US5449896A - Random access techniques for use with self-clocking glyph codes - Google Patents
Random access techniques for use with self-clocking glyph codes Download PDFInfo
- Publication number
- US5449896A US5449896A US08/172,512 US17251293A US5449896A US 5449896 A US5449896 A US 5449896A US 17251293 A US17251293 A US 17251293A US 5449896 A US5449896 A US 5449896A
- Authority
- US
- United States
- Prior art keywords
- glyphs
- code
- glyph
- sync
- pattern
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title description 37
- 101100368149 Mus musculus Sync gene Proteins 0.000 description 178
- 230000008569 process Effects 0.000 description 30
- 239000002131 composite material Substances 0.000 description 18
- 230000000737 periodic effect Effects 0.000 description 12
- 125000004122 cyclic group Chemical group 0.000 description 10
- 238000012360 testing method Methods 0.000 description 6
- 238000012795 verification Methods 0.000 description 6
- 230000000007 visual effect Effects 0.000 description 6
- 238000012937 correction Methods 0.000 description 5
- 230000002441 reversible effect Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000001965 increasing effect Effects 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 230000001360 synchronised effect Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000002457 bidirectional effect Effects 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000003252 repetitive effect Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 238000000844 transformation Methods 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 229930091051 Arenine Natural products 0.000 description 1
- 125000002015 acyclic group Chemical group 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000007850 degeneration Effects 0.000 description 1
- 230000003412 degenerative effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000009432 framing Methods 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000007620 mathematical function Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000010363 phase shift Effects 0.000 description 1
- 230000000246 remedial effect Effects 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 238000010008 shearing Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/143—Glyph-codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
Definitions
- This invention relates to self-clocking glyph codes for recording digital information on graphic recording media, such as plain paper. Even more specifically, this invention pertains to techniques for increasing the tolerance of such glyph codes to geometric distortion and physical damage, while preserving their homogeneous visual appearance and enhancing their suitability for applications requiring random access to the information they encode.
- a basic self-clocking glyph code typically is composed of an array 21 of elongated, slash-like symbols or "glyphs" 22 and 23 that are written with their longitudinal axes tilted at angles of approximately -45° and +45° with respect to the vertical axis 24 of a recording medium 25 to encode bit values of "1" and "0", respectively, or vice-versa, in each of the glyphs.
- These codes are “self-clocking” because they include an optically detectable symbol (a "glyph”) for each of the values they encode. This means that the detection of the glyphs implicitly synchronizes the decoding process to the code once the decoding process has been properly spatially oriented with respect to the code.
- 07/814,842 provides a technique for encoding a plurality of bit values in each of the glyphs by constructing the glyphs so that they each have a plurality of independently modulatable and readily distinguishable (e.g., substantially orthogonal) characteristics.
- a straightforward self-clocking glyph code of the type shown in FIG. 1 is featured in this disclosure to simplify the description, it will be evident that the broader aspects of this invention are applicable to other glyph codes, including more complex ones.
- each of the glyphs 22 and 23 usually is defined by writing a recognizable pattern of "on” and “off” pixels into a two dimensional, array of pixel positions (i.e., a "symbol cell”).
- a symbol cell the pixels that form the body of the glyph (say, the "on” pixels) are written into contiguous pixel positions that are more or less centered within the symbol cell, and the other or “off” pixels are written into the remaining pixel positions of the symbol cell to provide a contrasting surround that demarks the edges of the glyph and separates it from its neighbors.
- the symbol cells ordinarily are tiled onto the recording medium in accordance with a preselected spatial formatting rule, so the logical order of the data values that the glyphs encode is preserved by the spatial order in which the glyphs are mapped onto the recording medium.
- the symbol cells may be written on the recording medium in accordance with a regular and repeating spatial formatting rule that is selected to map the glyph encodings into a two dimensional, rectangular array of logical data blocks of predetermined size, such as data blocks having a 16 symbol cell ⁇ 16 symbol cell format. These data blocks suitably are organized on the recording medium in left-to-right, top-to-bottom logical order.
- the size of the symbol cells that are used for the glyphs depends on a variety of factors, including the spatial resolution of the printing process that is employed to write the glyphs, the type and extent of the degeneration that the printed glyph code is required to tolerate, and the spatial resolution of the lowest resolution scanning process that is expected to be able to recover the code.
- a 300 s.p.i. printer suitably centers the glyphs in 5 pixel ⁇ 5 pixel or 7 pixel ⁇ 7 pixel symbol cells. Even larger symbol cells can be employed for the glyphs if the increased granularity of the textured appearance of the printed glyph code is tolerable or unavoidable.
- the existing techniques for decoding self clocking glyph codes are designed to be initialized at or near the center of a reference glyph that occupies a known spatial position relative to the remainder of the glyph code (for example, the glyph in the upper, lefthand corner of a rectangular array of glyphs).
- a reference glyph that occupies a known spatial position relative to the remainder of the glyph code (for example, the glyph in the upper, lefthand corner of a rectangular array of glyphs).
- any glyphs that are isolated from synchronously readable glyphs may be unsynchronizable, especially in the interior of a glyph code pattern.
- Spatial synchronization is, of course, required to enable the decoding process to preserve the logical ordering of the data that is encoded in the glyphs. Minor synchronization errors affecting a limited number of glyphs may be tolerable if the code has sufficient error correcting capacity (i.e., error correction code protection) to correct for the resulting decode errors, but more extended synchronization errors generally result in incomplete reading of the encoded information. Ultimately, this performance degradation can become sufficiently severe to be unacceptable.
- the scanned-in image of the glyph code might be sufficiently degraded to cause the decoding process to erroneously branch from one row of glyphs to an adjacent row, or to skip over a glyph without accounting for it, or to miscount the number of unreadable glyphs in a damaged region of the image.
- none of the known self-clocking glyph codes or related decoding processes enable the decoding process to re-establish proper synchronization once it has been lost, so a loss of synchronization usually causes these existing decoding processes to degenerate into an irreversible failure mode.
- Image rotation of 90°, 180°, 270° and reflection result in rotational and mirror image transformations of the glyph code pattern, and these transformations can alter the apparent spatial order of the glyphs and/or the apparent rotational orientation of the individual glyphs. Indeed, this is an especially significant issue when the glyphs encode the data values in their rotational orientations, such as when the glyphs are slash-like symbols that are oriented at ⁇ 45° with respect to the longitudinal axis of the recording medium to encode high ("1") and low (“0") logic level bits, respectively, because such glyphs often are written in patterns that have rotational symmetry. Unfortunately, the orientation of scanned-in glyph code patterns frequently involves some ambiguity.
- Some of the commercially available two dimensional data codes such as VericodeTM by Veritex and DatacodeTM by Data Code International, have distinctive reference marks along one or more of their borders that can be used for scaling and for explicitly spatially synchronizing the decoding of those codes.
- these reference marks are visually distinctive so they tend to increase the visual obtrusiveness of those codes.
- One of the principal advantages of self-clocking glyph codes is that they tend to be esthetically pleasing because of their non-obtrusive visual appearance, so it would be counterproductive to supplement them with reference patterns that have such a strong visual impact.
- an optically readable record for storing encoded information comprises (1) a recording medium, (2) a self-clocking data code for encoding said information, with this data code being composed of glyphs that are written in a two dimensional code field on said recording medium on centers that are spatially distributed in nominal accordance with a predetermined spatial formatting rule, where the glyphs are defined by respective symbols that are selected from a finite set of optically discriminable symbols to encode said information, and (3) at least one additional glyph pattern that is written on said recording medium in nominal accordance with said spatial formatting rule, said additional code pattern providing physical addressing information for random access from any given location within said glyph pattern to any other given location within the same glyph pattern or another glyph pattern on the same or a differnt recording medium.
- FIG. 1 is a simplified, enlarged illustration of a standard self-clocking glyph code that is written in accordance with a basic two dimensional block formatting rule
- FIG. 2 is a simplified, enlarged illustration of a block formatted self-clocking glyph code that includes synchronization code patterns in accordance with this invention
- FIG. 3 is a simplified, enlarged illustration of a block formatted self-clocking glyph code that contains non-colinear synchronization code patterns in accordance with a more detailed aspect of this invention
- FIG. 4 is a simplified, enlarged illustration of a glyph code pattern that has a lattice-like framework of two dimensional sync code sequences in accordance with an even more detailed aspect of this invention
- FIG. 5 is a simplified, enlarged illustration of a glyph code pattern that has a lattice-like flamework of interlocking, two dimensional sync codes
- FIGS. 6 and 7 are full size illustrations of the sync code and data code components, respectively, of a glyph code pattern of the type shown in FIGS. 4 and 5;
- FIG. 8 is a full size illustration of a composite glyph code pattern that is composed of the sync code and data code components that are shown in FIGS. 6 and 7, respectively;
- FIG. 9 is a simplified, enlarged illustration of a multiple logical data block formatted glyph code pattern that has a lattice-like framework of two dimensional sync codes and internal block labels for extended addressability;
- FIG. 10 diagrammatically illustrates the use of asymmetric sync code sequences for symmetry disambiguation
- FIG. 11 illustrates the use of a lattice-like sync code pattern for navigating around damage in glyph code patterns
- FIG. 12 illustrates the use of a lattice-like sync code pattern for explicitly synchronizing a distorted glyph code pattern.
- a self clocking glyph code 31 includes a data code 32, together with a two dimensional, distributed sync code pattern 33.
- the data code 32 is shown as being composed of slash-like symbols or "glyphs" 34 that are tilted at ⁇ 45° with respect to the longitudinal axis of the recording medium 35 (see the process direction arrow 36), while the sync code pattern 33 is shown as being composed of glyphs 37 that are tilted at +45° with respect to that axis.
- the angular orientation of the data glyphs 34 is modulated in accordance with the respective data values they encode.
- the angular orientation of the sync code glyphs 37 might also be modulated in accordance with a cyclic or acyclic sequence of values, as more fully described hereinbelow. Consequently, there may not be any symbolic distinction between a given data glyph 34 and a given sync glyph 37. Indeed, in keeping with one of the more detailed features of this invention, the data glyphs 34 and the sync glyphs 37 preferably are potentially identical members of the same finite symbol set because this causes the sync code pattern 33 to visually blend with the data code 32 (see FIG. 8) effectively. Moreover, to even further enhance the visual homogeneity of the composite code 31, the sync code pattern 33 advantageously is selected to avoid visually distinctive glyph patterns, such as long runs of the same symbol.
- the sync code encoded glyph pattern 33 (sometimes referred to herein as the "sync code pattern") is composed of a predefined, cyclical or acyclical pattern of glyphs that is sufficiently distinctive to be disambiguated from the data code 32 with acceptably high statistical reliability.
- This sync code pattern 33 is written on the recording medium 35 in accordance with the same spatial formatting rule as the data code 32, but the formatting of the sync code pattern 33 is further governed by at least one additional rule that establishes a predetermined localized geometric relationship between the spatial positioning of the glyphs 37 of the sync code pattern 33 and the spatial positioning of nearby data glyphs 34.
- the logical ordering of the sync code values that are encoded by the glyphs of the sync code pattern 33 is predetermined.
- the sync code pattern 33 defines localized spatial references for determining the logical ordering of the data glyphs 34.
- the replicability of the sync code pattern 33 ensures that the spatial references it provides survive replication of the composite code 31 (such as when the composite code 31 is replicated by photocopying or facsimile transmission to provide a hardcopy replica or by bitmap input scanning to provide an electronic representation) subject only to the losses that might occur if the original image and/or the copy of their composite code 31 is damaged.
- the sync code pattern 33 is distributed throughout the composite code 31 and is selected so that the density of the spatial references it provides is sufficient to locally reference all of the data glyphs 34. In that event, any non-linear distortions the data code 32 might experience while being replicated are tracked by corresponding localized non-linear distortions of the sync code pattern 33.
- the sync code pattern 33 may take many different forms. In practice, however, it advantageously is written as a linear pattern (or, for a nonlinear implementation, in areas of adjacent glyph cells) because these types of subpatterns are easier to identify than nonlinear patterns of spatially scattered glyphs.
- the sync code pattern 33 may be composed of linear subpatterns of glyphs 37 that are written on the same center-to-center spacing as the data glyphs 34 to span the spatially formatted glyph code 31 (or logical subsets thereof--see FIG. 4) in one direction (see FIG. 2) or in a plurality of different directions (see FIG. 3 et seq.).
- linear sync code glyph patterns i.e., patterns of sync code encode glyphs that are written in linear spatial sequences
- a sync code pattern may be defined somewhat more generally by a two dimensional array of linear sync code subpatterns, where each of the subpatterns is composed of every mth glyph (where m is an integer) along a substantially straight line that runs parallel to a predetermined synchronization direction.
- m is an integer
- each set of glyphs that is (1) aligned in a synchronization direction and (2) composed of glyphs that are separated from each other by m-1 intermediate glyphs implicitly includes either all sync glyphs in proper sequence or no sync glyphs, except where desynchronizing faults (i.e., synchronization errors) are encountered.
- Sync code patterns composed of parallel, longitudinally separated, linear subpatterns, such as the pattern 33 in FIG. 2, are an interesting example of how the inclusion of a pattern of sync code encoded glyphs facilitates establishing and maintaining synchronization during the decoding of a self-clocking code 32.
- the sync code subpatterns 33a-33d are written in parallel alignment with a major axes of the data code 32 (i.e., its lateral or x -axis in a standard orthogonal coordinate space), and these subpatterns 33a-33d are composed of sync code encoded glyphs 37 that are written on the same center-to-center spacing along the x-axis as the data glyphs 34.
- sync code subpatterns 33a-33d each is of sufficient length to span the data code 32 along its x-axis. And, these sync code subpatterns 33a-33d are spatially displaced from each other along the orthogonal axis of the composite code pattern 31 (i.e., its longitudinal axis or y-axis) by a predetermined constant number of lines of data code 32.
- the implicit synchronization that is provided by the self-clocking property of the data glyphs 34 often is sufficient for maintaining the synchronization of the decode process while the data glyphs 34 that are disposed between the parallel sync code subpatterns 33a-33d are being read.
- the data glyphs 34 that are logically aligned between sync code glyphs 37 that occupy logically corresponding positions in two neighboring sync code subpatterns suitably are identified on a "best efforts basis," (1) by explicitly resynchronizing the decode process at one of the logically paired sync code glyphs 37, and (2) by then advancing the decode process, data glyph-by-data glyph, toward the second of the paired sync code glyphs 37.
- the success or failure of the decode process in tracking from one to the other of the logically paired sync code glyphs 37 is a strong indication of whether synchronization was preserved during the reading of the intervening data glyphs 34.
- suitable remedial and/or corrective action can be taken. This action may be transparent to the user, such as when there is sufficient error correction capacity to correct the errors or may involve more drastic measures, such as notifying the user that the decode results are invalid and/or incomplete.
- a sync code pattern 43 that is composed of a plurality of nonparallel linear sync code subpatterns 43a-43b that jointly span the composite code pattern 31 (e.g., along its x-axis and its y-axis). Two such subpatterns 43a and 43b are sufficient for reducing the synchronization errors that may tend to occur; for example, as a result of one or two dimensional distortion of the image of the composite code pattern 31.
- sync codes that are employed provide unique addresses over some definite span of each of the sync code subpatterns, such as is provided by the some of the digital codes that are discussed hereinbelow, a single pair of nonparallel sync lines can further reduce synchronization errors caused by dropouts of individual data glyphs 34, groups of neighboring data glyphs, and/or full lines of data glyphs.
- That information can be used to compute a global or local skew correction factor that brings the sync code strings 43a and 43b into the proper angular orientation with the x and y axes of the composite code pattern 31. While any two nonparallel sync code strings that jointly span the composite code pattern 31 along its major axes will suffice, two perpendicular sync code strings 43a and 43b that span the composite code pattern 31 along its x-axis and its y-axis, respectively, are shown to provide a straightforward example.
- two non-colinear sets of parallel linear sync code subpatterns can be used to form a lattice-like sync code pattern 53 that is composed of a two dimensional tiled array of sync code cells 54a-54i that have rectangular or parallelogram-like configurations.
- the x, y coordinates on which the glyphs 37 of such a sync code pattern are centered may be identified, and the glyphs 37 may be decoded, systematically throughout the composite code pattern 31 by following the sync code lattice.
- any given glyph 37 of the sync code pattern 53 can be reached by following a path of logically ordered sync code glyphs/this notion of imposing a predetermined logical order on the values of neighboring glyphs in the sync code pattern 53 is discussed in more detail hereinbelow), even when damage frustrates any attempt to determine the logical ordering of the glyphs 37 along one or more of the alternative paths.
- the overwrites 81, 82, and 83 partially obliterate portions of the lattice-like sync code pattern 53.
- the closed line geometry of the overwrite 81 may prevent the sync glyphs within its interior from being reached, but it is possible to navigate around the open line overwrites 82 and 83 on sync code glyphs.
- sync code pattern 53 permits positive verification of the number of data glyphs 34 that are read in a linear array of glyphs, such as a row or column of data glyphs 34 that has both ends terminated by sync code glyphs 37.
- This means that such a sync code pattern permits substantial verification that branching to an adjacent row of glyphs has not occurred during the reading of the data glyphs 34 that are fully confined by the sync code lattice.
- the dimensions of the lattice cells 54a-54i are uniform because this permits the periodicity of the cyclical synchronization codes that are discussed below to be matched to the periodicity of the sync code pattern 53. While FIG. 4 shows that each cell 54a-54i of the sync code pattern 53 contains a 6 ⁇ 6 array of data glyphs 34, it will be understood that any M ⁇ N lattice may be employed in practice.
- each of the cells 54a -54i of the lattice pattern 53 suitably flames a logical data block composed of a 16 ⁇ 16 array of data glyphs 34, thereby reducing the overhead cost of including the sync code pattern 53 to provide the spatial references that are required to explicitly synchronize the decoding of the data glyphs 34.
- intersections of sync code patterns that are composed of nonparallel linear strings of sync code can serve as references for synchronization, even if the digital codes themselves lack unique addressing, such as in the simple code sequences mentioned hereinabove.
- two sets of intersecting linear subpatterns of glyphs that encode sync codes, as in FIG. 4 can provide some two dimensional absolute registration capability.
- the confirmation that each of these linear glyph strings encode sync code establishes linear boundaries for a glyph region or cell that is flamed by sync code glyphs, and that flamed region is known (because the spatial formatting rule is known) to have a predefined pattern of interior glyph positions.
- Cyclic digital code sequences that conform to so-called maximal length sequences can be generated by appropriately configured digital shift registers or by reference to a bit-level description of the desired MLS (see, Shift Register Sequences by Solomon W. Golomb, Holden-Day, Inc. 1967). It now has been found that these MLS digital sequences have properties that make them very useful for more sophisticated processing of two dimensional glyph codes.
- n may be easily chosen, if desired, to be large enough so that there is no repeat of the bit sequence S within a bit string of any given finite length.
- the bit values that are encoded by the glyphs provide absolute one dimensional addressing transversely of the array of glyphs.
- this absolute addressing property follows from the mapping of the logically ordered, non-repeating shift register subsequence on to the spatially ordered pattern of glyphs, so it is not limited to linear patterns of sync code glyphs.
- MLS sequences are not symmetric for n>2.
- an address defining MLS subsequence of length n may be symmetric in the forward and reverse directions (e.g., 101), extending the sequence to no more than length 2 n will break the symmetry (e.g., 101001).
- this property of MLS codes can aid in glyph pattern symmetry disambiguation.
- bit lengths do not naturally match the round binary units in which digital data is typically assembled; e.g., nibbles(4), bytes(8), blocks(512 ⁇ 8). This is meaningful because it implies that MLS codes have the drawback of not precisely spanning data blocks that are arrayed in convenient binary units.
- n- stage shift register with a maximal length sequence of 2 n -1 that every cycle period between 1 and 2n can be obtained from it by one of 2 n -1 simple standard modifications to a nonlinear shift register [Golomb, op. ct. p. 192-194].
- the resulting sequence is a subsequence of a maximal-length sequence. For example:
- these cyclic codes including the cyclic truncated sequences, provide unique n bit subsequence addressing within each cycle (i.e., within each local region of the printed glyph code).
- padding of this type can be used in a glyph code to align each cycle of sync code with a block of data code that is written in a convenient binary format.
- Inserting two or more 0's enables alignment with (1) a data block having an "even” binary format, together with (2) one or more regions of additional glyphs which may be used for separate purposes, such as transverse lines of sync code glyphs.
- this zero padding has the useful property of preserving the uniqueness of all n-bit subsequences, except for the string of 0's that is immediately followed by and unambiguously identified by the (n) 1's, as unambiguous addresses along the code.
- a periodic sync code that provides unique addressing within a subsequence of predetermined length (such as an MLS code) can be employed to provide directional steering to the glyph location for an intersecting transverse pattern of sync glyphs.
- a periodic sync code of the foregoing type it is useful to match the spacing of transverse lines of sync glyphs to the period of the periodic sync code so that there is consistent transverse referencing between the periodic sync code and the transverse sync glyphs.
- FIGS. 6 and 7 show the sync lattice and the data glyphs printed separately, while FIG. 8 illustrates the combined or composite glyph code which shows that the sync code visually blends uniformly with the variable data encoded glyphs.
- the values encoded in the shared glyphs preferably are consistent with both of the encoded sequences.
- the sync codes do not otherwise provide appreciable unique addressing, as in simple codes(111 or 1010), it may be advantageous to arrange the intersection glyphs to be discordant with one or both of the sync sequences to facilitate the identification of the intersection location; e.g., 111101111111, or 101010001010.
- the translational ambiguity of a repeating periodic sync sequence can be overcome by writing additional predefined data in "reserved" glyphs 58a-58i which have a known order and which reside at predefined positions with respect to the encoded sync code glyphs.
- the glyphs that are reserved for encoding this additional information preferably are spatially adjacent to the sync code glyphs 37.
- the additional information that might be encoded in these reserved glyphs includes physical and/or logical data block identification.
- the cyclic sync codes that are contemplated by this invention can be supplemented by encoding appropriate data block specific information in these reserved glyphs 58a-58i to enable the sync code to be used for synchronizing the of data glyphs, on a data block basis and the reserved glyphs 58a-58i to be employed for identifying the data blocks physically with respect to the overall glyph code pattern.
- Physical addressing of the data blocks 54a-54i provides a powerful indexing mechanism for random access to the data recorded in any of the data blocks 54a-54i. Furthermore, if desired, this indexing may be extended hierarchically to include, for example, a page index value, a volume index value and similar logical correlators in the data that is written into the reserved glyphs 58a-58i. Standard random access techniques can then be employed for advancing the glyph reading process from one data block to another data block within the same glyph code pattern or a different glyph code pattern.
- the ability to index reliably and efficiently from one glyph code pattern to another is dependent on having a substantially stable and/or easily reconstructable relationship between those patterns, so that the indexing can be performed using straight forward mathematical functions (i.e., addition and subtraction). Image distortions and other factors may perturb the physical relationship among well-linked glyph code patterns slightly, so it sometimes may be best to perform random access seeks using a convergence strategy; whereby each seek starts with a coarse indexing to at least roughly approach the target location, and then continues with one or more progressively finer seeks until the target is located precisely.
- the indexing data in the reserved glyphs 58a-58i can be used to control the coarse seeks, while the finer seeks can be controlled using the precision provided by the above-described addressing codes.
- the general rule is that the ability to distinguish a predefined ordered subset of k glyphs that encode sync code from glyphs that encode variable data with a random occurrence of bits is governed by the probability of random match of all bits, 1/2 k , which decreases exponentially (geometrically) with k. Even for nonrandom data, matching to a pseudorandom synchronization digital code, such as the maximal length sequences, will be similarly improbable.
- the first key test for disambiguating sync glyphs from data glyphs focuses on determining whether a given spatially ordered sequence of glyphs encodes values of the known sync code in valid logical order.
- the linear sync glyph patterns that are proposed hereinabove facilitate this logically ordered sorting of glyphs, but there still is an uncertainty of translation by an integer number of glyphs, together with a possible gross rotational ambiguity as more fully described hereinbelow. Therefore, when a cyclic sync code having a period of L bits is employed, the testing to identify the glyphs that are encoded with this sync code suitably begins with a search for glyphs that encode a logically ordered subsequence of k bits that matches on the known sync code, where k is long enough to uniquely define synchronized address within a single period of the sync code.
- the probability of this subsequence randomly matching a translation phase of the sync code is L /2 k of course, if k+L is equal to or greater than m, where m is the total number of sync glyphs in a full line of sync code, then the number of valid sequences is reduced from L to (m-k), yielding a random match probability, of (m-k)/2 k .
- a follow-on test typically is performed to confirm that the particular subsequence continues to match on the known sync code as it is being extended by the decode values for one after another of the glyphs that logically extend the subsequence in accordance with the spatial formatting rules.
- the apparent sync code pattern is further delineated and verified by confirming that the decode values it yields for subsequences of increasing k continue to match on the known sync code.
- adequate sync distinguishment is achieved when the probability of mistakenly identifying data as sync is deemed to be acceptable. For most applications, this condition can be satisfied while using a moderately sized k for sync verification because of the fast growth of the exponential probability dependence on k.
- Verification of known cyclic sync patterns is further facilitated by the bidirectional (i.e., forward and backward), bit-by-bit verifiability of the logical extensions of such patterns.
- the use of two dimensional lattices of sync glyphs that encode interlocking cyclic sync codes, as described hereinabove, facilitates robust distinguishment of the sync pattern by providing connectivity among linear strings of sync glyph. As shown in FIGS.
- the additional sync verification tools that are provided by the bidirectional and interlocking logical attributes of this class of sync code are especially valuable for reestablishing explicit spatial synchronization for the decoding of glyph code when the sync code pattern is disrupted (i.e., logically broken erroneously) by local damage and/or degradation of the glyph code.
- absolute verification of synchronization may also be achieved on finite area bounded glyph code patterns, such as shown in FIG. 3, by predefining and detecting a geometrically unique subpattern of sync code glyphs for which there is no congruent pattern of glyph centers.
- a sync code pattern can be verified in the image domain, without having to perform any pattern matching at the bit level (i.e., in the digital domain). For example, if the glyph code is written on a rectangular array of glyph centers, a sync code pattern that is written into a predetermined column and row of glyphs to span the array completely (i.e., including the border glyphs, as in FIG. 3) is geometrically identifiable as sync code.
- Such a geometrically identifiable sync code pattern also provides a degree of absolute 2 D addressing, referenced by counting glyphs off this sync pattern, rather than by reference to a boundary feature.
- sync code encoded glyph patterns also can be used to identify and correct ambiguities in glyph codes due to symmetries that exist in the pattern of glyph centers with respect to operations such as image rotations (e.g., 90°, 180°, 270°) and/or image reflections.
- image rotations e.g., 90°, 180°, 270°
- image reflections e.g., image reflections
- slash-like glyphs that are tilted to the left or right at 45° (i.e., ⁇ 45° and -45°, respectively) to encode bit values of "0" or "1,” respectively, might be written in accordance with a spatial formatting rule that maps their centers into a square lattice array.
- a glyph pattern has a four-fold rotational ambiguity.
- a 180° rotation of the glyph code pattern maintains the identities of the individual glyphs because each of the glyphs is transformed into the same, orientationally matched member of the glyph set. In other words, the values encoded in the individual glyphs are preserved. However, this 180° rotation inverts the apparent ordering of linearly aligned glyphs.
- the glyphs still are linearly aligned, and the direction in which they are aligned is unchanged.
- the glyph code pattern includes a linear pattern of sync glyphs, as at 61 in FIG. 10, that is encoded in accordance with an asymmetrical sync code sequence (e.g., a maximal length shift register sequence),testing for the sync code sequence and its reverse resolves the ambiguity.
- an asymmetrical sync code sequence e.g., a maximal length shift register sequence
- 90° or 270° rotations transform each of the two permitted glyphs into the other, thereby interchanging their apparent encoded values.
- the apparent directions of orthogonal lines e.g., rows and columns, or 45° diagonals
- orthogonal lines e.g., rows and columns, or 45° diagonals
- the apparent ordering of a linear pattern of sync code encoded glyphs may be normal (in the event of a 90° rotation) or reversed (in the event of a 270° rotation) with respect to the sync code sequence.
- a test sequence of at least 2 n is employed to avoid inadvertent match to a subsequence that is reversed and/or bit-inverted.
- row and column sync codes suitably are selected to be distinct or to at least provide a different phase shift along the code as referenced from sync line intersections.
- sync code encoded glyph patterns may be used in combination with coarser synchronization information, such as image reference marks or features, to support a dual phase, coarse/fine synchronization process).
- the predefined sync code glyphs In decoding glyph arrays containing glyphs encoding a predefined sync code and variable data glyphs, the predefined sync code glyphs generally are decoded first. For example, in the case of a lattice-like sync code pattern, the decoding can be initiated at any desired location. To locate nearby sync code encode glyphs possible sync subsequences of glyphs are tested in a local region that is large enough to definitely include a section of sync pattern. If there is concern for orientation ambiguity, these possible sync subsequences are evaluated for each of the possible orientations until a satisfactory result is found. When an initial section of the known sync pattern is found, the sync pattern then is extended glyph-by-glyph.
- variable data may read with logical order referenced and confirmed by local sync glyph code.
- the lattice of sync glyph locations may be used to interpolate the expected image positions of variable data glyphs.
- the sync code may be used only after the data code has been transformed into a two dimensional array of decode values.
- the sync code is used in a feed forward mode to reorder and correct the decode values as may be required to compensate for decode errors, such as additions, dropouts and shearing of data.
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Image Processing (AREA)
Abstract
Description
______________________________________ Maximal n=4,L=15, S=111000100110101111000.... Truncated L`=8, S=11100010.111000.... Maximal n=5,L=31, S=0000100101100111110001101110101. Truncated L`=17, S=00001001011001111.00001... (Note, each 5 bit subsequence is unique) ______________________________________
______________________________________ n=2,r=0,L=3,S=011011 (Cautions:symmetric) n=2,r=1,L'=4,S=00110011 (Cautions: bit inversion= reverse of sequence;symmetric) n=2,r=2,L'=5,S=0001100011. n=3,r=0,L'=7,S=00111010011101 n=3,r=1,L'=8,S=0001110100011101 [Caution: bit in- version =sequence reverse] n=3,r=2,L'=9,S=000011101000011101. n=4,r=0,L'=15,S=000111101011001000111101011001 n=4,r=1,L'=16,S=00001111010110010000111101011001 n=4,r=2,L'=17,S=0000011110101100100000111101011001 ______________________________________
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/172,512 US5449896A (en) | 1993-12-22 | 1993-12-22 | Random access techniques for use with self-clocking glyph codes |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/172,512 US5449896A (en) | 1993-12-22 | 1993-12-22 | Random access techniques for use with self-clocking glyph codes |
Publications (1)
Publication Number | Publication Date |
---|---|
US5449896A true US5449896A (en) | 1995-09-12 |
Family
ID=22628018
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/172,512 Expired - Lifetime US5449896A (en) | 1993-12-22 | 1993-12-22 | Random access techniques for use with self-clocking glyph codes |
Country Status (1)
Country | Link |
---|---|
US (1) | US5449896A (en) |
Cited By (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5521372A (en) * | 1993-12-22 | 1996-05-28 | Xerox Corporation | Framing codes for robust synchronization and addressing of self-clocking glyph codes |
EP0849704A2 (en) * | 1996-12-20 | 1998-06-24 | Xerox Corporation | Multi-dimensional address spaces |
US5864127A (en) * | 1996-10-10 | 1999-01-26 | Xerox Corporation | Analog glyph detector and detector arrays |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5901224A (en) * | 1996-10-21 | 1999-05-04 | Xerox Corporation | Quasi-reprographics with variable embedded data with applications to copyright management, and distribution control |
US5910987A (en) | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5912974A (en) * | 1994-04-05 | 1999-06-15 | International Business Machines Corporation | Apparatus and method for authentication of printed documents |
US5920861A (en) | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
US5936228A (en) * | 1994-11-15 | 1999-08-10 | Olympus Optical Co., Ltd. | Dot-code recording method and dot-code recording and reproducing apparatus |
US5939703A (en) * | 1995-01-03 | 1999-08-17 | Xerox Corporation | Distributed dimensional labeling for dimensional characterization of embedded data blocks |
US5943422A (en) | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
WO1999050787A1 (en) * | 1998-04-01 | 1999-10-07 | Xerox Corporation | Cross-network functions via linked hardcopy and electronic documents |
US6000621A (en) * | 1995-12-21 | 1999-12-14 | Xerox Corporation | Tilings of mono-code and dual-code embedded data pattern strips for robust asynchronous capture |
US6112181A (en) | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US6116507A (en) * | 1994-12-16 | 2000-09-12 | Olympus Optical Co., Ltd. | Information reproduction system for reproducing multimedia information recorded in the form of an optically readable dot code pattern wherein the optical readable dot code comprises address dots |
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US6296192B1 (en) * | 1999-12-16 | 2001-10-02 | Xerox Corporation | Machine-readable record with a two-dimensional lattice of synchronization code interleaved with data code |
US6340118B1 (en) | 1999-12-16 | 2002-01-22 | Xerox Corporation | Exclusive or cross-coupled framing codes for self-clocking glyphs |
US6341730B1 (en) | 1999-09-22 | 2002-01-29 | Xerox Corporation | Method of encoding embedded data blocks containing occlusions |
US20020084335A1 (en) * | 2000-03-21 | 2002-07-04 | Petter Ericson | Apparatus and methods relating to image coding |
US20020091711A1 (en) * | 1999-08-30 | 2002-07-11 | Petter Ericson | Centralized information management |
US6419162B1 (en) | 1999-09-22 | 2002-07-16 | Xerox Corporation | Maximizing data capacity for embedded data blocks with occlusions therein |
US6542620B1 (en) | 1993-11-18 | 2003-04-01 | Digimarc Corporation | Signal processing to hide plural-bit information in image, video, and audio data |
US20030090745A1 (en) * | 1999-05-25 | 2003-05-15 | Silverbrook Kia | Relay device for use with coded marks |
US20030094492A1 (en) * | 1999-05-25 | 2003-05-22 | Silverbrook Kia | Identity-coded surface with coded marks |
US20030117652A1 (en) * | 1999-09-17 | 2003-06-26 | Paul Lapstun | Rotationally symmetric tags |
US6587821B1 (en) | 1993-11-18 | 2003-07-01 | Digimarc Corp | Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith |
US6658568B1 (en) | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US20030225700A1 (en) * | 2002-03-14 | 2003-12-04 | Guillermo Lao | System and method for graphical rights expressions |
US20030229593A1 (en) * | 2002-03-14 | 2003-12-11 | Michael Raley | Rights expression profile system and method |
US20040000585A1 (en) * | 1999-09-17 | 2004-01-01 | Kia Silverbrook | Methods and systems for object identification and interaction |
US6714677B1 (en) * | 1999-12-17 | 2004-03-30 | Xerox Corporation | Use of correlation histograms for improved glyph decoding |
US20040079807A1 (en) * | 2002-10-25 | 2004-04-29 | Paul Lapstun | Orientation-indicating cyclic position codes |
US6732927B2 (en) * | 2001-06-26 | 2004-05-11 | Anoto Ab | Method and device for data decoding |
US6754377B2 (en) | 1995-05-08 | 2004-06-22 | Digimarc Corporation | Methods and systems for marking printed documents |
US6752317B2 (en) | 1998-04-01 | 2004-06-22 | Xerox Corporation | Marking medium area with encoded identifier for producing action through network |
US20040190092A1 (en) * | 1999-09-17 | 2004-09-30 | Kia Silverbrook | Scanning device for coded data |
US6814289B2 (en) * | 2001-05-30 | 2004-11-09 | Sandia Corporation | Self-registering spread-spectrum barcode method |
US20040243806A1 (en) * | 2001-04-30 | 2004-12-02 | Mckinley Tyler J. | Digital watermarking security systems |
US20040262405A1 (en) * | 2002-10-25 | 2004-12-30 | Silverbrook Research Pty Ltd | Orientation-inidicating machine readable coded data |
US6938021B2 (en) | 1997-11-06 | 2005-08-30 | Intertrust Technologies Corporation | Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US6948070B1 (en) | 1995-02-13 | 2005-09-20 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US6987862B2 (en) | 1993-11-18 | 2006-01-17 | Digimarc Corporation | Video steganography |
US6993655B1 (en) * | 1999-12-20 | 2006-01-31 | Xerox Corporation | Record and related method for storing encoded information using overt code characteristics to identify covert code characteristics |
US7062500B1 (en) | 1997-02-25 | 2006-06-13 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
US7069451B1 (en) | 1995-02-13 | 2006-06-27 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US20060146069A1 (en) * | 2002-12-03 | 2006-07-06 | Silerbrook Research Pty Ltd | Rotationally symmetric tags |
US7095854B1 (en) | 1995-02-13 | 2006-08-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7124302B2 (en) | 1995-02-13 | 2006-10-17 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US20060239505A1 (en) * | 2003-04-29 | 2006-10-26 | Andreas Bjorklund | Methods, apparatus, computer program and storage medium for position decoding |
US20060244985A1 (en) * | 2003-05-26 | 2006-11-02 | Faahraeus Christer | Method for compressing a digital, representation containing a page-describing code, which is sent from a computer to a printer |
US7133845B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | System and methods for secure transaction management and electronic rights protection |
US7133846B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
US20060259983A1 (en) * | 2005-05-13 | 2006-11-16 | Xerox Corporation | System and method for controlling reproduction of documents containing sensitive information |
US20060261175A1 (en) * | 2005-05-06 | 2006-11-23 | Secure Edge S.R.L. | High-density two-dimensional graphic code, and coding system and decoding system based on said code |
US7143290B1 (en) | 1995-02-13 | 2006-11-28 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US20060278724A1 (en) * | 2005-06-08 | 2006-12-14 | Xerox Corporation | System and method for placement and retrieval of embedded information within a document |
US7165174B1 (en) | 1995-02-13 | 2007-01-16 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US7233948B1 (en) | 1998-03-16 | 2007-06-19 | Intertrust Technologies Corp. | Methods and apparatus for persistent control and protection of content |
US7243236B1 (en) | 1999-07-29 | 2007-07-10 | Intertrust Technologies Corp. | Systems and methods for using cryptography to protect secure and insecure computing environments |
US20070217493A1 (en) * | 1993-11-18 | 2007-09-20 | Rhoads Geoffrey B | Authentication of Identification Documents |
US20080130945A1 (en) * | 1995-05-08 | 2008-06-05 | Rhoads Geoffrey B | Secure Documents With Hidden Signals, and Related Methods and Systems |
US20080216149A1 (en) * | 1995-05-08 | 2008-09-04 | Rhoads Geoffrey B | Digital Authentication with Analog Documents |
US7430670B1 (en) | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
US20090014515A1 (en) * | 1999-09-17 | 2009-01-15 | Silverbrook Research Pty Ltd | Method of facilitating interaction between user and packaged product |
US20090045250A1 (en) * | 1999-09-17 | 2009-02-19 | Silverbrook Research Pty Ltd | Method of recording mail transactions |
US20090262569A1 (en) * | 2007-10-17 | 2009-10-22 | Naoharu Shinozaki | Semiconductor memory device with stacked memory cell structure |
US7697719B2 (en) | 1993-11-18 | 2010-04-13 | Digimarc Corporation | Methods for analyzing electronic media including video and audio |
US7753283B2 (en) | 2003-06-13 | 2010-07-13 | Anoto Aktiebolag (Anoto Ab) | On-demand printing of coding patterns |
US20100188710A1 (en) * | 2009-01-26 | 2010-07-29 | Xerox Corporation | Font-input based recognition engine for pattern fonts |
US20110049244A1 (en) * | 2009-08-27 | 2011-03-03 | Fuji Xerox Co., Ltd. | Two-dimensional code generating apparatus, image forming system, two-dimensional code reading apparatus, and computer readable medium |
US7958359B2 (en) | 2001-04-30 | 2011-06-07 | Digimarc Corporation | Access control systems |
US7991153B1 (en) | 2008-08-26 | 2011-08-02 | Nanoglyph, LLC | Glyph encryption system and related methods |
US20110192894A1 (en) * | 2010-02-09 | 2011-08-11 | Xerox Corporation | Method for one-step document categorization and separation |
US8162220B2 (en) | 1999-10-01 | 2012-04-24 | Anoto Ab | Product provided with a coding pattern and apparatus and method for reading the pattern |
US8430315B2 (en) | 2010-06-29 | 2013-04-30 | SignaKey LLC | Data encoding and decoding |
US8510226B2 (en) | 1996-02-26 | 2013-08-13 | Graphon Corporation | Method for synchronous encryption between a client and a licensing agent |
US9304605B2 (en) | 1999-12-23 | 2016-04-05 | Anoto Ab | General information management system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5091966A (en) * | 1990-07-31 | 1992-02-25 | Xerox Corporation | Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes |
US5128525A (en) * | 1990-07-31 | 1992-07-07 | Xerox Corporation | Convolution filtering for decoding self-clocking glyph shape codes |
US5221833A (en) * | 1991-12-27 | 1993-06-22 | Xerox Corporation | Methods and means for reducing bit error rates in reading self-clocking glyph codes |
US5245165A (en) * | 1991-12-27 | 1993-09-14 | Xerox Corporation | Self-clocking glyph code for encoding dual bit digital values robustly |
-
1993
- 1993-12-22 US US08/172,512 patent/US5449896A/en not_active Expired - Lifetime
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5091966A (en) * | 1990-07-31 | 1992-02-25 | Xerox Corporation | Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes |
US5128525A (en) * | 1990-07-31 | 1992-07-07 | Xerox Corporation | Convolution filtering for decoding self-clocking glyph shape codes |
US5221833A (en) * | 1991-12-27 | 1993-06-22 | Xerox Corporation | Methods and means for reducing bit error rates in reading self-clocking glyph codes |
US5245165A (en) * | 1991-12-27 | 1993-09-14 | Xerox Corporation | Self-clocking glyph code for encoding dual bit digital values robustly |
Cited By (192)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7697719B2 (en) | 1993-11-18 | 2010-04-13 | Digimarc Corporation | Methods for analyzing electronic media including video and audio |
US7003132B2 (en) | 1993-11-18 | 2006-02-21 | Digimarc Corporation | Embedding hidden auxiliary code signals in media |
US6987862B2 (en) | 1993-11-18 | 2006-01-17 | Digimarc Corporation | Video steganography |
US6542620B1 (en) | 1993-11-18 | 2003-04-01 | Digimarc Corporation | Signal processing to hide plural-bit information in image, video, and audio data |
US20070217493A1 (en) * | 1993-11-18 | 2007-09-20 | Rhoads Geoffrey B | Authentication of Identification Documents |
US7330563B2 (en) | 1993-11-18 | 2008-02-12 | Digimarc Corporation | Documents, articles and authentication of documents and articles |
US6587821B1 (en) | 1993-11-18 | 2003-07-01 | Digimarc Corp | Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith |
US7349555B2 (en) | 1993-11-18 | 2008-03-25 | Digimarc Corporation | Documents and apparatus to encode documents |
US5521372A (en) * | 1993-12-22 | 1996-05-28 | Xerox Corporation | Framing codes for robust synchronization and addressing of self-clocking glyph codes |
US5912974A (en) * | 1994-04-05 | 1999-06-15 | International Business Machines Corporation | Apparatus and method for authentication of printed documents |
US5936228A (en) * | 1994-11-15 | 1999-08-10 | Olympus Optical Co., Ltd. | Dot-code recording method and dot-code recording and reproducing apparatus |
US6116507A (en) * | 1994-12-16 | 2000-09-12 | Olympus Optical Co., Ltd. | Information reproduction system for reproducing multimedia information recorded in the form of an optically readable dot code pattern wherein the optical readable dot code comprises address dots |
US6131807A (en) * | 1994-12-16 | 2000-10-17 | Olympus Optical Co., Ltd. | Information recording medium and information reproduction system |
US5939703A (en) * | 1995-01-03 | 1999-08-17 | Xerox Corporation | Distributed dimensional labeling for dimensional characterization of embedded data blocks |
US6427140B1 (en) | 1995-02-13 | 2002-07-30 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7143290B1 (en) | 1995-02-13 | 2006-11-28 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US7051212B2 (en) | 1995-02-13 | 2006-05-23 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US8543842B2 (en) | 1995-02-13 | 2013-09-24 | Intertrust Technologies Corporation | System and methods for secure transaction management and electronics rights protection |
US8751793B2 (en) | 1995-02-13 | 2014-06-10 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US5949876A (en) * | 1995-02-13 | 1999-09-07 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US7069451B1 (en) | 1995-02-13 | 2006-06-27 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7076652B2 (en) | 1995-02-13 | 2006-07-11 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US6185683B1 (en) | 1995-02-13 | 2001-02-06 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
US6237786B1 (en) | 1995-02-13 | 2001-05-29 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7095854B1 (en) | 1995-02-13 | 2006-08-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6253193B1 (en) | 1995-02-13 | 2001-06-26 | Intertrust Technologies Corporation | Systems and methods for the secure transaction management and electronic rights protection |
US7100199B2 (en) | 1995-02-13 | 2006-08-29 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7120800B2 (en) | 1995-02-13 | 2006-10-10 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6948070B1 (en) | 1995-02-13 | 2005-09-20 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US7124302B2 (en) | 1995-02-13 | 2006-10-17 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6363488B1 (en) | 1995-02-13 | 2002-03-26 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6389402B1 (en) | 1995-02-13 | 2002-05-14 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7133845B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | System and methods for secure transaction management and electronic rights protection |
US8185473B2 (en) | 1995-02-13 | 2012-05-22 | Intertrust Technologies Corporation | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management |
US7133846B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
US5982891A (en) | 1995-02-13 | 1999-11-09 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7165174B1 (en) | 1995-02-13 | 2007-01-16 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US7281133B2 (en) | 1995-02-13 | 2007-10-09 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
US5910987A (en) | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7917749B2 (en) | 1995-02-13 | 2011-03-29 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US5915019A (en) | 1995-02-13 | 1999-06-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7844835B2 (en) | 1995-02-13 | 2010-11-30 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US7392395B2 (en) | 1995-02-13 | 2008-06-24 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
US7415617B2 (en) | 1995-02-13 | 2008-08-19 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management |
US6658568B1 (en) | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US5917912A (en) | 1995-02-13 | 1999-06-29 | Intertrust Technologies Corporation | System and methods for secure transaction management and electronic rights protection |
US8411898B2 (en) | 1995-05-08 | 2013-04-02 | Digimarc Corporation | Digital authentication with analog documents |
US7724920B2 (en) | 1995-05-08 | 2010-05-25 | Digimarc Corporation | Digital authentication with analog documents |
US20100163629A1 (en) * | 1995-05-08 | 2010-07-01 | Rhoads Geoffrey B | Security Document Carrying Machine Readable Pattern |
US7555139B2 (en) | 1995-05-08 | 2009-06-30 | Digimarc Corporation | Secure documents with hidden signals, and related methods and systems |
US20080216149A1 (en) * | 1995-05-08 | 2008-09-04 | Rhoads Geoffrey B | Digital Authentication with Analog Documents |
US6754377B2 (en) | 1995-05-08 | 2004-06-22 | Digimarc Corporation | Methods and systems for marking printed documents |
US20100128924A1 (en) * | 1995-05-08 | 2010-05-27 | Rhoads Geoffrey B | Authentication of Identification Documents |
US20080130945A1 (en) * | 1995-05-08 | 2008-06-05 | Rhoads Geoffrey B | Secure Documents With Hidden Signals, and Related Methods and Systems |
US8009893B2 (en) | 1995-05-08 | 2011-08-30 | Digimarc Corporation | Security document carrying machine readable pattern |
US6000621A (en) * | 1995-12-21 | 1999-12-14 | Xerox Corporation | Tilings of mono-code and dual-code embedded data pattern strips for robust asynchronous capture |
US8510226B2 (en) | 1996-02-26 | 2013-08-13 | Graphon Corporation | Method for synchronous encryption between a client and a licensing agent |
US8307212B2 (en) | 1996-08-12 | 2012-11-06 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6618484B2 (en) | 1996-08-12 | 2003-09-09 | Intertrust Technologies Corporation | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6240185B1 (en) | 1996-08-12 | 2001-05-29 | Intertrust Technologies Corporation | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US6292569B1 (en) | 1996-08-12 | 2001-09-18 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US6449367B2 (en) | 1996-08-12 | 2002-09-10 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US7925898B2 (en) | 1996-08-12 | 2011-04-12 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US7120802B2 (en) | 1996-08-12 | 2006-10-10 | Intertrust Technologies Corp. | Systems and methods for using cryptography to protect secure computing environments |
US5943422A (en) | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US8533851B2 (en) | 1996-08-30 | 2013-09-10 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5864127A (en) * | 1996-10-10 | 1999-01-26 | Xerox Corporation | Analog glyph detector and detector arrays |
US5901224A (en) * | 1996-10-21 | 1999-05-04 | Xerox Corporation | Quasi-reprographics with variable embedded data with applications to copyright management, and distribution control |
EP0849704A3 (en) * | 1996-12-20 | 2003-06-25 | Xerox Corporation | Multi-dimensional address spaces |
EP0849704A2 (en) * | 1996-12-20 | 1998-06-24 | Xerox Corporation | Multi-dimensional address spaces |
US5920861A (en) | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
US6138119A (en) | 1997-02-25 | 2000-10-24 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
US7062500B1 (en) | 1997-02-25 | 2006-06-13 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
US7143066B2 (en) | 1997-11-06 | 2006-11-28 | Intertrust Technologies Corp. | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US7110983B2 (en) | 1997-11-06 | 2006-09-19 | Intertrust Technologies Corporation | Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US6938021B2 (en) | 1997-11-06 | 2005-08-30 | Intertrust Technologies Corporation | Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US6112181A (en) | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US7092914B1 (en) | 1997-11-06 | 2006-08-15 | Intertrust Technologies Corporation | Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US7233948B1 (en) | 1998-03-16 | 2007-06-19 | Intertrust Technologies Corp. | Methods and apparatus for persistent control and protection of content |
US6752317B2 (en) | 1998-04-01 | 2004-06-22 | Xerox Corporation | Marking medium area with encoded identifier for producing action through network |
WO1999050787A1 (en) * | 1998-04-01 | 1999-10-07 | Xerox Corporation | Cross-network functions via linked hardcopy and electronic documents |
US7793852B2 (en) * | 1999-05-25 | 2010-09-14 | Silverbrook Research Pty Ltd | Identity-coded surface with coded marks |
US6977746B2 (en) * | 1999-05-25 | 2005-12-20 | Silverbrook Research Pty Ltd | Relay device for use with coded marks |
US20030094492A1 (en) * | 1999-05-25 | 2003-05-22 | Silverbrook Kia | Identity-coded surface with coded marks |
US20030090745A1 (en) * | 1999-05-25 | 2003-05-15 | Silverbrook Kia | Relay device for use with coded marks |
US7284701B2 (en) | 1999-05-25 | 2007-10-23 | Silverbrook Research Pty Ltd | System for browsing a computer network |
US6830196B1 (en) * | 1999-05-25 | 2004-12-14 | Silverbrook Research Pty Ltd | Identity-coded surface region |
US20050071313A1 (en) * | 1999-05-25 | 2005-03-31 | Kia Silverbrook | System for browsing a computer network |
US7430670B1 (en) | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
US7243236B1 (en) | 1999-07-29 | 2007-07-10 | Intertrust Technologies Corp. | Systems and methods for using cryptography to protect secure and insecure computing environments |
US20020091711A1 (en) * | 1999-08-30 | 2002-07-11 | Petter Ericson | Centralized information management |
US7710408B2 (en) * | 1999-08-30 | 2010-05-04 | Anoto Ab | Centralized information management based upon position information |
US7941010B2 (en) | 1999-09-17 | 2011-05-10 | Silverbrook Research Pty Ltd | System for generating interface surface |
US7128270B2 (en) | 1999-09-17 | 2006-10-31 | Silverbrook Research Pty Ltd | Scanning device for coded data |
US7740167B2 (en) | 1999-09-17 | 2010-06-22 | Silverbrook Research Pty Ltd | Method of recording transaction relating to packaged product |
US20090014513A1 (en) * | 1999-09-17 | 2009-01-15 | Silverbrook Research Pty Ltd | Method of recording transaction relating to packaged product |
US20040000585A1 (en) * | 1999-09-17 | 2004-01-01 | Kia Silverbrook | Methods and systems for object identification and interaction |
US20090014515A1 (en) * | 1999-09-17 | 2009-01-15 | Silverbrook Research Pty Ltd | Method of facilitating interaction between user and packaged product |
US20110176178A1 (en) * | 1999-09-17 | 2011-07-21 | Silverbrook Research Pty Ltd | System for generating printed interface surface |
US7715662B2 (en) | 1999-09-17 | 2010-05-11 | Silverbrook Research Pty Ltd | Method of generating interface surface having rotationally symmetric coded data |
US20060214013A1 (en) * | 1999-09-17 | 2006-09-28 | Silverbrook Research Pty Ltd | Rotationally symmetric coded data |
US7225979B2 (en) | 1999-09-17 | 2007-06-05 | Silverbrook Research Pty Ltd | Methods and systems for object identification and interaction |
US20050254106A9 (en) * | 1999-09-17 | 2005-11-17 | Kia Silverbrook | Scanning device for coded data |
US20070145128A1 (en) * | 1999-09-17 | 2007-06-28 | Silverbrook Research Pty Ltd | Method and system for interacting with a product item |
US7542629B2 (en) | 1999-09-17 | 2009-06-02 | Silverbrook Research Pty Ltd | Active sensing device configured to capture and decode infrared (IR) position tags from a page |
US7748624B2 (en) | 1999-09-17 | 2010-07-06 | Silverbrook Research Pty Ltd | Print engine controller for a pagewidth printer with a four-stage print pipeline |
US7753257B2 (en) | 1999-09-17 | 2010-07-13 | Silverbrook Research Pty Ltd | Method of facilitating interaction between user and packaged product |
US20030117652A1 (en) * | 1999-09-17 | 2003-06-26 | Paul Lapstun | Rotationally symmetric tags |
US20100214621A1 (en) * | 1999-09-17 | 2010-08-26 | Silverbrook Research Pty Ltd | System for generating interface surface |
US20090045250A1 (en) * | 1999-09-17 | 2009-02-19 | Silverbrook Research Pty Ltd | Method of recording mail transactions |
US7108192B2 (en) * | 1999-09-17 | 2006-09-19 | Silverbrook Research Pty Ltd | Rotationally symmetric tags |
US7334739B2 (en) | 1999-09-17 | 2008-02-26 | Silverbrook Research Pty Ltd | Rotationally symmetric coded data |
US20040190092A1 (en) * | 1999-09-17 | 2004-09-30 | Kia Silverbrook | Scanning device for coded data |
US20090212118A1 (en) * | 1999-09-17 | 2009-08-27 | Silverbrook Research Pty Ltd | Method Of Generating Interface Surface Having Rotationally Symmetric Coded Data |
US20080110988A1 (en) * | 1999-09-17 | 2008-05-15 | Silverbrook Research Pty Ltd | Active Sensing Device Configured To Capture And Decode Infrared (IR) Position Tags From A Page |
US7380712B2 (en) | 1999-09-17 | 2008-06-03 | Silverbrook Research Pty Ltd | Method and system for interacting with a product item |
US8136720B2 (en) | 1999-09-17 | 2012-03-20 | Silverbrook Research Pty Ltd | Method of recording mail transactions |
US6419162B1 (en) | 1999-09-22 | 2002-07-16 | Xerox Corporation | Maximizing data capacity for embedded data blocks with occlusions therein |
US6341730B1 (en) | 1999-09-22 | 2002-01-29 | Xerox Corporation | Method of encoding embedded data blocks containing occlusions |
US8162220B2 (en) | 1999-10-01 | 2012-04-24 | Anoto Ab | Product provided with a coding pattern and apparatus and method for reading the pattern |
US8534566B2 (en) | 1999-10-01 | 2013-09-17 | Anoto Ab | Product provided with a coding pattern and apparatus and method for reading the pattern |
US6340118B1 (en) | 1999-12-16 | 2002-01-22 | Xerox Corporation | Exclusive or cross-coupled framing codes for self-clocking glyphs |
US6296192B1 (en) * | 1999-12-16 | 2001-10-02 | Xerox Corporation | Machine-readable record with a two-dimensional lattice of synchronization code interleaved with data code |
US6714677B1 (en) * | 1999-12-17 | 2004-03-30 | Xerox Corporation | Use of correlation histograms for improved glyph decoding |
US6993655B1 (en) * | 1999-12-20 | 2006-01-31 | Xerox Corporation | Record and related method for storing encoded information using overt code characteristics to identify covert code characteristics |
US9304605B2 (en) | 1999-12-23 | 2016-04-05 | Anoto Ab | General information management system |
US20020084335A1 (en) * | 2000-03-21 | 2002-07-04 | Petter Ericson | Apparatus and methods relating to image coding |
US20070075151A1 (en) * | 2000-03-21 | 2007-04-05 | Petter Ericson | Apparatus and methods relating to image coding |
US7143952B2 (en) * | 2000-03-21 | 2006-12-05 | Anoto Ab | Apparatus and methods relating to image coding |
US7422154B2 (en) | 2000-03-21 | 2008-09-09 | Anoto Ab | Apparatus and methods relating to image coding |
US20040243806A1 (en) * | 2001-04-30 | 2004-12-02 | Mckinley Tyler J. | Digital watermarking security systems |
US7958359B2 (en) | 2001-04-30 | 2011-06-07 | Digimarc Corporation | Access control systems |
US7502937B2 (en) | 2001-04-30 | 2009-03-10 | Digimarc Corporation | Digital watermarking security systems |
US8316239B2 (en) | 2001-04-30 | 2012-11-20 | Digimarc Corporation | Decoding information to allow access to computerized systems |
US6814289B2 (en) * | 2001-05-30 | 2004-11-09 | Sandia Corporation | Self-registering spread-spectrum barcode method |
US6732927B2 (en) * | 2001-06-26 | 2004-05-11 | Anoto Ab | Method and device for data decoding |
US7195166B2 (en) | 2001-06-26 | 2007-03-27 | Anoto Ab | Method and device for data decoding |
US20040188526A1 (en) * | 2001-06-26 | 2004-09-30 | Anoto Ab | Method and device for data decoding |
US8108313B2 (en) | 2002-03-14 | 2012-01-31 | Contentguard Holdings, Inc. | Rights expression profile system and method using templates |
US20030225700A1 (en) * | 2002-03-14 | 2003-12-04 | Guillermo Lao | System and method for graphical rights expressions |
US7359884B2 (en) | 2002-03-14 | 2008-04-15 | Contentguard Holdings, Inc. | Method and apparatus for processing usage rights expressions |
US20040019546A1 (en) * | 2002-03-14 | 2004-01-29 | Contentguard Holdings, Inc. | Method and apparatus for processing usage rights expressions |
US20030229593A1 (en) * | 2002-03-14 | 2003-12-11 | Michael Raley | Rights expression profile system and method |
US9626668B2 (en) | 2002-03-14 | 2017-04-18 | Contentgaurd Holdings, Inc. | Rights expression profile system and method using templates |
US7380727B2 (en) | 2002-10-25 | 2008-06-03 | Silverbrook Research Pty Ltd | Method of generating interface surface |
US20080317384A1 (en) * | 2002-10-25 | 2008-12-25 | Silverbrook Research Pty Ltd | Process for tag imaging and decoding of machine readable coded data |
US7677463B2 (en) | 2002-10-25 | 2010-03-16 | Silverbrook Research Pty Ltd | Process for tag imaging and decoding of machine readable coded data |
US20040262405A1 (en) * | 2002-10-25 | 2004-12-30 | Silverbrook Research Pty Ltd | Orientation-inidicating machine readable coded data |
US7017826B2 (en) | 2002-10-25 | 2006-03-28 | Silverbrook Research Pty Ltd | Machine readable coded data with target features |
US20040262406A1 (en) * | 2002-10-25 | 2004-12-30 | Silverbrook Research Pty Ltd | Machine readable coded data with target features |
US8424774B2 (en) | 2002-10-25 | 2013-04-23 | Silverbrook Research Pty Ltd | Process for decoding coded data |
US6929186B2 (en) | 2002-10-25 | 2005-08-16 | Silverbrook Research Pty Ltd | Orientation-indicating machine readable coded data |
US7264173B2 (en) | 2002-10-25 | 2007-09-04 | Silverbrook Research Pty Ltd | Orientation-indicating cyclic position codes |
US20070210176A1 (en) * | 2002-10-25 | 2007-09-13 | Silverbrook Research Pty Ltd | Method of generating interface surface |
US7014123B2 (en) | 2002-10-25 | 2006-03-21 | Silverbrook Research Pty Ltd | Machine readable coded data with distributed encoding |
US8100340B2 (en) | 2002-10-25 | 2012-01-24 | Silverbrook Research Pty Ltd | Process for decoding machine readable coded data |
US20100155488A1 (en) * | 2002-10-25 | 2010-06-24 | Silverbrook Research Pty Ltd | Process for tag imaging and decoding of machine readable coded data |
US7900848B2 (en) | 2002-10-25 | 2011-03-08 | Silverbrook Research Pty Ltd | Process for tag imaging and decoding of machine readable coded data |
US20040079807A1 (en) * | 2002-10-25 | 2004-04-29 | Paul Lapstun | Orientation-indicating cyclic position codes |
US7918404B2 (en) * | 2002-10-25 | 2011-04-05 | Silverbrook Research Pty Ltd | Orientation-indicating cyclic position codes |
US6994264B2 (en) | 2002-10-25 | 2006-02-07 | Silverbrook Research Pty Ltd | Information indicating machine readable coded data |
US20060118643A1 (en) * | 2002-10-25 | 2006-06-08 | Silverbrook Research Pty. Ltd | Orientation-indicating cyclic position codes |
US20110127329A1 (en) * | 2002-10-25 | 2011-06-02 | Silverbrook Research Pty Ltd | Process for decoding machine readable coded data |
US20050001042A1 (en) * | 2002-10-25 | 2005-01-06 | Silverbrook Research Pty Ltd | Information indicating machine readable coded data |
US7984858B2 (en) | 2002-12-03 | 2011-07-26 | Silverbrook Research Pty Ltd | Coded data pattern having redundantly-encoded orientation |
US7549595B2 (en) * | 2002-12-03 | 2009-06-23 | Silverbrook Research Pty Ltd | Rotationally symmetric tags |
US20060146069A1 (en) * | 2002-12-03 | 2006-07-06 | Silerbrook Research Pty Ltd | Rotationally symmetric tags |
US20090236427A1 (en) * | 2002-12-03 | 2009-09-24 | Silverbrook Research Pty Ltd | Coded data pattern having redundantly-encoded orientation |
US8215566B2 (en) | 2002-12-03 | 2012-07-10 | Silverbrook Research Pty Ltd | System for imaging and decoding coded data pattern using redundantly-encoded orientation |
US20060239505A1 (en) * | 2003-04-29 | 2006-10-26 | Andreas Bjorklund | Methods, apparatus, computer program and storage medium for position decoding |
US7672513B2 (en) | 2003-04-29 | 2010-03-02 | Anoto Ab | Methods, apparatus, computer program and storage medium for position decoding |
US20060244985A1 (en) * | 2003-05-26 | 2006-11-02 | Faahraeus Christer | Method for compressing a digital, representation containing a page-describing code, which is sent from a computer to a printer |
US7751089B2 (en) | 2003-05-26 | 2010-07-06 | Anoto Ab | Method for compressing a digital representation containing a page-describing code, which is sent from a computer to a printer |
US7753283B2 (en) | 2003-06-13 | 2010-07-13 | Anoto Aktiebolag (Anoto Ab) | On-demand printing of coding patterns |
US20060261175A1 (en) * | 2005-05-06 | 2006-11-23 | Secure Edge S.R.L. | High-density two-dimensional graphic code, and coding system and decoding system based on said code |
US7546958B2 (en) * | 2005-05-06 | 2009-06-16 | Secure Edge S.R.L. | High-density two-dimensional graphic code, and coding system and decoding system based on said code |
US8181261B2 (en) | 2005-05-13 | 2012-05-15 | Xerox Corporation | System and method for controlling reproduction of documents containing sensitive information |
US20060259983A1 (en) * | 2005-05-13 | 2006-11-16 | Xerox Corporation | System and method for controlling reproduction of documents containing sensitive information |
US7481374B2 (en) | 2005-06-08 | 2009-01-27 | Xerox Corporation | System and method for placement and retrieval of embedded information within a document |
US20060278724A1 (en) * | 2005-06-08 | 2006-12-14 | Xerox Corporation | System and method for placement and retrieval of embedded information within a document |
US20090262569A1 (en) * | 2007-10-17 | 2009-10-22 | Naoharu Shinozaki | Semiconductor memory device with stacked memory cell structure |
US7991153B1 (en) | 2008-08-26 | 2011-08-02 | Nanoglyph, LLC | Glyph encryption system and related methods |
US20100188710A1 (en) * | 2009-01-26 | 2010-07-29 | Xerox Corporation | Font-input based recognition engine for pattern fonts |
EP2222072A2 (en) | 2009-01-26 | 2010-08-25 | Xerox Corporation | Font-input based recognition engine for pattern fonts |
EP2222072A3 (en) * | 2009-01-26 | 2010-10-13 | Xerox Corporation | Font-input based recognition engine for pattern fonts |
US20110049244A1 (en) * | 2009-08-27 | 2011-03-03 | Fuji Xerox Co., Ltd. | Two-dimensional code generating apparatus, image forming system, two-dimensional code reading apparatus, and computer readable medium |
US8459565B2 (en) * | 2009-08-27 | 2013-06-11 | Fuji Xerox Co., Ltd. | Two-dimensional code generating apparatus, image forming system, two-dimensional code reading apparatus, and computer readable medium |
US8453922B2 (en) | 2010-02-09 | 2013-06-04 | Xerox Corporation | Method for one-step document categorization and separation using stamped machine recognizable patterns |
US20110192894A1 (en) * | 2010-02-09 | 2011-08-11 | Xerox Corporation | Method for one-step document categorization and separation |
US8430315B2 (en) | 2010-06-29 | 2013-04-30 | SignaKey LLC | Data encoding and decoding |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5449896A (en) | Random access techniques for use with self-clocking glyph codes | |
US5449895A (en) | Explicit synchronization for self-clocking glyph codes | |
US5521372A (en) | Framing codes for robust synchronization and addressing of self-clocking glyph codes | |
US5453605A (en) | Global addressability for self-clocking glyph codes | |
US6182901B1 (en) | Orientational disambiguation for self-clocking glyph codes | |
US6000621A (en) | Tilings of mono-code and dual-code embedded data pattern strips for robust asynchronous capture | |
US5717197A (en) | Tiled embedded data block-types for generic embedded data block systems | |
US5937110A (en) | Parallel propagating embedded binary sequences for characterizing objects in N-dimensional address space | |
US5694102A (en) | Vector reconstruction of asynchronously captured tiled embedded data blocks | |
CA2502483C (en) | Orientation-indicating cyclic position codes | |
US7175088B2 (en) | Two-dimensional code having superior decoding property which is possible to control the level of error correcting codes, and method for encoding and decoding the same | |
US5611575A (en) | Distributed state flags or other unordered information for embedded data blocks | |
US5825933A (en) | Parallel propagating embedded binary sequence for parameterizing two dimensional image domain code patterns in two dimensional address space | |
US7380727B2 (en) | Method of generating interface surface | |
EP0849704B1 (en) | Multi-dimensional address spaces | |
US6641051B1 (en) | System for embedded digital data that allows embedding of data around known obstructions | |
US6341730B1 (en) | Method of encoding embedded data blocks containing occlusions | |
US20060289661A1 (en) | Bi-directional readable two-dimensional bar code system and its reading method | |
US5778011A (en) | Method and apparatus for writing and protecting against random and cluster errors in image blocks | |
EP0780790A2 (en) | Tiled embedded data blocks | |
US5870510A (en) | Parallel propagating embedded binary sequences for parameterizing two dimensional image domain code patterns in N-dimensional address space | |
JPH09214733A (en) | Picture capture mechanism | |
JPH08235333A (en) | Buried data block |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: XEROX CORPORATION, CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HECHT, DAVID L.;FLORES, L. NOAH;PETRIE, GLEN W.;AND OTHERS;REEL/FRAME:006835/0608 Effective date: 19931222 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: BANK ONE, NA, AS ADMINISTRATIVE AGENT, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:013153/0001 Effective date: 20020621 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, AS COLLATERAL AGENT, TEXAS Free format text: SECURITY AGREEMENT;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:015134/0476 Effective date: 20030625 Owner name: JPMORGAN CHASE BANK, AS COLLATERAL AGENT,TEXAS Free format text: SECURITY AGREEMENT;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:015134/0476 Effective date: 20030625 |
|
FPAY | Fee payment |
Year of fee payment: 12 |
|
AS | Assignment |
Owner name: XEROX CORPORATION, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. AS SUCCESSOR-IN-INTEREST ADMINISTRATIVE AGENT AND COLLATERAL AGENT TO JPMORGAN CHASE BANK;REEL/FRAME:066728/0193 Effective date: 20220822 |