha Image processing apparatus and method using image information and additional information or an additional pattern added thereto or superposed thereon
US5351287A (en) * 1992-12-11 1994-09-27 Bell Communications Research, Inc. Method and apparatus for data evidence collection
US5469222A (en) 1992-12-23 1995-11-21 Intel Corporation Non-linear pixel interpolator function for video and graphic processing
US5602906A (en) * 1993-04-30 1997-02-11 Sprint Communications Company L.P. Toll fraud detection system
WO1995004665A1 (en) 1993-08-10 1995-02-16 Hardy Business Forms Limited Embedded printed data - method and apparatus
US5416307A (en) 1993-09-03 1995-05-16 Danek; Robert Currency paper verification and denomination device
EP0649114B1 (en) 1993-10-14 2002-02-13 Omron Corporation Image processing device and method for identifying an input image and copier including same
US5610688A (en) * 1993-11-05 1997-03-11 Sharp Kabushiki Kaisha Image forming apparatus having illegal use prevention
US5636292C1 (en) 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US5862260A (en) 1993-11-18 1999-01-19 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
US6122403A (en) 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US6345104B1 (en) 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US5768426A (en) 1993-11-18 1998-06-16 Digimarc Corporation Graphics processing system employing embedded code signals
US6449377B1 (en) 1995-05-08 2002-09-10 Digimarc Corporation Methods and systems for watermark processing of line art images
JP2835274B2 (en) 1994-02-24 1998-12-14 株式会社テック Image recognition device
US5568550A (en) 1994-10-05 1996-10-22 Shmuel Ur Method and system for identifying documents generated by an unauthorized software copy
US5533144A (en) 1994-10-17 1996-07-02 Xerox Corporation Anti-counterfeit pattern detector and method
US6182218B1 (en) 1994-12-13 2001-01-30 Mitsubishi Corporation Digital content management system using electronic watermark
DE69530566T2 (en) 1995-01-13 2004-03-25 Stmicroelectronics S.R.L., Agrate Brianza Hough transform with fuzzy gradient and choice
JP3549935B2 (en) * 1995-03-06 2004-08-04 株式会社日本コンラックス Paper sheet identification device
US5706364A (en) 1995-04-28 1998-01-06 Xerox Corporation Method of producing character templates using unsegmented samples
US5594809A (en) 1995-04-28 1997-01-14 Xerox Corporation Automatic training of character templates using a text line image, a text line transcription and a line image source model
US5689620A (en) 1995-04-28 1997-11-18 Xerox Corporation Automatic training of character templates using a transcription and a two-dimensional image source model
US5727092A (en) 1995-05-17 1998-03-10 The Regents Of The University Of California Compression embedding
US5710636A (en) 1995-06-05 1998-01-20 Xerox Corporation Method and apparatus for generating halftone images having human readable patterns formed therein
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US5684885A (en) 1995-09-27 1997-11-04 Xerox Corporation Binary glyph codes based on color relationships
US5640647A (en) 1995-11-27 1997-06-17 Xerox Corporation Method and apparatus for selectively scanning pages within a document stack
US5668636A (en) 1995-12-20 1997-09-16 Xerox Corporation Embedded data controlled digital highlight color copier
US5752152A (en) 1996-02-08 1998-05-12 Eastman Kodak Company Copy restrictive system
JPH09274660A (en) 1996-04-05 1997-10-21 Omron Corp Method, device for recognizing image, copy machine mounting the same and scanner
US5761686A (en) 1996-06-27 1998-06-02 Xerox Corporation Embedding encoded information in an iconic version of a text image
JP3781850B2 (en) * 1997-01-21 2006-05-31 シャープ株式会社 Image forming system
US6073123A (en) * 1997-02-26 2000-06-06 Staley; Clinton A. Method and apparatus for detecting unauthorized copies of software
US6320675B1 (en) 1997-07-15 2001-11-20 Canon Kabushiki Kaisha Image processing apparatus and method and storage medium
US6181813B1 (en) * 1997-09-29 2001-01-30 Xerox Corporation Method for counterfeit currency detection using orthogonal line comparison
US6272245B1 (en) 1998-01-23 2001-08-07 Seiko Epson Corporation Apparatus and method for pattern recognition

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5652802A (en) * 1990-02-05 1997-07-29 Cummins-Allison Corp. Method and apparatus for document identification
US5483602A (en) * 1992-08-20 1996-01-09 Gao Gesellschaft Fur Automation Und Organisation Mbh Method and apparatus for detecting printed images on documents by testing for the presence in the images of structural elements having defined regularities which are recognizable by the eye and common to a variety of documents
US5377269A (en) * 1992-10-29 1994-12-27 Intelligent Security Systems, Inc. Security access and monitoring system for personal computer
US5483658A (en) * 1993-02-26 1996-01-09 Grube; Gary W. Detection of unauthorized use of software applications in processing devices
US5557742A (en) * 1994-03-07 1996-09-17 Haystack Labs, Inc. Method and system for detecting intrusion into and misuse of a data processing system
US5678155A (en) * 1994-03-29 1997-10-14 Sharp Kabushiki Kaisha Anti-counterfeiting device for use in an image-processing apparatus
US5838814A (en) * 1996-01-02 1998-11-17 Moore; Steven Jerome Security check method and apparatus
US5974548A (en) * 1996-07-12 1999-10-26 Novell, Inc. Media-independent document security method and apparatus

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8160968B2 (en) 1999-05-19 2012-04-17 Digimarc Corporation Digital media methods
US7502759B2 (en) 1999-08-30 2009-03-10 Digimarc Corporation Digital watermarking methods and related toy and game applications
US6735324B1 (en) 2000-07-31 2004-05-11 Digimarc Corporation Digital watermarks and trading cards
EP1379966A1 (en) * 2001-03-12 2004-01-14 Vidius Inc. A system and method for monitoring unauthorized transport of digital content
US7677445B2 (en) 2004-05-18 2010-03-16 Silverbrook Research Pty Ltd Method of counting currency
US7461778B2 (en) 2004-05-18 2008-12-09 Silverbrook Research Pty Ltd Method of identifying a copied security document
US7506168B2 (en) 2004-05-18 2009-03-17 Silverbrook Research Pty Ltd Method for identifying a counterfeit security document
US7663789B2 (en) 2004-05-18 2010-02-16 Silverbrook Research Pty Ltd Method of printing security documents
US7441712B2 (en) 2004-05-18 2008-10-28 Silverbrook Research Pty Ltd Method of authenticating security documents
US7681800B2 (en) 2004-05-18 2010-03-23 Silverbrook Research Pty Ltd Handheld security document scanner
US7784681B2 (en) 2004-05-18 2010-08-31 Silverbrook Research Pty Ltd. Method and apparatus for security document tracking
US7815109B2 (en) 2004-05-18 2010-10-19 Silverbrook Research Pty Ltd System for identifying counterfeit security document
US7854386B2 (en) 2004-05-18 2010-12-21 Silverbrook Research Pty Ltd Printing currency documents
US7913924B2 (en) 2004-05-18 2011-03-29 Kia Silverbrook Security document database
US7922075B2 (en) 2004-05-18 2011-04-12 Silverbrook Research Pty Ltd Security document scanner
US8096466B2 (en) 2004-05-18 2012-01-17 Silverbrook Research Pty Ltd Transaction recordal system
WO2005111926A1 (en) * 2004-05-18 2005-11-24 Silverbrook Research Pty Ltd Method and apparatus for security document tracking

Also Published As

Publication number Publication date
EP1137975A1 (en) 2001-10-04
US20020136426A1 (en) 2002-09-26
US6674886B2 (en) 2004-01-06
KR20010090816A (en) 2001-10-19
CA2347179A1 (en) 2000-05-11
JP2002539647A (en) 2002-11-19
US20030202677A1 (en) 2003-10-30
US6549638B2 (en) 2003-04-15
AU1809300A (en) 2000-05-22

Similar Documents

Publication Publication Date Title
US6549638B2 (en) Methods for evidencing illicit use of a computer system or device
US8290202B2 (en) Methods utilizing steganography
Johnson et al. Information hiding: steganography and watermarking-attacks and countermeasures: steganography and watermarking: attacks and countermeasures
JP4553484B2 (en) Digital authentication using analog documents
US6678822B1 (en) Method and apparatus for securely transporting an information container from a trusted environment to an unrestricted environment
US20030233169A1 (en) System and method for expressing usage rights using light signals
US20030056104A1 (en) Digitally watermarking checks and other value documents
WO2000051338A1 (en) Data monitoring method, data monitoring device, copying device, and storage medium
Li et al. Protecting the intellectual property of deep neural networks with watermarking: The frequency domain approach
KR100430469B1 (en) System for preventing document from forging/alternating
Jain et al. Fragile watermarking for image authentication: survey
Frith Steganography approaches, options, and implications
Kuraki et al. Watermarking technologies for security-enhanced printed documents
Patel et al. Digital image watermarking mechanism for image authentication, image forgery and self recovery
CA2355715A1 (en) Counterfeit deterrence system
Grover Data watermarking: Steganography and watermarking of digital data
Darwish New system to fingerprint extensible markup language documents using winnowing theory
EP3829152B1 (en) Computer-implemented method for copy protection, data processing device and computer program product
AlSabhany et al. A lightweight fragile audio watermarking method using nested hashes for self-authentication and tamper-proof
Pan et al. Finding needles in a haystack: A Black-Box Approach to Invisible Watermark Detection
JP2005130039A (en) Data processor
Joseph et al. Digital Watermarks for Copyright Protection
CN116167807A (en) Bill anti-counterfeiting method and device, electronic equipment and storage medium
JP2000253240A (en) Duplicating device
SGVU111516112 Steganography Scheme Against RS Attack Enriched With Evolutionary Programming (AGA) And OPAP.

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref country code: AU

Ref document number: 2000 18093

Kind code of ref document: A

Format of ref document f/p: F

AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2347179

Country of ref document: CA

Ref country code: CA

Ref document number: 2347179

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 1999961538

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 18093/00

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 1020017005591

Country of ref document: KR

ENP Entry into the national phase

Ref country code: JP

Ref document number: 2000 580066

Kind code of ref document: A

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 1999961538

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1020017005591

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1999961538

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1020017005591

Country of ref document: KR