Duplication prevention method and system

ABSTRACT

An invisible ink management method and system. The method includes receiving by a computer processor data associated with an image to be duplicated and a duplication command enabling reproduction of the image. The computer processor receives a command for enabling a duplication prevention functionality and generates a first copy of the image. The computer processor enables an invisible ink spray nozzle. In response, the invisible ink spray nozzle sprays a plurality of invisible images on the first copy. The plurality of invisible images are invisible under first lighting conditions and are visible under second lighting conditions.

FIELD OF THE INVENTION

The present invention relates to a method and associated system forpreventing documents from being duplicated.

BACKGROUND OF THE INVENTION

Managing protected data typically comprises an inefficient process withlittle flexibility. Accordingly, there exists a need in the art toovercome the deficiencies and limitations described herein above.

SUMMARY OF THE INVENTION

The present invention provides a method comprising: receiving, by acomputer processor of a computing device, data associated with an imageto be duplicated; receiving, by said computer processor, a firstduplication command enabling reproduction of said image; presenting, bysaid computer processor to a user in response to said receiving saidfirst duplication command, a graphical user interface (GUI) for enablinga duplication prevention functionality; receiving, by said computerprocessor from said user in response to said presenting, a command forenabling said duplication prevention functionality; generating, by saidcomputer processor in response to said first duplication command, afirst copy of said image; and enabling, by said computer processor inresponse to said command for enabling said duplication preventionfunctionality, an invisible ink spray nozzle, wherein said invisible inkspray nozzle sprays, in response to said enabling, a plurality ofinvisible images on said first copy, wherein said plurality of invisibleimages are invisible under first lighting conditions, and wherein saidplurality of invisible images are visible under second lightingconditions.

The present invention provides computer program product, comprising acomputer readable storage medium having a computer readable program codeembodied therein, said computer readable program code comprising analgorithm adapted to implement a method within a computing device, saidmethod comprising: receiving, by a computer processor of a computingdevice, data associated with an image to be printed; receiving, by saidcomputer processor, a first duplication command enabling reproduction ofsaid image; presenting, by said computer processor to a user in responseto said receiving said first duplication command, a graphical userinterface (GUI) for enabling a duplication prevention functionality;receiving, by said computer processor from said user in response to saidpresenting, a command for enabling said duplication preventionfunctionality; generating, by said computer processor in response tosaid first duplication command, a first copy of said image; andenabling, by said computer processor in response to said command forenabling said duplication prevention functionality, an invisible inkspray nozzle, wherein said invisible ink spray nozzle sprays, inresponse to said enabling, a plurality of invisible images on said firstcopy, wherein said plurality of invisible images are invisible underfirst lighting conditions, and wherein said plurality of invisibleimages are visible under second lighting conditions.

The present invention provides a method comprising: receiving, by saidcomputer processor, a print command for printing a first image;generating, by said computer processor in response to said printcommand, a first printed copy of said first image; receiving, by saidcomputer processor, a selection of specified barcodes for objects ofsaid first image of said first printed copy; generating, by saidcomputer processor, said specified barcodes; associating, by saidcomputer processor in response to said generating, said specified barcodes with said objects; receiving, by said computer processor inresponse to said associating, a barcode print command for printing saidspecified barcodes over associated objects of said objects; andgenerating, by said computer processor in response to said barcode printcommand, a copy of said first image comprising said each of saidspecified barcodes over said associated objects, wherein said generatingcomprises enabling an ink spray nozzle, wherein said ink sprayreproduces, in invisible ink, invisible copies of each of said specifiedbarcodes, wherein each invisible copy of said invisible copies is placedover an associated object of said associated objects, wherein each saidinvisible copy is invisible under first lighting conditions, and whereineach said invisible copy is visible under second lighting conditions.

The present invention provides method comprising: detecting, by acomputer processor of a mobile computing device, an invisible copy of aspecified barcode located over an associated object of a first image,wherein said invisible copy of said specified barcode is invisible underfirst lighting conditions, wherein said invisible copy of said specifiedbarcode is visible under second lighting conditions, and wherein saiddetecting comprises enabling said second lighting conditions; decoding,by said computer processor, said specified barcode, wherein saiddecoding comprises retrieving data comprising information associatedwith said associated object; superimposing, by said computer processor,said information over said associated object; displaying, by saidcomputer processor, said information superimposed over said associatedobject; receiving, by said computer processor, a command associated withperforming a function associated with said information and saidassociated object; and enabling, by said computer processor, saidfunction.

The present invention advantageously provides a simple method andassociated system capable of managing protected data.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a system for generating and managing invisible inkenabled images, in accordance with embodiments of the present invention.

FIG. 2 illustrates a screen shot associated enabling a printingapparatus for preventing unauthorized image duplication, in accordancewith embodiments of the present invention.

FIGS. 3A and 3B illustrate an image comprising text, images, andinvisible ink generated images, in accordance with embodiments of thepresent invention.

FIGS. 4A and 4B illustrate screen shots associated with implementationof a method for generating invisible barcodes over portions of an image,in accordance with embodiments of the present invention.

FIGS. 5A-5C illustrate an image of a house, in accordance withembodiments of the present invention.

FIG. 6 illustrates an algorithm used by the system of FIG. 1 forimplementing a method for preventing unauthorized image duplication, inaccordance with embodiments of the present invention.

FIG. 7 illustrates an algorithm used by the system of FIG. 1 forimplementing a method for generating invisible barcodes, in accordancewith embodiments of the present invention.

FIG. 8 illustrates an algorithm used by the system of FIG. 1 forimplementing a method for detecting and decoding invisible barcodes, inaccordance with embodiments of the present invention.

FIG. 9 illustrates a computer apparatus used for generating and managinginvisible ink enabled images, in accordance with embodiments of thepresent invention.

DETAILED DESCRIPTION OF THE INVENTION

FIG. 1 illustrates a system 5 for generating and managing invisible inkenabled images, in accordance with embodiments of the present invention.System 5 enables a method for preventing unauthorized image duplication.Image duplication may include, inter alia, duplicating an image (e.g., adocument with text and images, a photograph, a computer scanned image,etc) by photocopying, scanning, etc. System 5 enables an invisible inkspray nozzle 32 b such that a plurality of invisible images (i.e.,generated from invisible ink) are added to an existing document. Theplurality of invisible images are only visible under certain lightingconditions (e.g., ultraviolet light, infrared light, etc). Invisible inkis defined herein as a substance used for writing/printing which isinvisible upon application and may be made visible by some means (e.g.,ultraviolet light, infrared light, etc).

System 5 additionally enables method for generating invisible barcodes(i.e., comprising encoded information) over portions of an image (e.g.,a poster, a photograph, scenery, etc) so that the invisible barcodes areonly viewable and readable by equipped devices (e.g., comprisinginfrared lighting devices). The invisible barcodes may be associatedwith information describing and/or associated with portions of the imageassociated with the barcodes. The barcodes are printed with invisibleink in different image objects so that a viewer cannot detect thebarcodes. Only an infrared enabled device (e.g., a mobile phone) mayread the barcode content. The barcode content may comprise differenttext content, specifications, website address, contact telephone number,etc. If a website address is associated with the barcode, then a usermay click on a URL and a Webpage may be opened in a new browser.

System 5 of FIG. 1 comprises a printing apparatus 17 connected through anetwork 7 to a computing system 10. Additionally, a computing device 8(i.e., for issuing commands for printing apparatus 17) may be connectedto computing system 10. Computing device 8 may comprise any type ofcomputing device such as, inter alia, a computer, a cellular telephone,a PDA, a laptop computer, a tablet computer, etc. Network 7 may compriseany type of network including, inter alia, a telephone network, a localarea network, (LAN), a wide area network (WAN), the Internet, a wirelessnetwork, etc. Computing system 10 may comprise any type of computingsystem(s) including, inter alia, a computer (PC), a server computer, adatabase computer, a controller, etc. Computing system 10 comprises amemory system 14. Memory system 14 may comprise a single memory system.Alternatively, memory system 14 may comprise a plurality of memorysystems. Memory system 14 comprises a software application 18 and adatabase 12.

Printing apparatus 17 comprises a standard ink container 24 a, aninvisible ink container 24 b, ink filters 27 a and 27 b, a standard inknozzle 32 a for spraying ink to generate an image, and an invisible inknozzle 32 b for spraying invisible ink over a generated image on aprinted page 39.

Software application 18 enables the following implementation examplewith respect to performing a method for generating images associatedwith preventing unauthorized image duplication:

-   1. A user sends a print command to printing apparatus 17.-   2. Software application 18 enables standard ink nozzle 32 a to    generate a printed image.-   3. Software application 18 enables a prevent duplication command.-   4. Software application 18 enables invisible ink nozzle 32 b to    generate invisible images at various locations over the printed    image.

Software application 18 (or any printer with invisible ink detection)enables the following implementation example with respect to preventingunauthorized image duplication:

-   1. A user places a printed image (i.e., comprising invisible images    at various locations over the printed image) on a printer/copier    (e.g., printing apparatus 17) to generate a copy (e.g., a photocopy,    a scanned copy, etc).-   2. The printer/copier analyzes the printed image under normal    lighting conditions (e.g., incandescent lighting conditions,    fluorescent lighting conditions, etc).-   3. The printer/copier analyzes the printed image under invisible ink    detection lighting conditions (e.g., ultraviolet lighting    conditions, infrared lighting conditions, etc).-   4. The printer/copier compares a first image from the analysis under    normal lighting conditions to a second image from the analysis under    invisible ink detection lighting conditions and determines that the    first image does not match the second image (i.e., the second image    comprises detected images comprised by the invisible ink).-   5. The printer/copier disables the ability to generate copy (e.g., a    photocopy, a scanned image, etc) of the printed image.

Software application 18 enables the following implementation examplewith respect to performing a method for generating invisible barcodesover portions of an image:

-   1. Software application 18 enables standard ink nozzle 32 a to    generate a printed image (e.g., a poster, a photograph, etc).-   2. Software application 18 selects (e.g., from database 12) or    generates a plurality of barcodes comprising information associated    with different objects within the printed image. Each barcode of the    plurality of barcodes may describe or comprise, inter alia, a name    for different individuals in a photograph, an advertisement for    different objects within the printed image (e.g., sunglasses,    clothing, etc), descriptions for different objects within the    printed image, Website addresses or contact phone numbers for    different objects within the printed image (e.g., for purchasing    purposes), specifications for different objects within the printed    image (e.g., an aluminum window, marble of wood floors, etc).-   3. Software application 18 enables invisible ink nozzle 32 b print    (i.e., in invisible ink) each barcode of the plurality of barcodes    superimposed over an associated object within the printed image.    Therefore, the barcodes printed in invisible ink are only viewable    under invisible ink detection lighting conditions (e.g., ultraviolet    lighting conditions, infrared lighting conditions, etc).

Software application 18 (or any portable device comprising appropriatelighting apparatus and detection software) enables the followingimplementation example with respect to performing a method for detectingand reading invisible barcodes over portions of an image:

-   1. A person viewing a picture or poster (i.e., comprising barcodes    printed in invisible ink over image objects) would like to receive    information associated with the image objects.-   2. The person uses a portable device (e.g., a cellular phone, a PDA,    digital camera, etc) equipped with an appropriate lighting apparatus    and detection software to detect the barcodes printed in invisible    ink. Each detected invisible barcode is decoded (i.e., as the person    scans the portable device over the detected barcode) and associated    information (i.e., from the decoded barcode) is displayed    superimposed over the associated image object) for the person via a    display on the portable device. The associated information may    comprise, inter alia, an advertisement, contact number, detailed    information, a specification, a Website address, etc for the    associated image object. The associated information may comprise a    generated link to additional information or Website. For example,    the person may scroll a curser over the associated information    comprising the generated link and enable (e.g., by clicking a    button) the link resulting in a Website displayed for the person.

FIG. 2 illustrates a screen shot 200 associated enabling printingapparatus 17 (i.e., of FIG. 1) for preventing unauthorized imageduplication, in accordance with embodiments of the present invention.Screen shot 200 comprises a print screen that includes a preventduplication selection box 208 for enabling printing apparatus 17 toactivate invisible ink nozzle 32 b (i.e., of FIG. 1).

FIGS. 3A and 3B illustrate an image 300 a comprising text 310, images302 and 304, and invisible ink generated images 312, in accordance withembodiments of the present invention. FIG. 3A illustrates image 300 aviewed under normal lighting conditions (e.g., incandescent lightingconditions, fluorescent lighting conditions, etc). Under normal lightingconditions, invisible ink generated images 312 are not visible asillustrated in FIG. 3A. FIG. 3B illustrates image 300 a viewed underdetection lighting conditions (e.g., ultraviolet lighting conditions,infrared lighting conditions, etc). Under detection lighting conditions,invisible ink generated images 312 are visible as illustrated in FIG.3B.

FIGS. 4A and 4B illustrate screen shots associated with implementationof a method for generating invisible barcodes over portions of an imageenabled by system 5 of FIG. 1, in accordance with embodiments of thepresent invention. Screen shot 400 a (in FIG. 4A) comprises anactivation screen comprising data to encode box 402 a (i.e., comprisinga description for object in an image as illustrated in FIG. 5C anddescribed, supra) and associated barcode 404 a to be printed ininvisible ink. Screen shot 400 b (in FIG. 4B) comprises an activationscreen comprising data to encode box 402 b (i.e., comprising a Webaddress for purchasing or viewing details for an object in an image asillustrated in FIG. 5C and described, supra) and associated barcode 404b to be printed in invisible ink.

FIGS. 5A-5C illustrate an image 500 of a house, in accordance withembodiments of the present invention. FIG. 5A illustrates image 500viewed under normal lighting conditions (e.g., incandescent lightingconditions, fluorescent lighting conditions, etc). Under normal lightingconditions, invisible ink generated barcodes 502 a and associateddescriptions 502 b are not visible as illustrated in FIG. 5A. FIG. 5Billustrates image 500 comprising invisible ink generated barcodes 502 adetected by a portable device. FIG. 5C illustrates a portion 500 a ofimage 500 comprising decoded descriptions (i.e., viewable via theportable device) associated with one of the invisible ink generatedbarcodes 502 a detected and decoded by the portable device.

FIG. 6 illustrates an algorithm used by system 5 of FIG. 1 forimplementing a method for preventing unauthorized image duplication, inaccordance with embodiments of the present invention. In step 600, acomputer processor of a computing device (e.g., computing device 10 inFIG. 1) receives data associated with an image to be duplicated. In step602, the computer processor receives a duplication command enablingreproduction of the image. In step 604, the computer processor presents(to a user in response to receiving the duplication command) a graphicaluser interface (GUI) for enabling a duplication preventionfunctionality. In step 612, the computer processor receives (from theuser via the GUI) a command for enabling the duplication preventionfunctionality. In step 614, the computer processor generates (i.e., inresponse to duplication command) a first copy of the image. In step 618,the computer processor enables (i.e., in response to command forenabling the duplication prevention functionality) an invisible inkspray nozzle (e.g., invisible ink spray nozzle 32 b in FIG. 1). Inresponse, the invisible ink spray nozzle sprays a plurality of invisibleimages (e.g., invisible ink generated images 312 in FIGS. 3A and 3B) onthe first copy. The plurality of invisible images are invisible undernormal lighting conditions (e.g., incandescent lighting conditions,fluorescent lighting conditions, etc) and visible under detectionlighting conditions (e.g., ultraviolet lighting conditions, infraredlighting conditions, etc). In step 622, the computer processor receivesa reproduction command for reproducing the first copy comprising theplurality of invisible images. For example, a user would like to make aphotocopy of the first copy comprising the plurality of invisibleimages. In step 625, the computer processor enables normal lightingconditions and detection lighting conditions with respect to the firstcopy comprising the plurality of invisible images. In step 634, thecomputer processor retrieves a first image of the first copy comprisingthe plurality of invisible images with respect to normal lightingconditions and a second image of said first copy comprising theplurality of invisible images with respect to the detection lightingconditions. The first image is compared to the second image. In step636, it is determined (i.e., based on the comparison between the firstimage and second image in step 634) that that the first image does notmatch the second image. In step 638, the computer processor disables thereproduction command for reproducing the first copy comprising theplurality of invisible images. In step 642, the computer processorgenerates and presents an alert indicating that the first copy may notbe reproduced.

FIG. 7 illustrates an algorithm used by system 5 of FIG. 1 forimplementing a method for generating invisible barcodes, in accordancewith embodiments of the present invention. In step 700, a computerprocessor of a computing device (e.g., computing device 10 in FIG. 1)receives, a print command for printing a first image. In step 702, thecomputer processor generates (i.e., in response to the print command) afirst printed copy of the first image. In step 708, the computerprocessor receives a selection for specified barcodes for objects of thefirst image of the first printed copy. In step 712, the computerprocessor generates or retrieves from a database, the specifiedbarcodes. In step 714, the computer processor associates specified barcodes with the associated objects. In step 718, the computer processorreceives a barcode print command for printing the specified barcodes(i.e., in invisible ink) over the associated objects. In step 720, thecomputer processor generates (in response to the barcode print command)a copy of the first image comprising each of the specified barcodes (ininvisible ink) over the associated objects. Generating the copy of thefirst image comprises enabling an invisible ink spray nozzle (e.g.,invisible ink spray nozzle 32 b in FIG. 1). The invisible ink spraynozzle reproduces in invisible ink, invisible copies of each of thespecified barcodes.

FIG. 8 illustrates an algorithm used by system 5 of FIG. 1 forimplementing a method for detecting and decoding invisible barcodes, inaccordance with embodiments of the present invention. In step 800, acomputer processor of a mobile computing device detects (i.e., when auser uses the mobile computing device to scan an image such as a poster)an invisible copy of a specified barcode located over an associatedobject of the image. The invisible copy of the specified barcode isinvisible under normal lighting conditions and visible detectionlighting conditions (i.e., enabled by the mobile computing device). Instep 802, the computer processor decodes the specified barcode. Thedecoding process includes retrieving data comprising informationassociated with the associated object (e.g., a description). In step808, the computer processor superimposes the information over theassociated object. In step 812, the computer processor displays (i.e.,via a display portion of the mobile computing device) the informationsuperimposed over the associated object. In step 812, the computerprocessor receives (i.e., from a user viewing the informationsuperimposed over the associated object) a command associated withperforming a function associated with the information and the associatedobject. In step 818, the computer processor enables the function. Thefunction may include, inter alia, automatically dialing a telephonenumber associated with the associated object, automatically connectingto a Website associated with the associated object, automaticallycopying the information and transmitting the information to a remotelocation, automatically submitting a product order associated with theinformation, etc.

FIG. 9 illustrates a computer apparatus 90 (e.g., computing system 10 ofFIG. 1) used for generating and managing invisible ink enabled images,in accordance with embodiments of the present invention. The computersystem 90 comprises a processor 91, an input device 92 coupled to theprocessor 91, an output device 93 coupled to the processor 91, andmemory devices 94 and 95 each coupled to the processor 91. The inputdevice 92 may be, inter alia, a keyboard, a software application, amouse, etc. The output device 93 may be, inter alia, a printer, aplotter, a computer screen, a magnetic tape, a removable hard disk, afloppy disk, a software application, etc. The memory devices 94 and 95may be, inter alia, a hard disk, a floppy disk, a magnetic tape, anoptical storage such as a compact disc (CD) or a digital video disc(DVD), a dynamic random access memory (DRAM), a read-only memory (ROM),etc. The memory device 95 includes a computer code 97. The computer code97 includes algorithms (e.g., the algorithms of FIGS. 6-8) forgenerating and managing invisible ink enabled images. The processor 91executes the computer code 97. The memory device 94 includes input data96. The input data 96 includes input required by the computer code 97.The output device 93 displays output from the computer code 97. Eitheror both memory devices 94 and 95 (or one or more additional memorydevices not shown in FIG. 9) may comprise the algorithms of FIGS. 6-8and may be used as a computer usable medium (or a computer readablemedium or a program storage device) having a computer readable programcode embodied therein and/or having other data stored therein, whereinthe computer readable program code comprises the computer code 97.Generally, a computer program product (or, alternatively, an article ofmanufacture) of the computer system 90 may comprise the computer usablemedium (or said program storage device).

Still yet, any of the components of the present invention could becreated, integrated, hosted, maintained, deployed, managed, serviced,etc. by a service provider who offers to generate and manage invisibleink enabled images. Thus the present invention discloses a process fordeploying, creating, integrating, hosting, maintaining, and/orintegrating computing infrastructure, comprising integratingcomputer-readable code into the computer system 90, wherein the code incombination with the computer system 90 is capable of performing amethod for generating and managing invisible ink enabled images. Inanother embodiment, the invention provides a method that performs theprocess steps of the invention on a subscription, advertising, and/orfee basis. That is, a service provider, such as a Solution Integrator,could offer to generate and manage invisible ink enabled images. In thiscase, the service provider can create, maintain, support, etc. acomputer infrastructure that performs the process steps of the inventionfor one or more customers. In return, the service provider can receivepayment from the customer(s) under a subscription and/or fee agreementand/or the service provider can receive payment from the sale ofadvertising content to one or more third parties.

While FIG. 9 shows the computer system 90 as a particular configurationof hardware and software, any configuration of hardware and software, aswould be known to a person of ordinary skill in the art, may be utilizedfor the purposes stated supra in conjunction with the particularcomputer system 90 of FIG. 9. For example, the memory devices 94 and 95may be portions of a single memory device rather than separate memorydevices.

While embodiments of the present invention have been described hereinfor purposes of illustration, many modifications and changes will becomeapparent to those skilled in the art. Accordingly, the appended claimsare intended to encompass all such modifications and changes as fallwithin the true spirit and scope of this invention.

The invention claimed is:
 1. A method comprising: receiving, by acomputer processor of a computing device, data associated with an imageto be duplicated; receiving, by said computer processor, a firstduplication command enabling reproduction of said image; presenting, bysaid computer processor to a user in response to said receiving saidfirst duplication command, a graphical user interface (GUI) for enablinga duplication prevention functionality; receiving, by said computerprocessor from said user in response to said presenting, a command forenabling said duplication prevention functionality; generating, by saidcomputer processor in response to said first duplication command, afirst copy of said image; enabling, by said computer processor inresponse to said command for enabling said duplication preventionfunctionality, an invisible ink spray nozzle, wherein said invisible inkspray nozzle sprays, in response to said enabling, a plurality ofinvisible images on said first copy, wherein said plurality of invisibleimages are invisible under first lighting conditions, and wherein saidplurality of invisible images are visible under second lightingconditions; receiving, by said computer processor, a reproductioncommand for reproducing said first copy comprising said plurality ofinvisible images; first enabling, by said computer processor in responseto said reproduction command, said first lighting conditions withrespect to said first copy comprising said plurality of invisibleimages; first generating, by said computer processor in response to saidfirst enabling said first lighting conditions, a first image of saidfirst copy comprising said plurality of invisible images with respect tosaid first lighting conditions; after said first generating, firstdisabling by said computer processor in response to said reproductioncommand, said first lighting conditions; after said first disabling,second enabling, by said computer processor, said second lightingconditions with respect to said first copy comprising said plurality ofinvisible images; second generating, by said computer processor inresponse to said second enabling said second lighting conditions, asecond image of said first copy comprising said plurality of invisibleimages with respect to said second lighting conditions; comparing, bysaid computer processor, said first image to said second image;analyzing, by said computer processor, results of said comparing saidfirst image to said second image to determine if said first imagematches said second image; and automatically enabling, by said computerprocessor based on results of said analyzing, a print control commandassociated with said reproduction command.
 2. The method of claim 1,further comprising: determining, by said computer processor based onsaid analyzing said results of said comparing said first image to saidsecond image, that said first image does not match said second image;and disabling, by said computer processor based on said determining,said reproduction command for reproducing said first copy comprisingsaid plurality of invisible images.
 3. The method of claim 2, furthercomprising: generating, by said computer processor, an alert indicatingthat said first copy may not be reproduced; and presenting, by saidcomputer processor to said user, said alert.
 4. The method of claim 1,wherein said reproduction command comprises a command for generating aphotocopy of said first copy comprising said plurality of invisibleimages.
 5. The method of claim 1, wherein said reproduction commandcomprises a command for generating a digital copy of said first copycomprising said plurality of invisible images.
 6. The method of claim 1,further comprising: receiving, by said computer processor, an additionalreproduction command for reproducing a copy of an image that does notcomprise a plurality of invisible images; third enabling, by saidcomputer processor in response to said additional reproduction command,said first lighting conditions with respect to said copy; thirdretrieving, by said computer processor in response to said thirdenabling said first lighting conditions, a first image of said copy withrespect to said first lighting conditions; after said third retrieving,second disabling by said computer processor, said first lightingconditions; after said second disabling, fourth enabling, by saidcomputer processor, said second lighting conditions with respect to saidcopy; fourth retrieving, by said computer processor in response to saidfourth enabling said second lighting conditions, a second image of saidcopy with respect to said second lighting conditions; and comparing, bysaid computer processor, said first image of said copy to said secondimage of said copy.
 7. The method of claim 6, further comprising:additionally determining, by said computer processor based on results ofsaid comparing said first image of said copy to said second image ofsaid copy, that said first image of said copy matches said second imageof said copy; and enabling, by said computer processor based on saidadditionally determining, said additional reproduction command forreproducing said copy.
 8. The method of claim 1, further comprising:providing at least one support service for at least one of creating,integrating, hosting, maintaining, and deploying computer-readable codein said computing system, wherein the code in combination with thecomputing system is capable of performing: said receiving said data,said receiving said first print command, said presenting, said receivingsaid command, said generating, and said enabling.
 9. A computer programproduct, comprising a computer readable hardware storage device storinga computer readable program code, said computer readable program codecomprising an algorithm adapted to implement a method within a computingdevice, said method comprising: receiving, by a computer processor ofsaid computing device, data associated with an image to be printed;receiving, by said computer processor, a first duplication commandenabling reproduction of said image; presenting, by said computerprocessor to a user in response to said receiving said first duplicationcommand, a graphical user interface (GUI) for enabling a duplicationprevention functionality; receiving, by said computer processor fromsaid user in response to said presenting, a command for enabling saidduplication prevention functionality; generating, by said computerprocessor in response to said first duplication command, a first copy ofsaid image; enabling, by said computer processor in response to saidcommand for enabling said duplication prevention functionality, aninvisible ink spray nozzle, wherein said invisible ink spray nozzlesprays, in response to said enabling, a plurality of invisible images onsaid first copy, wherein said plurality of invisible images areinvisible under first lighting conditions, and wherein said plurality ofinvisible images are visible under second lighting conditions;receiving, by said computer processor, a reproduction command forreproducing said first copy comprising said plurality of invisibleimages; first enabling, by said computer processor in response to saidreproduction command, said first lighting conditions with respect tosaid first copy comprising said plurality of invisible images; firstgenerating, by said computer processor in response to said firstenabling said first lighting conditions, a first image of said firstcopy comprising said plurality of invisible images with respect to saidfirst lighting conditions; after said first generating, first disablingby said computer processor in response to said reproduction command,said first lighting conditions; after said first disabling, secondenabling, by said computer processor, said second lighting conditionswith respect to said first copy comprising said plurality of invisibleimages; second generating, by said computer processor in response tosaid second enabling said second lighting conditions, a second image ofsaid first copy comprising said plurality of invisible images withrespect to said second lighting conditions; comparing, by said computerprocessor, said first image to said second image; analyzing, by saidcomputer processor, results of said comparing said first image to saidsecond image to determine if said first image matches said second image;and automatically enabling, by said computer processor based on resultsof said analyzing, a print control command associated with saidreproduction command.