CN104766265B - Hierarchical access security control equipment and method for paper financial archives - Google Patents

Hierarchical access security control equipment and method for paper financial archives Download PDF

Info

Publication number
CN104766265B
CN104766265B CN201510100857.5A CN201510100857A CN104766265B CN 104766265 B CN104766265 B CN 104766265B CN 201510100857 A CN201510100857 A CN 201510100857A CN 104766265 B CN104766265 B CN 104766265B
Authority
CN
China
Prior art keywords
area
secret
file
paper
secret information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510100857.5A
Other languages
Chinese (zh)
Other versions
CN104766265A (en
Inventor
石利芳
孙晓红
颜斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University of Science and Technology
Original Assignee
Shandong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University of Science and Technology filed Critical Shandong University of Science and Technology
Priority to CN201510100857.5A priority Critical patent/CN104766265B/en
Publication of CN104766265A publication Critical patent/CN104766265A/en
Application granted granted Critical
Publication of CN104766265B publication Critical patent/CN104766265B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a device and a method for controlling hierarchical access security of a paper financial file. The safety control apparatus includes: a confidential information dividing device for dividing the confidential information to be printed into two totally meaningless separate images; the secret file and mask printing equipment is used for outputting a paper file and a projection film, wherein one split memory image is printed in a secret information area of the paper file, and the other split memory image is printed on the projection film; and a secret file reading device for recovering the secret information in the secret information area of the paper file by using the projection film. The invention has the advantages of safety of secret information, simple decryption, no need of a computer and the like, and is suitable for security control of paper archives such as financial affairs, audit and the like of public institutions and enterprise units.

Description

Hierarchical access security control equipment and method for paper financial archives
Technical Field
The invention belongs to the technical field of cryptography, image processing and power electronics, and particularly relates to a hierarchical access security control device and a hierarchical access security control method for a paper financial file.
Background
At present, paper archives are still important carriers for archives management in many fields. Most of the financial archives are taken as examples, and the financial archives comprise original financial bills, financial statements, audit reports, audit report attached tables and the like. And part of confidential financial data needs to be hierarchically controlled according to the confidentiality level. For example, the bill is divided into two levels of disclosure and confidentiality, and any person in the unit can refer to the file with the disclosed security level, but the authorized person can refer to the file with the confidential security level only under the authorization of the upper-level department, such as an authorized auditor and the like.
The existing device/method for acquiring partial or all file contents according to the security level mainly aims to divide a file into secrets or disclosures, store the confidential file and the published file in different places, and ensure the security of the confidential file in the forms of a password locker, a lock and the like. However, the above-mentioned apparatus/method has the following technical problems in practical application:
(1) inability to control security level within a page of file
For example, for a given file, part of the content on a page may be public, but part of the content needs to be kept secret; in this case, it is obviously inappropriate to divide the page file into a private file and a public file;
(2) inability to achieve fine control of authorization
Authorized personnel can only access files related to the work of the authorized personnel within a certain security level, for example, authorized auditors can only refer to the infrastructure audit secret files and cannot refer to the financial audit secret files;
or a person authorized by a security level can obtain all the files of the security level even if some files are irrelevant to the working field.
Disclosure of Invention
Aiming at the technical problems in the prior art, the invention provides the hierarchical access security control equipment for the paper financial archives, which can realize the classified division and the hierarchical acquisition of the content in one page of archives and is beneficial to realizing the fine control of authorization.
In order to achieve the purpose, the invention adopts the following technical scheme:
a hierarchical access security control device for paper financial archives, comprising:
a confidential information dividing device for dividing the confidential information to be printed into two totally meaningless separate images;
the secret file and mask printing equipment is used for outputting a paper file and a projection film; one of the separate storage images is printed on a secret information area of the paper file, and the other separate storage image is printed on a projection film;
and a secret file reading device for recovering the secret information in the secret information area of the paper file by using the projection film.
Further, the confidential information division device is a computer running a visible encryption program.
Further, the secret archive and mask printing device is composed of a paper archive printing device and a transparent film printing device.
Further, the secret information area of the paper file consists of two parts, namely a separate storage image printing area and a positioning mark area; the positioning mark area is positioned at the outer side of the separate image printing area, and a positioning mark is arranged in the positioning mark area.
Furthermore, the projection film consists of three parts, namely a separate storage image printing area, a positioning mark area and a handheld area; the positioning mark area is positioned at the outer side of the separate image printing area, and a positioning mark is arranged in the positioning mark area.
Further, the positioning mark is in a cross shape.
Further, the secret profile reading device comprises a top LED light array and a bottom plate; a piece of ground glass is mounted below the top LED lamp array.
Further, a bottom LED lamp array is arranged in the bottom plate in a clamping mode; a piece of ground glass is arranged above the bottom LED lamp.
In addition, the invention also provides a hierarchical access security control method of the paper financial archives, and the technical scheme is as follows:
a hierarchical access security control method for paper financial archives comprises the following steps:
a step for dividing the secret information to be printed into two totally meaningless separate images;
a step for printing one of the separate images on the secret information area of the paper file and simultaneously printing the other separate image on the projection film;
and recovering the secret information in the secret information area of the paper file by using the projection film.
Wherein, the step of recovering the secret information in the secret information area of the paper file by using the projection film further comprises the following steps:
superposing the projection film and the secret information area of the paper file, and reading the content of the secret information by utilizing reflected light.
The invention has the following advantages:
1) the encryption process has theoretical complete safety
The visual encryption method adopted by the invention has perfect safety. This ensures that the information printed on the file does not reveal any confidential information, that the information printed on the projection film does not reveal any confidential information, that if only one of them is held, no information about the confidential file can be derived therefrom, and that the confidential information in the file can only be recovered by superimposing the two.
2) The decryption process does not need any computer
During decryption, the contents of the secret information can be read only by overlapping the projection film and the secret information area of the paper file;
3) realizing the graded acquisition of the file information in a piece of paper
The ordinary person can only read the public information, and the authorized person can read the secret information in the secret information area by means of the projection film;
4) fine authorization beneficial to realizing graded acquisition of archives
The method can control authorized personnel to read only the secret information in a specific range by controlling the type of the projection film;
for example, for two different types of confidential data, two different types of projection films are used respectively, so that an authorized person can only obtain confidential archive data of a specific type;
5) unlike traditional visible cipher, the present invention prints one of the partial images on paper file and the other partial image on transparent film for reading via superposing and reflecting light. This approach not only conforms to common reading habits, but also facilitates copying/scanning of the decrypted image, since both copiers and scanners operate by reflecting light.
6) Aiming at the most common paper carriers such as financial bills, audit files and the like at present, security level hierarchical control is provided for the paper carriers; furthermore, the invention is also suitable for the security classification control of the electronic files under the condition of decoding by a computer.
Drawings
FIG. 1 is a schematic structural diagram of a hierarchical access security control device for paper financial documents in the present invention;
FIG. 2 is a schematic diagram of secret partitioning according to the present invention;
FIG. 3 is a schematic diagram of the generation of a paper file and a projection film in accordance with the present invention;
FIG. 4 is a schematic view of the confidential information area of the paper file of the present invention;
FIG. 5 is a schematic view of a projection film of the present invention;
FIG. 6 is a schematic view showing the superposition of the projection film and the secret information area of the paper file in accordance with the present invention;
FIG. 7 is a schematic diagram of the arrangement of the bottom plate and the bottom LED lamp array of FIG. 1;
FIG. 8 is a schematic diagram of the power and control circuitry for the top and bottom LED light arrays of the present invention;
FIG. 9 is a schematic diagram of the projection film and the secret information area of the paper file overlapping and overlapping to recover the secret information; the method comprises the following steps of 1-confidential information segmentation equipment, 2-secret file and mask printing equipment, 3-secret file reading equipment, 4-paper file printing equipment, 5-transparent film printing equipment, 6-secret information area of paper file, 7-projection film, 8-separate storage image printing area, 9-positioning mark area, 10-positioning mark, 11-separate storage image printing area, 12-positioning mark area, 13-handheld area, 14-positioning mark, 15-top LED lamp array, 16-bottom plate and 17-bottom LED lamp array.
Detailed Description
The invention is described in further detail below with reference to the following figures and detailed description:
referring to fig. 1, the hierarchical access security control device for paper financial archives includes a confidential information dividing device 1, a secret archive and mask printing device 2, and a secret archive reading device 3.
The confidential information division apparatus 1 is a computer running a visible encryption program. The computer may be a personal computer or an embedded computer, and needs to have the capability of reading an input image and driving the printing apparatus.
The invention has low requirement on the computing power of the computer, and the common personal computer, the DSP processor and even the 16-bit singlechip system can run the secret segmentation algorithm.
And the secret segmentation algorithm is used for segmenting the secret information binary image to be printed on the paper file into two totally meaningless separate images a and b, as shown in fig. 3.
If the size of the original secret image is M × N, the size of the split-memory image is 2M × 2N, i.e., each pixel of the secret image corresponds to a 2 × 2 sized image block on the split-memory image. The secret segmentation procedure reads each pixel in the secret image in turn and then decides the image blocks on the saved image according to the rules shown in fig. 2.
For example, if the pixel of the secret image is a black pixel (first row of the table of fig. 2), the pixel block of the classified image a is
Figure DEST_PATH_GDA0000710492550000041
And the pixel block of the divided image b is
Figure DEST_PATH_GDA0000710492550000042
Therefore, after the two separately stored images a and b are superposed, the corresponding image block is completely black. To further increase security, the image blocks in fig. 2 must be scrambled first, and it is necessary to ensure that the scrambling modes of the image blocks of the two separately stored images are consistent. Thus, when an attacker intercepts a saved image, the secret image pixels cannot be recovered.
It has been demonstrated in both literature and monographs of visual cryptography that this scrambling ensures that the visual cryptography system has the Perfect security (Perfect Secrecy) defined by Shannon (Shannon). The algorithm may be implemented using common programming languages such as C, Matlab, etc. The output segmented images a, b may be stored in a bitmap format, such as the bmp format.
The secret document and mask printing device 2 consists of a paper document printing device 4 and a transparent film printing device 5, as shown in fig. 3.
The paper archive printing device 4 can be a common ink-jet printer or a laser printer. Two cases need to be considered.
In the first case, the financial bill, the file and the like exist in a paper form, and at the moment, only the separate storage image a needs to be printed on the self-adhesive sticker, and then the self-adhesive sticker is pasted at the corresponding positions of the financial bill, the file and the like;
in the second case, the original finance and audit file exists in the form of electronic document, for example, word format, and only the bitmap corresponding to the separate image a needs to be inserted into the corresponding position in the electronic document, and then the hard copy is printed out.
In either case, the confidential information area 6 of the paper file is printed with the save image a through the printing process.
Specifically, the paper file is composed of an open information area and a secret information area 6.
The secret information area 6 of the paper file is composed of two parts, namely a separate storage image printing area 8 and a positioning mark area 9, wherein the positioning mark area 9 is positioned outside the separate storage image printing area 8, as shown in fig. 4.
A positioning mark 10 is provided in the positioning mark region 9. In the embodiment of the present invention, four positioning marks 10 are in a cross shape, and are respectively located at four corners of the positioning mark area 9, and are used for positioning the secret information area of the projection film and the paper file.
Of course, the present invention is not limited in any way as to the shape, number and position of the positioning mark 10.
The transparent film printing apparatus 5 is composed of a laser printer and a projection film, thereby ensuring that the film is not deformed by high temperature during the output process. Specifically, the transparent film printing device 5 is used to print the separate images b onto the projection film 7.
The projection film 7 is managed as a key and distributed only to authorized users for reading the secret files which they are authorized to read.
The projection film 7 consists of three parts, namely a separate storage image printing area 11, a positioning mark area 12 and a handheld area 13; the positioning mark area 12 is located outside the separately stored image printing area 11, and the hand-held areas 13 are located on the left and right sides of the positioning mark area 12, and the size of the positioning mark area is just suitable for clamping a thumb and an index finger, so that the binary image on the projection film 7 is ensured not to be damaged, as shown in fig. 5.
Within the landmark region 12 is printed a landmark 14. In the embodiment of the present invention, there are also four positioning marks 14, which are in a cross shape and located at four corners of the positioning mark area 12, respectively, for positioning the secret information area of the projection film and the paper file.
Of course, the present invention is not limited in any way as to the shape, number and position of the positioning marks 14.
The positioning mark 10 and the positioning mark 14 are used together, and when the positioning mark 10 and the positioning mark 14 are superposed, the projection film 7 is superposed and superposed with the secret information area 6 of the paper file.
Through the above-described process, the secret document and the mask printing device 2 output the paper document and the projection film 7, respectively, as shown in fig. 4 and 5. The management of the paper secret files can be the same as that of common files, and special password cabinets and password libraries are not needed. But the projective film 7 needs to be managed like a key and put in a locker.
The present invention saves a significant amount of space by storing only the projection film 7 as compared to storing files in a password locker. Projection film 7 is only available to authorized users, such as authorized auditors and superior audit personnel. After obtaining the secret archive and the projected film, the authorized user can read the secret information in the archive using the secret archive reading device 3 of the present invention.
The secret archive reading device 3 comprises a top LED light array 15 and a bottom plate 16, as shown in fig. 1.
The reader lays the paper file containing the secret information on the bottom plate 16, turns on the top LED lamp array 15, and then superimposes the projection film 7 on the secret information area 6 of the paper file, as shown in fig. 6, so that the recovered secret information can be read, as shown in fig. 9. The invention adopts reflected light to read the recovered binary image, namely the top LED lamp array 15 irradiates on the superposed secret image, the reflection of black and white pixels on the secret binary image to light rays is different, and human eyes distinguish different intensities of the reflected light so as to read patterns and information in the secret image, which is fundamentally different from the traditional decryption method of visible encryption.
In the traditional visual password, two separate images a and b are printed on transparent films, and when the two separate images are decrypted, the two transparent films are superposed, so that the transmissivity of different areas of the binary image to light is different, and an observer can distinguish black and white pixels.
In contrast, the invention prints one copy of the partial image a on opaque common copy paper, and prints the other copy of the partial image b on transparent film, thus the partial image can not be read by transmission.
In the present invention, the top LED lamp array 15 provides a reflective light source for reading the superimposed secret image, and is composed of 24 high-brightness white scattering LEDs, a piece of ground glass (about 3mm later) is installed below the LED array to soften and homogenize the light emitted from the LEDs, and a control circuit thereof is shown in fig. 8.
When we close the single pole single throw switch K1, the LED light array 15 lights up. In addition to the top LED light array 15, a bottom LED light array 17 may be clamped within the base plate 16.
The bottom LED lamp array 17 is arranged to provide a portion of the transmitted light, since the paper carrier used in the present invention is not completely opaque, but partially transparent. This arrangement of a set of bottom LED light arrays 17 for providing transmitted light increases the ability and accuracy of the user to identify the contents of the superimposed secret image. The bottom LED lamp array 17 is arranged as shown in fig. 7.
Wherein, the bottom plate 16 is 3 cm in height, the horizontal area should guarantee to place ordinary A4 copy paper, 24 LED lamps at the bottom of bottom plate 16 are in 4 rows and 6 columns and are evenly arranged to guarantee to provide even transmitted light for whole breadth.
In addition, a piece of ground glass is also mounted on the upper portion of the bottom plate 16 in order to smooth and uniformize the LED transmission light. The ground glass is of the same thickness as the ground glass selected for the top LED light array 15. Meanwhile, the frosted glass also bears the weight of the paper file. The control circuit for the bottom LED light array 17 is shown in fig. 8, and when switch K2 is closed, the bottom LED light array 17 is turned on.
Depending on the type of light source used, the secret profile reading device 3 has four modes of operation in common: (1) a natural light mode, (2) a reflected light mode, (3) a transmitted light mode, and (4) a mixed light mode.
If the switches K1 and K2 in fig. 8 are turned off, the top LED lamp array 15 and the bottom LED lamp array 17 do not emit light, and natural light of the surrounding environment such as sunlight and indoor lighting can be used, and the natural light is used as a reflection light source;
if the switch K1 is turned on and the switch K2 is turned off, only the top LED lamp array 15 emits light and the secret document reading device 3 operates using the reflected light;
if the switch K1 is turned off and the switch K2 is turned on, only the bottom LED lamp array 17 emits light, and the secret file reading device 3 operates using transmitted light;
if switches K1 and K2 are closed simultaneously, both the top LED light array 15 and the bottom LED light array 17 are illuminated and the secret profile reading apparatus 3 operates in a mixed light mode while operating with reflected and transmitted light.
The power supply and control circuit for the top LED lamp array 15 and the bottom LED lamp array 17 is shown in fig. 8, and comprises three modules, namely an ac voltage division and current limitation protection circuit, a rectification filter circuit and an LED array control circuit.
When 220V alternating current commercial power is input, an alternating current voltage division and current limiting protection circuit is accessed through a fuse F1 (0.5A).
(1) The alternating current voltage division and current limitation protection circuit is composed of a capacitor C1, a resistor R1 and a resistor R2, wherein the capacitor C1 plays a role in alternating current voltage division, a capacitor of 1 muF/400V is used in the design, the capacitance value can ensure that safe working current of about 20mA can be provided for each path of LED lamp, the resistor R1 is a bleeder resistor of C1, the resistance value is 1 MOmega, and the resistor R2 plays a role in current limitation protection, because the power supply circuit is a typical rectifier power supply, large impact current can be generated at the moment of power on, the impact current can be limited by setting the resistor R2, a rectifier bridge and a filter capacitor are protected, and the resistor R2 is 470 MOmega/1W.
(2) The rectifying and filtering circuit consists of a rectifying bridge B1, a filter capacitor C2 and a current-limiting protection resistor R3. The rectifier bridge is composed of 4 1N4007 rectifier diodes, the maximum working current is 1A, the capacitor C2 is an electrolytic capacitor of 4.7 muF/100V and plays a role in filtering, the resistor R3 is used for current limiting protection, namely if one path of the subsequent two-path diode array is short-circuited, the current is limited by R3, and R3 is 470 omega/1W.
(3) The LED array control circuit consists of two LED arrays, each of which comprises 24 white scattering high-brightness LEDs, and the connection of each LED array is controlled by switches K1 and K2.
The secret archive reading device 3 can restore the contents of the secret information area in the secret archive as shown in fig. 9. The secret information area 6 of the paper file of fig. 4 and the projection film 7 of fig. 5 are aligned and superimposed, and the content of the secret information area, which is a binary image composed of four words "confidential areas" in the embodiment of the present invention, can be restored by means of reflected light and/or transmitted light provided by the secret file reading device 3. In practice the area may be any printed or handwritten binary image including printed text, signatures, handwritten instructions, handwritten modifications, patterns etc.
It should be understood, however, that the description herein of specific embodiments is not intended to limit the invention to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims.

Claims (1)

1. A hierarchical access security control method for paper financial archives adopts hierarchical access security control equipment for the paper financial archives, and the hierarchical access security control equipment for the paper financial archives comprises
A confidential information dividing device for dividing the confidential information to be printed into two totally meaningless separate images;
the secret file and mask printing equipment is used for outputting a paper file and a projection film; one of the separate storage images is printed on a secret information area of the paper file, and the other separate storage image is printed on a projection film;
the secret file reading device recovers the secret information in the secret information area of the paper file by using the projection film;
superposing the projection film and the secret information area of the paper file, and reading the content of the secret information by utilizing reflected light;
the secret archive reading device comprises a top LED lamp array and a bottom plate; a piece of ground glass is arranged below the top LED lamp array; a bottom LED lamp array is arranged in the bottom plate through clamping; a piece of ground glass is arranged above the bottom LED lamp;
the secret information area of the paper file consists of two parts, namely a separate storage image printing area and a positioning mark area; the positioning mark area is positioned at the outer side of the separately stored image printing area, and a positioning mark is arranged in the positioning mark area and is in a cross shape;
the projection film consists of three parts, namely a separate storage image printing area, a positioning mark area and a handheld area; the positioning mark area is positioned at the outer side of the separate storage image printing area, and a positioning mark is arranged in the positioning mark area; the positioning mark is in a cross shape;
the number of the positioning marks in each positioning mark area is four, and the positioning marks are respectively positioned at four corners of the corresponding positioning mark area;
the confidential information segmentation device is a computer running a visual encryption program;
the secret file and mask printing equipment consists of paper file printing equipment and transparent film printing equipment;
it is characterized by comprising:
a step for dividing the secret information to be printed into two totally meaningless separate images;
a step for printing one of the separate images on the secret information area of the paper file and simultaneously printing the other separate image on the projection film;
recovering the secret information in the secret information area of the paper file by using the projection film;
superposing the projection film and the secret information area of the paper file, and reading the content of the secret information by utilizing reflected light.
CN201510100857.5A 2015-03-09 2015-03-09 Hierarchical access security control equipment and method for paper financial archives Expired - Fee Related CN104766265B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510100857.5A CN104766265B (en) 2015-03-09 2015-03-09 Hierarchical access security control equipment and method for paper financial archives

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510100857.5A CN104766265B (en) 2015-03-09 2015-03-09 Hierarchical access security control equipment and method for paper financial archives

Publications (2)

Publication Number Publication Date
CN104766265A CN104766265A (en) 2015-07-08
CN104766265B true CN104766265B (en) 2020-04-07

Family

ID=53648077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510100857.5A Expired - Fee Related CN104766265B (en) 2015-03-09 2015-03-09 Hierarchical access security control equipment and method for paper financial archives

Country Status (1)

Country Link
CN (1) CN104766265B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2614370Y (en) * 2003-04-30 2004-05-05 四川大学 False proof apparatus with multiple image concealing
CN1157677C (en) * 1998-12-30 2004-07-14 刘超 Invisible graphics context identifying system and fabrication method thereof
CN2671807Y (en) * 2003-12-16 2005-01-19 林武旭 Device having high resolution antio-fake printing membrane
CN102271927A (en) * 2008-11-03 2011-12-07 路易斯·阿尔佩托·万德莱 System and processes for protection of paper documents against falsification, adulteration and leakage

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101146168A (en) * 2006-06-30 2008-03-19 株式会社理光 Image processing apparatus and image processing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1157677C (en) * 1998-12-30 2004-07-14 刘超 Invisible graphics context identifying system and fabrication method thereof
CN2614370Y (en) * 2003-04-30 2004-05-05 四川大学 False proof apparatus with multiple image concealing
CN2671807Y (en) * 2003-12-16 2005-01-19 林武旭 Device having high resolution antio-fake printing membrane
CN102271927A (en) * 2008-11-03 2011-12-07 路易斯·阿尔佩托·万德莱 System and processes for protection of paper documents against falsification, adulteration and leakage

Also Published As

Publication number Publication date
CN104766265A (en) 2015-07-08

Similar Documents

Publication Publication Date Title
US7244043B2 (en) Method and system for a processor controlled illumination system for reading and analyzing materials
KR100653886B1 (en) Mixed-code and mixed-code encondig method and apparatus
RU2566261C2 (en) Method of authentication and/or identification of security article
US9443180B2 (en) Security label using printed LEDs
CN101743130B (en) Authenticity validation subject, authenticity validation chip reader, and authenticity judging method
JP6470646B2 (en) Method for generating secure barcode, barcode generation system, and two-dimensional barcode
US6785405B2 (en) Apparatus and method for document reading and authentication
US20080302263A1 (en) Infrared encoding of security elements using standard xerographic materials
US20130087620A1 (en) Method of, and system and label for, authenticating objects in situ
CN101686294B (en) Embedded type file information security management system
US20090087020A1 (en) Image processing method and image processing device
CN101622634A (en) Document with an optical transmitter
US20100007710A1 (en) Printing medium, image forming device, image information input device and digital multifunction device
JP2007011422A (en) Document processing method and apparatus, and program
JP7107467B1 (en) Information recording medium, information recording medium reader, program, reading method and system
US20080122219A1 (en) Method and apparatus for securing printed media
RU2726740C2 (en) Protected article comprising a combined image and/or detecting raster
US20070133792A1 (en) Image processing apparatus, control method therefor, computer program, and computer-readable storage medium
CN104766265B (en) Hierarchical access security control equipment and method for paper financial archives
WO2001059984A1 (en) Method of and system for counterfeit prevention
CN204576612U (en) A kind of graded access safety control device of papery financial affairs archive
CA3219617A1 (en) Self-verifying hidden digital media within other digital media
JP2011107605A (en) Secret sharing scheme of character information, and printed matter used for the same
JP2001344557A (en) Method and device for managing document
Teraura et al. Confidentiality of 2D code using infrared with cell-level error correction

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200407

Termination date: 20210309

CF01 Termination of patent right due to non-payment of annual fee