JP2006130895A - Composite visual effect cryptographic printer - Google Patents

Composite visual effect cryptographic printer Download PDF

Info

Publication number
JP2006130895A
JP2006130895A JP2004351989A JP2004351989A JP2006130895A JP 2006130895 A JP2006130895 A JP 2006130895A JP 2004351989 A JP2004351989 A JP 2004351989A JP 2004351989 A JP2004351989 A JP 2004351989A JP 2006130895 A JP2006130895 A JP 2006130895A
Authority
JP
Japan
Prior art keywords
character
pattern
encrypted
encryption
dummy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2004351989A
Other languages
Japanese (ja)
Inventor
Shinichi Komatsu
伸一 小松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to JP2004351989A priority Critical patent/JP2006130895A/en
Publication of JP2006130895A publication Critical patent/JP2006130895A/en
Pending legal-status Critical Current

Links

Images

Abstract

<P>PROBLEM TO BE SOLVED: To provide a means which can be inserted in a notebook as a printed matter and conceal valuable information such as password, even in case it happens to be seen by some other person, and can easily allow its bearer peruse the information, whenever he wants to. <P>SOLUTION: In this composite visual effect cryptographic printer, two or more dummy characters are superposed over each other in addition to characters to be coded, and the lattice-like pattern of a decoding sheet is formed. <P>COPYRIGHT: (C)2006,JPO&NCIPI

Description

この発明は、紙面に印刷した見た目に意味を成さない記号を、透明シートに印刷した復号パターンを透して見ることで、意味のある文章として認識できる視覚複合型暗号に関する。  The present invention relates to a visual composite code that can recognize a sign that is not visually meaningful printed on paper as a meaningful sentence by looking through a decryption pattern printed on a transparent sheet.

インターネットの普及した現在では、特定の情報にアクセスするためのパスワードを個人で複数持つことは普通のこととなっている。
しかしながら、このパスワードを管理する手段が等閑になっている実情がある。
With the spread of the Internet, it is normal to have multiple passwords for accessing specific information.
However, there is a fact that the means for managing this password has become quiet.

本発明は、印刷物として手帳などに挟み込んでおいて他人の目に触れたとしても、大事なパスワードなどの情報を知られず、かつ、本人が知りたいときに容易に見ることができる手段を提供することを課題とする。  The present invention provides a means by which information such as an important password is not known even if it is sandwiched in a notebook as a printed matter and touched by another person, and can be easily viewed when the person wants to know it. This is the issue.

以上の課題を解決するために、暗号にする文字(1)、ダミーの文字1(2)、ダミーの文字2(3)の3つのフォントを用意する。
暗号にする文字(1)は、暗号にする文字の暗号化マスクパターン(4)とお互いの黒い部分だけを取り出すAND演算処理により、暗号にする文字の暗号結果(7)のイメージをえる。
ダミーの文字1(2)は、ダミーの文字1の暗号化マスクパターン(5)とAND演算処理を行い、ダミーの文字1の暗号結果(8)のイメージをえる。
ダミーの文字2(3)は、ダミーの文字2の暗号化マスクパターン(6)とAND演算処理を行い、ダミーの文字2の暗号結果(9)のイメージをえる。
暗号にする文字の暗号結果(7)、ダミーの文字1の暗号結果(8)、ダミーの文字2の暗号結果(9)を全ての黒い部分を書き出すOR演算処理により、暗号印刷イメージ(10)を書面に印刷する。
暗号にする文字の暗号化マスクパターン(4)の、白と黒の部分を反転したのが、復号パターン(11)で、これを透明シートに印刷する。
書面に印刷した暗号印刷イメージ(10)の上に、透明シートに印刷した復号パターン(11)を重ねて見ることで、復号イメージ(12)が得られる。
In order to solve the above problems, three fonts are prepared: a character to be encrypted (1), a dummy character 1 (2), and a dummy character 2 (3).
For the character (1) to be encrypted, an image of the encryption result (7) of the character to be encrypted is obtained by AND operation processing for extracting only the black part of the encryption mask pattern (4) of the character to be encrypted.
The dummy character 1 (2) is ANDed with the encryption mask pattern (5) of the dummy character 1 to obtain an image of the encryption result (8) of the dummy character 1.
The dummy character 2 (3) is ANDed with the encryption mask pattern (6) of the dummy character 2 to obtain an image of the encryption result (9) of the dummy character 2.
The encrypted print image (10) is obtained by OR operation processing for writing out all black portions of the encrypted result (7) of the character to be encrypted, the encrypted result (8) of the dummy character 1, and the encrypted result (9) of the dummy character 2. On the document.
The white and black portions of the encryption mask pattern (4) of the character to be encrypted are reversed, and the decryption pattern (11) is printed on the transparent sheet.
The decrypted image (12) is obtained by superimposing the decrypted pattern (11) printed on the transparent sheet on the encrypted print image (10) printed on the document.

請求項2に記載の発明は、請求項1に記載の暗号にする文字の暗号化マスクパターン(4)、ダミーの文字1の暗号化マスクパターン(5)、ダミーの文字2の暗号化マスクパターン(6)に座標変換処理を施すものである。
回転座標変換関数(13)に適当な数値を設定することで、回転したマスクパターン(15)が得られる。
螺旋座標変換関数(14)に適当な数値を設定することで、螺旋変形したマスクパターン(16)が得られる。
The invention according to claim 2 is the encryption mask pattern (4) of the character to be encrypted according to claim 1, the encryption mask pattern (5) of the dummy character 1, and the encryption mask pattern of the dummy character 2 (6) is subjected to coordinate conversion processing.
By setting an appropriate numerical value to the rotation coordinate conversion function (13), a rotated mask pattern (15) is obtained.
By setting an appropriate numerical value in the helical coordinate conversion function (14), a mask pattern (16) deformed in a spiral is obtained.

請求項1に記載の発明によれば、暗号印刷イメージ(10)を印刷した書面を手帳などに挟み込んでおく。
パスワードなどの情報を知りたいときに、復号パターン(11)を印刷した透明シートを、暗号印刷イメージ(10)を印刷した書面の上に重ねればよい。
格子のパターンは、人間の脳の錯覚で邪魔にならない傾向があるため視認性が良く、かつ、その単純なパターンにかかわらず、2つ以上のダミーの文字を重ねているため、暗号として実用的な強度を持たせられるのである。
より暗号度を強化するには、格子の幅を可変にしたり、マスクパターンの格子の出現順を変えたりするのもよい。
According to the first aspect of the present invention, a document on which the encrypted print image (10) is printed is sandwiched between notebooks or the like.
When it is desired to know information such as a password, a transparent sheet on which the decryption pattern (11) is printed may be superimposed on a document on which the encrypted print image (10) is printed.
The lattice pattern has good visibility because it tends not to get in the way of the illusion of the human brain, and it is practical as a cipher because two or more dummy characters are superimposed regardless of its simple pattern. It can be given a strong strength.
In order to further enhance the degree of encryption, it is also possible to change the width of the lattice or change the appearance order of the lattice of the mask pattern.

請求項2に記載の発明によれば、マスクパターンに座標変換処理を施すことで、暗号度を強化することができる。  According to the second aspect of the present invention, the encryption degree can be strengthened by performing the coordinate conversion process on the mask pattern.

パーソナルコンピュータのアプリケーションとして実現する。
まず、パスワードなどの秘密にしたい情報を入力すると、ダミーの文字をランダムに自動生成し、暗号印刷イメージ(10)を書面に印刷する。
復号パターン(11)は、OHPシートなどの透明なものに印刷し、名刺などのサイズにすれば携帯に便利である。
そうすれば、書面に印刷した暗号印刷イメージ(10)は、手帳などに挟んで、透明シートに印刷した復号パターン(11)は、カード入れ、あるいは、財布などに入れて携行でき、他人には同時に2つのものが渡らないようにすれば安心である。
Realized as a personal computer application.
First, when information to be kept secret such as a password is input, dummy characters are automatically generated at random, and the encrypted print image (10) is printed on the document.
The decryption pattern (11) is convenient to carry if it is printed on a transparent material such as an OHP sheet and is made a size such as a business card.
Then, the encrypted print image (10) printed on the document can be sandwiched in a notebook or the like, and the decryption pattern (11) printed on the transparent sheet can be carried in a card or wallet. It is safe to prevent two things from crossing at the same time.

この発明の暗号化方法を示す模式図である。    It is a schematic diagram which shows the encryption method of this invention. この発明の復号方法を示す模式図である。    It is a schematic diagram which shows the decoding method of this invention. 座標変換処理のソースプログラムである。    This is a source program for coordinate transformation processing. 座標変換処理を施したマスクパターンを示す図である。    It is a figure which shows the mask pattern which performed the coordinate transformation process.

符号の説明Explanation of symbols

1 暗号にする文字 2 ダミーの文字1
3 ダミーの文字2
4 暗号にする文字の暗号化マスクパターン
5 ダミーの文字1の暗号化マスクパターン
6 ダミーの文字2の暗号化マスクパターン
7 暗号にする文字の暗号結果 8 ダミーの文字1の暗号結果
9 ダミーの文字2の暗号結果 10 暗号印刷イメージ
11 復号パターン 12 復号イメージ
13 回転座標変換関数 14 螺旋座標変換関数
15 回転したマスクパターン 16 螺旋変形したマスクパターン
1 Character to be encrypted 2 Dummy character 1
3 Dummy character 2
4 Encryption mask pattern of character to be encrypted 5 Encryption mask pattern of dummy character 1 6 Encryption mask pattern of dummy character 2 7 Encryption result of character to be encrypted 8 Encryption result of dummy character 1 9 Dummy character Encryption result of 2 10 Encryption print image 11 Decryption pattern 12 Decryption image 13 Rotating coordinate transformation function 14 Spiral coordinate transformation function 15 Rotated mask pattern 16 Spiral deformed mask pattern

Claims (2)

暗号化する文字のほかに、2つ以上のダミーの文字を重ねあわせ、復号シートのパターンを格子状とすることを特徴とする視覚複合型暗号印刷機。In addition to the characters to be encrypted, two or more dummy characters are overlapped to form a decryption sheet pattern in a lattice pattern. 前記復号シートのパターンは、回転、螺旋などの座標変換処理を施したことを特徴とする請求項1記載の視覚複合型暗号印刷機。The visual composite type encryption printing machine according to claim 1, wherein the pattern of the decryption sheet is subjected to coordinate conversion processing such as rotation and spiral.
JP2004351989A 2004-11-05 2004-11-05 Composite visual effect cryptographic printer Pending JP2006130895A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2004351989A JP2006130895A (en) 2004-11-05 2004-11-05 Composite visual effect cryptographic printer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2004351989A JP2006130895A (en) 2004-11-05 2004-11-05 Composite visual effect cryptographic printer

Publications (1)

Publication Number Publication Date
JP2006130895A true JP2006130895A (en) 2006-05-25

Family

ID=36724851

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2004351989A Pending JP2006130895A (en) 2004-11-05 2004-11-05 Composite visual effect cryptographic printer

Country Status (1)

Country Link
JP (1) JP2006130895A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011097192A (en) * 2009-10-27 2011-05-12 Hanamaru Kk Encrypted message transmission device, program, encrypted message transmission method, and authentication system
JP2014072875A (en) * 2012-10-02 2014-04-21 Fuji Xerox Co Ltd Image processor, correlation processing paper and image processing program
DE102015114172A1 (en) * 2015-08-26 2017-03-02 Khs Gmbh Method and system for printing on containers

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011097192A (en) * 2009-10-27 2011-05-12 Hanamaru Kk Encrypted message transmission device, program, encrypted message transmission method, and authentication system
JP2014072875A (en) * 2012-10-02 2014-04-21 Fuji Xerox Co Ltd Image processor, correlation processing paper and image processing program
DE102015114172A1 (en) * 2015-08-26 2017-03-02 Khs Gmbh Method and system for printing on containers
US10538110B2 (en) 2015-08-26 2020-01-21 Khs Gmbh Method and system for printing containers

Similar Documents

Publication Publication Date Title
US8666065B2 (en) Real-time data encryption
JP5217178B2 (en) Document processing apparatus and program
CA2626264A1 (en) Methods and apparatus for encrypting, obfuscating and reconstructing datasets or objects
WO2007045818A1 (en) Methods and apparatus for encrypting, obfuscating and reconstructing datasets or objects
JP2009139722A (en) Encryption method and encryption device using color
KR20140026513A (en) More secure image-based ??captcha??technique
Juneja An XML transformed method to improve effectiveness of graphical password authentication
KR20240027072A (en) Circular code, coding method, circular code identification method, circular code application method, stamp and electronic file
JP2006130895A (en) Composite visual effect cryptographic printer
JP2001118122A (en) Recording medium utilizing visual decoding type cryptography
Roy et al. A text based steganography technique with Indian root
JP2006261718A (en) Document processing apparatus and method
US20150014980A1 (en) Method and system for authenticating printed documents
Bhattacharyya et al. Secure data hiding in binary text document for authentication
CN102750485A (en) Verification code picture encryption algorithm
JP2004289456A (en) Method and device for processing document file containing section to be secret, image forming medium, and program thereof
JP2008219899A (en) Digital composite device and memory medium storing authentication program of digital composite device
Lai et al. A large payload webpage data embedding method using CSS attributes modification
JP2012123528A (en) Information processor and information processing program
JP4093035B2 (en) ENCRYPTION SYSTEM, ENCRYPTION METHOD, AND ENCRYPTION PROGRAM
Johnson The Right of Publicity: Privacy Reimagined for a Public World
Ings Unhappy bedfellows
JP2008052396A (en) Information management system
Rafat Cutting Edge Steganography Using HTML Document-An Appraisal
JP5413106B2 (en) Encryption information decryption method, display device, decryption information printing film