Electronic forms including digital watermarking

ABSTRACT

The present invention relates to creating and managing electronic documents. In one implementation, a method includes obtaining electronic data corresponding to an application document to obtain a driver&#39;s license; analyzing the electronic data to detect steganographic indicia encoded therein, the steganographic indicia comprising a plural-bit identifier; and associating the plural-bit identifier with a plurality of different records associated with an applicant or the application document. Other implementations are provided as well.

RELATED APPLICATION DATA

This application is a continuation of U.S. patent application Ser. No.10/407,816, filed Apr. 3, 2003 (now U.S. Pat. No. 7,194,106). Thepresent application is related to the following U.S. patent applicationSer. No. 09/629,401, filed Aug. 1, 2000 (now U.S. Pat. No. 6,522,770);Ser. No. 09/571,422, filed May 15, 2000 (now U.S. Pat. No. 6,947,571);and Ser. No. 10/359,550, filed Feb. 5, 2002 (now U.S. Pat. No.7,162,052). Each of these U.S. patent documents is hereby incorporatedby reference.

FIELD OF THE INVENTION

The present invention relates to steganography, and is particularlyillustrated in the field of documents and printed forms.

BACKGROUND AND SUMMARY OF THE INVENTION

One form of steganography is digital watermarking. Digital watermarkingsystems typically have two primary components: an encoder that embeds awatermark in a host media signal, and a decoder (or reader) that detectsand reads the embedded watermark from a signal suspected of containing awatermark. The encoder embeds a watermark by altering the host mediasignal. The decoding component analyzes a suspect signal to detectwhether a watermark is present. In applications where the watermarkencodes information, the decoder extracts this information from thedetected watermark.

One challenge to the developers of some watermark embedding and readingsystems is to ensure that the watermark is detectable even if thewatermarked media content is transformed in some fashion. The watermarkmay be corrupted intentionally, so as to bypass its copy protection oranti-counterfeiting functions, or unintentionally through varioustransformations (e.g., scaling, rotation, translation, etc.) that resultfrom routine manipulation of the content. In the case of watermarkedimages, such manipulation of the image may distort the watermark patternembedded in the image.

A watermark can have multiple components, each having differentattributes. To name a few, these attributes may include function, signalintensity, transform domain of watermark definition (e.g., temporal,spatial, frequency, etc.), location or orientation in host signal,redundancy, level of security (e.g., encrypted or scrambled), etc. Thecomponents of the watermark may perform the same or different functions.For example, one component may carry a message, while another componentmay serve to identify the location or orientation of the watermark.Moreover, different messages may be encoded in different temporal orspatial portions of the host signal, such as different locations in animage or different time frames of audio or video. In some cases, thecomponents are provided through separate watermarks.

There are a variety of implementations of an embedder and detector. Oneembedder performs error correction coding of a binary message, and thencombines the binary message with a carrier signal to create a componentof a watermark signal. It then combines the watermark signal with a hostsignal. To facilitate detection, it may also add a detection componentto form a composite watermark signal having a message and detectioncomponent. The message component may include known or signature bits tofacilitate detection, and thus, serves a dual function of identifyingthe mark and conveying a message. The detection component is designed toidentify the orientation of the watermark in the combined signal, butmay carry an information signal as well. For example, the signal valuesat selected locations in the detection component can be altered toencode a message.

One detector implementation estimates an initial orientation of awatermark signal in a host signal, and refines the initial orientationto compute a refined orientation. As part of the process of refining theorientation, this detector computes at least one orientation parameterthat increases correlation between the watermark signal and the hostsignal when the watermark or host signal is adjusted with the refinedorientation.

Another detector computes orientation parameter candidates of awatermark signal in different portions of the target signal, andcompares the similarity of orientation parameter candidates from thedifferent portions. Based on this comparison, it determines whichcandidates are more likely to correspond to a valid watermark signal.

Yet another detector estimates orientation of the watermark in a targetsignal suspected of having a watermark. The detector then uses theorientation to extract a measure of the watermark in the target. It usesthe measure of the watermark to assess merits of the estimatedorientation. In one implementation, the measure of the watermark is theextent to which message bits read from the target signal match withexpected bits. Another measure is the extent to which values of thetarget signal are consistent with the watermark signal. The measure ofthe watermark signal provides information about the merits of a givenorientation that can be used to find a better estimate of theorientation. Of course other embedder and detectors can be suitablyinterchanged with some embedding/detecting aspects of the presentinvention.

Some techniques for embedding and detecting watermarks in media signalsare detailed in the assignee's co-pending U.S. patent application Ser.No. 09/503,881 (now U.S. Pat. No. 6,614,914), U.S. Pat. No. 6,122,403and PCT patent application PCT/US02/20832. Each of these patentdocuments is herein incorporated by reference. Of course, artisans knowmany other suitable watermarking and steganographic encoding techniques.

In related patent application Ser. No. 09/629,401 (now U.S. Pat. No.6,522,770) assignee disclosed systems and methods for linking from aprinted document to an electronic version of the printed document. Inone implementation a steganographic signal includes data which is usedto determine a memory location at which the electronic version isstored.

According to one aspect of the present invention, we provide documents,systems and methods for creating an electronic version of a printeddocument. Instead of linking to or finding an electronic version inmemory, our systems and methods create a corresponding electronicdocument itself at least in part by reference to steganographic dataincluded on the printed document. In one implementation we use digitalwatermark data to help locate areas on a form in which information(e.g., name and address) is to be filled in. The relative locations ofthe printed document areas are mapped to a generated electronicdocument. Editable text boxes (or editable areas or fields) are providedat the relative electronic document areas. A user enters information inthe editable text boxes or fields.

According to another aspect of the invention, we provide a printeddocument including steganographic indicia thereon. An example of theprinted document is a form to be filled out by a user or applicant, suchas a mortgage form. The indicia corresponds to an area on the documentto be filled out (e.g., name or social security number, etc.). Theindicia preferably provides relative location clues for the area withrespect to the document or with respect to other indicia. The indiciaalso may indicate a field length or expected data input (e.g., numbersvs. letters, etc.). Thus, the indicia provides clues on how best togenerate an electronic version corresponding to the printed document.

According to still another aspect of the invention, we provide a systemto generate an electronic version of a printed document. The printeddocument includes steganographic encoding thereon. The encodingincluding at least a first identifier associated with a first printeddocument area and a second identifier associated with a second printeddocument area. The system includes memory; electronic processingcircuitry; and a communications bus to facilitate communication betweenthe memory and the electronic processing circuitry. The memory includessoftware instructions stored therein, the instructions comprisinginstructions to: generate an electronic version of the printing documentincluding a first electronic document area and a second electronicdocument area; and relatively position the first electronic documentarea and the second electronic document area within the electronicversion in accordance to a relative positioning of the first printeddocument area and the second printed document area within the printeddocument, wherein the relative positioning is determined at least inpart from the steganographic encoding.

The foregoing and other features and advantages of the present inventionwill be even more readily apparent from the following detaileddescription, which proceeds with reference to the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A illustrates a conventional printed document.

FIG. 1B illustrates a printed document including machine-readableindicia selectively provided in document areas.

FIG. 2 illustrates an electronic document generation system and methodaccording to one aspect of the present invention.

FIG. 3 illustrates a computer-generated graphical interface allowing fordata entry in an electronic version of the printed document illustratedin FIG. 1B.

FIG. 4 illustrates another printed document including machine-readableindicia and a reference fiducial.

DETAILED DESCRIPTION

A printed document 10 is shown with reference to FIG. 1A. The printeddocument 10 corresponds to a form or document to be completed by a useror applicant, such as a mortgage application form. An all-too familiarscenario involves a user receiving the form in the mail and thenhandwriting information requested by the form (e.g., name, address,social security number, occupation, etc.). (We hesitate to point out theobvious, but gone are the days when users have typewriters to helpcomplete the form.) Countless printed documents are discarded orscratched out due to poor penmanship or writing mistakes. Oncecompleted, the user signs the document and returns (e.g., typically viamail or fax) the completed form to the form's provider.

We have improved this age-old process through machine-readable,steganographic encoding.

With reference to FIG. 1B, our printed document 12 includes a pluralityof areas 12 a-12 e each having machine-readable indicia providedtherein. The printed document 12 may include, e.g., a loan application,account application, brokerage form, mortgage application, rentalagreement, contract, employment application, questionnaire, entry form,certificate, contest documentation, checks, travelers checks, securitydocuments, identification documents, government documentation (e.g.,voter registration form, social security benefits form, etc.), change ofaddress form, legal documentation, driver's license application, etc.,etc. The machine-readable indicia preferably includes steganographicencoding. The steganographic encoding is preferably subtle, e.g., theencoding is generally imperceptible to human viewers of the encoding,but remains machine-readable with computer analysis. In someimplementations, however, the encoding is in the form of a visible tint,texture or background pattern. In these implementations, the tint,texture or pattern may be visually perceptible, but the encoding itselfis still generally imperceptible to a human viewer of the tint orbackground pattern, unlike a bar code. (For example, a human viewerrecognizes that a bar code is a marking or encoding, even though theymay not be able to decipher the marking or encoding without the aid ofcomputer analysis. However, the human viewer would not necessaryrecognize that our steganographic encoding represents a marking orencoding.). In some implementations the steganographic encoding includesone or more digital watermarks. Some digital watermarking techniquesmake slight changes to a pattern, e.g., by changing data representingthe pattern, whether in the form of DCT coefficients, waveletcoefficients, pixel values, or other interchangeable representation—tothereby encode auxiliary information. Other implementations provideso-called “pure” or “raw” digital watermarking signals as a tint orpattern.

The steganographic encoding preferably conveys a message or payload. Themessage or payload may vary from area to area. For example, the messageor payload includes a unique identifier for identifying a type of areaor a specific protocol or standard for an area or printed document 12.If the message or payload represents a protocol or standard, a formgenerator can use the message to help place and regulate, e.g., editabletext boxes or fields within an electronic version of the printeddocument. (A document or form generator is discussed below withreference to FIGS. 2 and 3.) Or the message or payload may provide afield type or length indictor. For example, the payload may correspondto an area 12 c (FIG. 1B) in which a user should enter her socialsecurity number. The payload may indicate that numeric characters areexpected, and that the field length should be nine (9) numbers. A formgenerator can use this payload data to regulate a user's inputtedinformation. Or the payload may correspond to an area 12 a (FIG. 1B) inwhich a user should enter her name. The payload in this case mayindicate that text characters are expected.

The encoding may also include an orientation component which is usefulin helping to resolve image distortion such as rotation, scaling, andtranslation, etc., and/or to help detect the message or payload. Theorientation component may be a separate signal, or may be combined (orconcatenated) with the message or payload.

The encoding may also be redundantly embedded throughout a document area12 a-12 e so as to redundantly convey the payload and/or orientationcomponent.

With reference to FIG. 2, printed document 12 is presented to an opticalsensor 20 such as a flat bed scanner, web camera, cell phone camera,digital camera, CCD sensor, etc. Optical sensor 20 captures image data(also referred to as “optical scan data”) corresponding to printeddocument 12. The image data is communicated to computer 22. It should beappreciated that optical sensor 20 may be tethered to computer 22 or maywirelessly communicate with computer 22. In other implementations sensor20 communicates over a network with computer 22.

Computer 22 includes at least memory and electronic processingcircuitry. A communications system bus will generally be used to helpfacilitate data communication in computer 22. Computer 22 includessteganographic decoding software (e.g., digital watermark decodingsoftware) stored in memory for execution on the electronic processingcircuitry. The steganographic decoding software analyzes the capturedimage data in search of steganographic indicia (step a). The decodingsoftware identifies a relative spatial positioning of the steganographicencoding within the printed document 12 (step b). The positioning (andrelative size and/or area encoded) of the steganographic encoding can bedetermined, e.g., relative to a printed document 12 corner (e.g., theupper-left corner of the printed document 12) or other documentlocation. In some implementations, we scan the captured image datalooking for steganographic encoding in a raster-like manner (or lookingat an image block-by-block). Once the encoding is found at a raster orblock location, a spatial location or area boundary can be identified.In one implementation we determine a boundary for the encoding in termsof pixel locations relative to a fixed document position or documentarea. In another implementation the steganographic encoding carries dataconveying the relative size or a corresponding area (or electronic fieldpositioning) and/or the relative positioning of the area within theprinted or electronic document. In other implementations (see FIG. 4) aprinted document 40 includes one or more fiducials 42. For example, arelative X & Y pixel or spatial distance from an encoded area orboundary is determined with respect to fiducial 42. Placement of encodedareas 12 a-12 e is determined relative to the one or more fiducials 42.In still other implementations, the steganographic encoding includes aform indicator. The form indicator is used to index a data record whichincludes information regarding relative placement of a text box orfield. For example, the form indicator may correspond to form 13—a loanapplication. The data record includes data to help construct anelectronic version of the loan application, such as field placementinformation.

We generate an electronic version of the printed document 12 (step c)and present the electronic version (e.g., to a user) for data entry(step d). Generating an electronic version of the printed document 12can be achieved using many different techniques. For example, in aHTML-based system we can use at least some of the captured image data asa background image (or as an image overlay). We then use thesteganographic data (or information derived from such data) to help uscorrectly position editable text boxes or fields over the backgroundimage. A user can use an Internet browser (e.g., Explorer) to completethe printed form (see FIG. 3). For example, the user enters informationin provided editable text boxes (e.g., name, address, social securitynumber, occupation, etc.). In another implementation, we use a wordprocessor (e.g., Word) as our base program to generate an electronicversion of the printed document. The word processor can use some or allof the captured image data (corresponding to the printed document) as abackground image or overlay for an electronic version of the printeddocument. Or an OCR program can capture text and relative positioning ofthe text from the printed document. The steganographic data is used tohelp position character fields within the electronic version of theprinted document to receive user data. The selected portions of theelectronic version can be write-protected to ensure data entry only infields corresponding to areas 12 a-12 e. As mentioned above, thesteganographic data can be used to convey a type (or length) ofanticipated information for a particular field. The base program (or aplug-in cooperating with the base program) can use the steganographicdata to limit text to a specific type (e.g., numbers) or to prompt auser to type in correct data (e.g., numbers instead of letters, or only9 characters instead of 12 characters, etc.).

In still another implementation, our computer 22 includes a so-calledTablet PC. The Tablet PC includes a touch screen (e.g., coupled withhandwriting recognition software) that allows a user to “write” on anelectronic version of the printed document 12 as displayed on the touchscreen. The handwriting is converted into a type font by the handwritingrecognition software and the electronic version of the printed document12 is ready for printing or transmitting. (In some implementationssteganographic encoding may include routing information such as an emailaddress, IP address, URL, fax number, etc. This routing information canbe used to transmit the electronic version once completed.).

With reference to FIG. 4, we optionally provide an identifyingsteganographic encoded area 44 somewhere on the printed document 40.This identifying steganographic encoding provides data that can be usedto identify a “type” of printed document. For example, thesteganographic data may include plural bit data to be used by asteganographic decoder or software application/plug-in as a clue tolaunch an electronic form generator program. We envision a scenariowhere the steganographic decoder or software application/plug-inconstantly searches for this plural bit data, and once found, launchesthe electronic form generator, whether it be HTML, word processor orother application based. The plural-bit data can also be used toindicate which type of printed document the form generator shouldgenerate. For example, the plural-bit data may correspond to apredetermined template or to a predetermine set of electronic formfields. The form generator can use the template or field set to generatethe electronic form. Thus, in some implementations, printed document 40may not even include encoding in areas 40 a-40 e. We note that inalternative implementations, the type or indicator plural-bit data isincluded in one of the areas 40 a-40 e, instead of in a separate formarea 44. In still another implementation, a user launches an electronicform generator on a computer and then proceeds to electronically captureprinted document 40 (or 12). The electronic generator cooperates with(or includes) a steganographic decoder to generate a correspondingelectronic version of the printed document.

In some implementations a steganographic payload includes a tag or fieldname to be used with Extensible Markup Language (XML) files. Forexample, if the payload corresponds to an area (e.g., 40 a in FIG. 4)associated with a “name”, the XML tag may include the descriptor:“Name”. A form generator can use the descriptor when creating an XMLfile associated with an electronic version of a printed document. Then,when a user enters information associated with an electronic fieldassociated with area 40 a, the user's information can be stored in thetag or descriptor line titled “Name”. (In an alternative implementation,instead of a payload including a tag or descriptor, we include an indexin the payload. Once decoded, the index can be used to access a table ordata record including a set of tags or descriptors. The index is used tointerrogate the table or data record to find the corresponding tag ordescriptor.).

Now consider a likely execution scenario. A user receives a printeddocument 12. The user then presents the print document 12 to opticalsensor 20 (FIG. 2) for image capture. Steganographic decoding softwarerecognizes the steganographic machine-readable code and an electronicform generator is launched. (In some cases the electronic form generatorincludes the steganographic decoder). An electronic version of theprinted document is constructed, which allows a user to enterinformation in the electronic version. Once the electronic form iscompleted, the completed electronic form can be electronically stored.In one implementation, we store the electronic version (or informationinput from the user) as an XML file. XML file fields represent at leastthe user's inputted information, perhaps with a relative spatialalignment or field indicator (e.g., social security number or name) ofthe inputted information. In some cases the XML file will reference (orinclude) a background or overlay image. If the steganographic encodingincludes routing information, such information can also be stored as anXML field. Or we can store the completed form as a file that correspondsto the host program. For example, if using Word as the host program westore the completed form as a Word file, or if we are using an editable.PDF format, the completed form is stored as a .PDF file. The userprints out the completed form for signing.

We can embed additional steganographic information to be printed withthe completed form. The additional steganographic information mayinclude a form identifier or memory address. Once signed, the executedform can be presented to an optical sensor for image capture. Asteganographic decoder obtains the form identifier from the signed,captured form. The form identifier can be used, e.g., to locate thestored, completed electronic version. (See, e.g., assignee's U.S. Pat.No. 6,522,770, which is herein incorporated by reference, for relatedtechniques). For example, if the completed version is stored as an XMLfile, the form identifier can be used to locate the corresponding XMLfile. In some implementations, we capture a bit-map image of the user'ssignature. The bit-map is associated with the XML file. The XML and theassociated bit-map can then be electronically transmitted to, e.g., theprovider of the original printed document 12 (or 40). We can optionallyencrypt the XML file and/or bit-map for additional security.

The above print-out-for-signature-and-then-rescan example can becircumvented in several other implementations. For example, the user cansign the printed document 12 (or 40) prior to the initial image capture.Or, if using, e.g., a Tablet PC, the user can sign the completedelectronic form on the Tablet PC screen, and then electronicallytransmit the form without needing to print the electronic version for asignature.

In another implementation, instead of printing a completed electronicform, we provide user inputted information, along with a relativeorientation or positioning of the information (e.g., where theinformation should be printed on a printed document), to a printer. Theoriginal printed document is feed into the printer to receive theuser-inputted information. As long as the registration of the userinputted information to be printed and the printed document feed pathare reasonably correlated, the original printed document should receivethe printed user input in the appropriate locations. This implementationis helpful in scenarios requiring the original document, such as someproduct registrations, government paperwork, legal documents, etc.

In a related implementation a printer includes an optical sensor. Theprinter's optical sensor reads an original printed document to determinethe type of field represented by steganographic indicia. (For example,the indicia may include an XML descriptor, and the type of field isevidenced by the XML descriptor). The printer receives user-inputtedinformation (e.g., from a form generator). The user inputted informationincludes type of field indicators (e.g., XML descriptors or tags). Theprinter (or a print controller) matches the user-inputted informationwith the appropriate printed document location and applies printing tothose locations.

We imagine that in some implementations not every printed document(e.g., document 10 in FIG. 1) will include steganographic encoding. Inthese implementations a user can apply encoding prior to image capture.For example, a user may apply “stickers” including steganographic ormachine-readable encoding. The stickers are applied over areas in whichthe user intends to enter information. The alignment and positioning ofthe stickers on the printed document 10 is determined and a suitableelectronic version of document 10 is generated.

Concluding Remarks

To provide a comprehensive disclosure without unduly lengthening thisspecification, applicant incorporates by reference the above-cited U.S.patent documents.

Having described and illustrated the principles of the invention withreference to illustrative embodiments, it should be recognized that theinvention is not so limited. The present invention finds applicationbeyond such illustrative embodiments.

For example, the technology and solutions disclosed herein have made useof elements and techniques known from the cited documents. Otherelements and techniques from the cited documents can similarly becombined to yield further implementations within the scope of thepresent invention. Thus, for example, single-bit watermarking can besubstituted for multi-bit watermarking, local scaling of watermarkenergy can be provided to enhance watermark signal-to-noise ratiowithout increasing human perceptibility, various filtering operationscan be employed to serve the functions explained in the prior art,watermarks can include subliminal graticules to aid in imagere-registration, encoding may proceed at the granularity of a singlepixel (or DCT coefficient), or may similarly treat adjoining groups ofpixels (or DCT coefficients), the encoding can be optimized to withstandexpected forms of content corruption. Etc., etc., etc. Thus, theexemplary embodiments are only selected samples of the solutionsavailable by combining the teachings referenced above. The othersolutions necessarily are not exhaustively described herein, but arefairly within the understanding of an artisan given the foregoingdisclosure and familiarity with the art.

The implementation of some of the functionality described above(including watermark or steganographic encoding and decoding) isstraightforward to artisans in the field, and thus not further belaboredhere. Conventionally, such technology is implemented by suitablesoftware, stored in long-term memory (e.g., disk, ROM, etc.), andtransferred to temporary memory (e.g., RAM) for execution on anassociated processor or processing circuitry. In other implementations,the functionality can be achieved by dedicated hardware, or by acombination of hardware and software. Reprogrammable logic, includingFPGAs, can advantageously be employed in certain implementations.

In view of the wide variety of embodiments to which the principles andfeatures discussed above can be applied, it should be apparent that thedetailed embodiments are illustrative only and should not be taken aslimiting the scope of the invention. Rather, we claim as our inventionall such modifications as may come within the scope and spirit of thefollowing claims and equivalents thereof.

1. A method comprising: obtaining electronic data corresponding to aphysical application document; analyzing the electronic data to detectsteganographic indicia encoded therein, the steganographic indiciacomprising a plural-bit identifier; based at least in part on detectedsteganographic indicia, generating an electronic version of the physicalapplication document including a portion to receive requestedapplication information from an applicant; and associating theplural-bit identifier with a plurality of records associated with theapplicant or the physical application document.
 2. The method of claim 1wherein the physical application document comprises a driver's licenseapplication.
 3. The method of claim 1 wherein the steganographic indiciacomprises a spatial orientation that is used to help generate theelectronic version of the physical application document.
 4. The methodof claim 1 wherein the steganographic indicia comprises a digitalwatermark.
 5. The method of claim 1 wherein said generating comprisesproviding image data from the electronic data for use as at least one ofa background or overlay image in the electronic version.
 6. The methodof claim 1 further comprising receiving user input and associating theuser input in at least one of a first field and a second field in theelectronic version.
 7. The method of claim 6 further comprising storingthe user input as an XML file.
 8. The method of claim 1, furthercomprising associating second steganographic indicia with the electronicversion, and printing the electronic version so as to include the secondsteganographic information.
 9. The method of claim 8, wherein the secondsteganographic indicia is associated with the applicant or the physicalapplication document.
 10. A computer readable medium comprisinginstructions to cause an electronic processor to perform the method ofclaim
 1. 11. The method of claim 1 wherein the steganographic indiciacomprises data corresponding to a document template, and said act ofgenerating uses the data to help create the electronic version inaccordance with the template.
 12. A programmed computing devicecomprising instructions stored in memory, said instructions are forcausing said programmed computing device to perform the method ofclaim
 1. 13. A method comprising: obtaining electronic datacorresponding to a physical application document; analyzing theelectronic data to detect steganographic indicia encoded therein, thesteganographic indicia comprising a plural-bit identifier; determining,based at least in part on the steganographic indicia, a relativelocation of a first area and a second area with respect to the printeddocument; based at least in part on detected steganographic indicia,generating an electronic version of the physical application documentincluding a portion to receive requested application information from anapplicant, in which said generating utilizes at least the relativelocation of the first area and the second area to spatially position afirst field and a second field within the electronic version, the firstfield and the second field comprising fields to receive user input; andassociating the plural-bit identifier with a plurality of recordsassociated with the applicant or the physical application document. 14.A computer readable medium comprising instructions to cause anelectronic processor to perform the method of claim
 13. 15. A programmedcomputing device comprising instructions stored in memory, saidinstructions are for causing said programmed computing device to performthe method of claim
 13. 16. A method comprising: obtaining electronicdata corresponding to an application document to obtain a driver'slicense; analyzing the electronic data to detect steganographic indiciaencoded therein, the steganographic indicia comprising a plural-bitidentifier; associating the plural-bit identifier with a plurality ofdifferent records associated with the application document; andgenerating an electronic form based at least in part on thesteganographic indicia, the electronic form comprising at least onefield to receive user input.
 17. The method of claim 16 wherein thesteganographic indicia comprises at least one field type name orindicator.
 18. The method of claim 17 wherein the at least one fieldtype name or indicator comprises an XML descriptor or tag.
 19. Themethod of claim 18 wherein user input is associated with the at leastone XML descriptor or tag.
 20. A computer readable medium comprisinginstructions stored thereon to cause an electronic processor to performthe method of claim
 16. 21. A programmed computing device comprisinginstructions stored in memory, said instructions are for causing saidprogrammed computing device to perform the method of claim 16.