It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Centrist
....the image that appeared on the screen with selectable objects was actually stored IN the word program -- the "WORD program" may not have been "Microsoft Word". That program may have just have the function of authenticating the user (by the scan) and then displaying a predetermined image in with selectable elements. All the scanning and testing with other programs will never yield the same result.
WJ
Maybe this is not clear to you. Let me try to clear it up.
Originally posted by Jedi_Master
Well Centrist...if I follow you, you're hypothesising that the JPEG image has encrypted info into the shapes or image itself, and the program decrypts the image after it is scanned, and then authenticates the user?
Originally posted by Centrist
JM -- I agree it's far fetched, but let me clarify. No, I don't think there's "hidden" data in the jpeg -- just certain metrics that allows the scanner program (the word program) to identify whether the "key" image is present on the scanner. If it is, then the "word program" creates an image on the screen. The image shown on the screen is not derived from image data from the scanner (I think) -- the image on the screen was stored within the "word program" itself... Bill didn't say how big the "word program" was, did he? that might give a clue, but it's hard to say.
Originally posted by Benevolent Heretic
Rabbit and Centrist, You guys are really smart! Just wanted to get that out.
No one knows of a piece of software that does what you're proposing (this key and lock function), you're just speculating, right?
what does it mean that Bill "created the Word file"? That he drew it? I don't understand that...
Originally posted by Whiterabbit29
Like I said I'm not having a go I think you just mis-understood my point and I will also say again this is wild speculation just seems plausible!
Originally posted by garyo1954
once Bill printed that file, he effectively destroyed those layers. He now has only what he scanned.
G
[edit on 8-2-2006 by garyo1954]
Originally posted by garyo1954
What you are saying Centrist is the printed image on the scanner bed becomes the 'key' unlocking the true image?
If that were true it would require some changes in the main program which has been identified as Word.....
Anonymous Posting #15
This posting was sent directly to myself and was not sent to Victor Martinez. The diagram below was downloaded, printed, and then scanned into a Word program supplied by Anonymous, all precisely as per detailed instructions.
So why create something for nothing?