JP2006130895A - Composite visual effect cryptographic printer - Google Patents
Composite visual effect cryptographic printer Download PDFInfo
- Publication number
- JP2006130895A JP2006130895A JP2004351989A JP2004351989A JP2006130895A JP 2006130895 A JP2006130895 A JP 2006130895A JP 2004351989 A JP2004351989 A JP 2004351989A JP 2004351989 A JP2004351989 A JP 2004351989A JP 2006130895 A JP2006130895 A JP 2006130895A
- Authority
- JP
- Japan
- Prior art keywords
- character
- pattern
- encrypted
- encryption
- dummy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
Description
この発明は、紙面に印刷した見た目に意味を成さない記号を、透明シートに印刷した復号パターンを透して見ることで、意味のある文章として認識できる視覚複合型暗号に関する。 The present invention relates to a visual composite code that can recognize a sign that is not visually meaningful printed on paper as a meaningful sentence by looking through a decryption pattern printed on a transparent sheet.
インターネットの普及した現在では、特定の情報にアクセスするためのパスワードを個人で複数持つことは普通のこととなっている。
しかしながら、このパスワードを管理する手段が等閑になっている実情がある。With the spread of the Internet, it is normal to have multiple passwords for accessing specific information.
However, there is a fact that the means for managing this password has become quiet.
本発明は、印刷物として手帳などに挟み込んでおいて他人の目に触れたとしても、大事なパスワードなどの情報を知られず、かつ、本人が知りたいときに容易に見ることができる手段を提供することを課題とする。 The present invention provides a means by which information such as an important password is not known even if it is sandwiched in a notebook as a printed matter and touched by another person, and can be easily viewed when the person wants to know it. This is the issue.
以上の課題を解決するために、暗号にする文字(1)、ダミーの文字1(2)、ダミーの文字2(3)の3つのフォントを用意する。
暗号にする文字(1)は、暗号にする文字の暗号化マスクパターン(4)とお互いの黒い部分だけを取り出すAND演算処理により、暗号にする文字の暗号結果(7)のイメージをえる。
ダミーの文字1(2)は、ダミーの文字1の暗号化マスクパターン(5)とAND演算処理を行い、ダミーの文字1の暗号結果(8)のイメージをえる。
ダミーの文字2(3)は、ダミーの文字2の暗号化マスクパターン(6)とAND演算処理を行い、ダミーの文字2の暗号結果(9)のイメージをえる。
暗号にする文字の暗号結果(7)、ダミーの文字1の暗号結果(8)、ダミーの文字2の暗号結果(9)を全ての黒い部分を書き出すOR演算処理により、暗号印刷イメージ(10)を書面に印刷する。
暗号にする文字の暗号化マスクパターン(4)の、白と黒の部分を反転したのが、復号パターン(11)で、これを透明シートに印刷する。
書面に印刷した暗号印刷イメージ(10)の上に、透明シートに印刷した復号パターン(11)を重ねて見ることで、復号イメージ(12)が得られる。In order to solve the above problems, three fonts are prepared: a character to be encrypted (1), a dummy character 1 (2), and a dummy character 2 (3).
For the character (1) to be encrypted, an image of the encryption result (7) of the character to be encrypted is obtained by AND operation processing for extracting only the black part of the encryption mask pattern (4) of the character to be encrypted.
The dummy character 1 (2) is ANDed with the encryption mask pattern (5) of the
The dummy character 2 (3) is ANDed with the encryption mask pattern (6) of the dummy character 2 to obtain an image of the encryption result (9) of the dummy character 2.
The encrypted print image (10) is obtained by OR operation processing for writing out all black portions of the encrypted result (7) of the character to be encrypted, the encrypted result (8) of the
The white and black portions of the encryption mask pattern (4) of the character to be encrypted are reversed, and the decryption pattern (11) is printed on the transparent sheet.
The decrypted image (12) is obtained by superimposing the decrypted pattern (11) printed on the transparent sheet on the encrypted print image (10) printed on the document.
請求項2に記載の発明は、請求項1に記載の暗号にする文字の暗号化マスクパターン(4)、ダミーの文字1の暗号化マスクパターン(5)、ダミーの文字2の暗号化マスクパターン(6)に座標変換処理を施すものである。
回転座標変換関数(13)に適当な数値を設定することで、回転したマスクパターン(15)が得られる。
螺旋座標変換関数(14)に適当な数値を設定することで、螺旋変形したマスクパターン(16)が得られる。The invention according to claim 2 is the encryption mask pattern (4) of the character to be encrypted according to
By setting an appropriate numerical value to the rotation coordinate conversion function (13), a rotated mask pattern (15) is obtained.
By setting an appropriate numerical value in the helical coordinate conversion function (14), a mask pattern (16) deformed in a spiral is obtained.
請求項1に記載の発明によれば、暗号印刷イメージ(10)を印刷した書面を手帳などに挟み込んでおく。
パスワードなどの情報を知りたいときに、復号パターン(11)を印刷した透明シートを、暗号印刷イメージ(10)を印刷した書面の上に重ねればよい。
格子のパターンは、人間の脳の錯覚で邪魔にならない傾向があるため視認性が良く、かつ、その単純なパターンにかかわらず、2つ以上のダミーの文字を重ねているため、暗号として実用的な強度を持たせられるのである。
より暗号度を強化するには、格子の幅を可変にしたり、マスクパターンの格子の出現順を変えたりするのもよい。According to the first aspect of the present invention, a document on which the encrypted print image (10) is printed is sandwiched between notebooks or the like.
When it is desired to know information such as a password, a transparent sheet on which the decryption pattern (11) is printed may be superimposed on a document on which the encrypted print image (10) is printed.
The lattice pattern has good visibility because it tends not to get in the way of the illusion of the human brain, and it is practical as a cipher because two or more dummy characters are superimposed regardless of its simple pattern. It can be given a strong strength.
In order to further enhance the degree of encryption, it is also possible to change the width of the lattice or change the appearance order of the lattice of the mask pattern.
請求項2に記載の発明によれば、マスクパターンに座標変換処理を施すことで、暗号度を強化することができる。 According to the second aspect of the present invention, the encryption degree can be strengthened by performing the coordinate conversion process on the mask pattern.
パーソナルコンピュータのアプリケーションとして実現する。
まず、パスワードなどの秘密にしたい情報を入力すると、ダミーの文字をランダムに自動生成し、暗号印刷イメージ(10)を書面に印刷する。
復号パターン(11)は、OHPシートなどの透明なものに印刷し、名刺などのサイズにすれば携帯に便利である。
そうすれば、書面に印刷した暗号印刷イメージ(10)は、手帳などに挟んで、透明シートに印刷した復号パターン(11)は、カード入れ、あるいは、財布などに入れて携行でき、他人には同時に2つのものが渡らないようにすれば安心である。Realized as a personal computer application.
First, when information to be kept secret such as a password is input, dummy characters are automatically generated at random, and the encrypted print image (10) is printed on the document.
The decryption pattern (11) is convenient to carry if it is printed on a transparent material such as an OHP sheet and is made a size such as a business card.
Then, the encrypted print image (10) printed on the document can be sandwiched in a notebook or the like, and the decryption pattern (11) printed on the transparent sheet can be carried in a card or wallet. It is safe to prevent two things from crossing at the same time.
1 暗号にする文字 2 ダミーの文字1
3 ダミーの文字2
4 暗号にする文字の暗号化マスクパターン
5 ダミーの文字1の暗号化マスクパターン
6 ダミーの文字2の暗号化マスクパターン
7 暗号にする文字の暗号結果 8 ダミーの文字1の暗号結果
9 ダミーの文字2の暗号結果 10 暗号印刷イメージ
11 復号パターン 12 復号イメージ
13 回転座標変換関数 14 螺旋座標変換関数
15 回転したマスクパターン 16 螺旋変形したマスクパターン1 Character to be encrypted 2 Dummy
3 Dummy character 2
4 Encryption mask pattern of character to be encrypted 5 Encryption mask pattern of
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004351989A JP2006130895A (en) | 2004-11-05 | 2004-11-05 | Composite visual effect cryptographic printer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004351989A JP2006130895A (en) | 2004-11-05 | 2004-11-05 | Composite visual effect cryptographic printer |
Publications (1)
Publication Number | Publication Date |
---|---|
JP2006130895A true JP2006130895A (en) | 2006-05-25 |
Family
ID=36724851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2004351989A Pending JP2006130895A (en) | 2004-11-05 | 2004-11-05 | Composite visual effect cryptographic printer |
Country Status (1)
Country | Link |
---|---|
JP (1) | JP2006130895A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011097192A (en) * | 2009-10-27 | 2011-05-12 | Hanamaru Kk | Encrypted message transmission device, program, encrypted message transmission method, and authentication system |
JP2014072875A (en) * | 2012-10-02 | 2014-04-21 | Fuji Xerox Co Ltd | Image processor, correlation processing paper and image processing program |
DE102015114172A1 (en) * | 2015-08-26 | 2017-03-02 | Khs Gmbh | Method and system for printing on containers |
-
2004
- 2004-11-05 JP JP2004351989A patent/JP2006130895A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011097192A (en) * | 2009-10-27 | 2011-05-12 | Hanamaru Kk | Encrypted message transmission device, program, encrypted message transmission method, and authentication system |
JP2014072875A (en) * | 2012-10-02 | 2014-04-21 | Fuji Xerox Co Ltd | Image processor, correlation processing paper and image processing program |
DE102015114172A1 (en) * | 2015-08-26 | 2017-03-02 | Khs Gmbh | Method and system for printing on containers |
US10538110B2 (en) | 2015-08-26 | 2020-01-21 | Khs Gmbh | Method and system for printing containers |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8666065B2 (en) | Real-time data encryption | |
JP5217178B2 (en) | Document processing apparatus and program | |
CA2626264A1 (en) | Methods and apparatus for encrypting, obfuscating and reconstructing datasets or objects | |
WO2007045818A1 (en) | Methods and apparatus for encrypting, obfuscating and reconstructing datasets or objects | |
JP2009139722A (en) | Encryption method and encryption device using color | |
KR20140026513A (en) | More secure image-based ??captcha??technique | |
Juneja | An XML transformed method to improve effectiveness of graphical password authentication | |
KR20240027072A (en) | Circular code, coding method, circular code identification method, circular code application method, stamp and electronic file | |
JP2006130895A (en) | Composite visual effect cryptographic printer | |
JP2001118122A (en) | Recording medium utilizing visual decoding type cryptography | |
Roy et al. | A text based steganography technique with Indian root | |
JP2006261718A (en) | Document processing apparatus and method | |
US20150014980A1 (en) | Method and system for authenticating printed documents | |
Bhattacharyya et al. | Secure data hiding in binary text document for authentication | |
CN102750485A (en) | Verification code picture encryption algorithm | |
JP2004289456A (en) | Method and device for processing document file containing section to be secret, image forming medium, and program thereof | |
JP2008219899A (en) | Digital composite device and memory medium storing authentication program of digital composite device | |
Lai et al. | A large payload webpage data embedding method using CSS attributes modification | |
JP2012123528A (en) | Information processor and information processing program | |
JP4093035B2 (en) | ENCRYPTION SYSTEM, ENCRYPTION METHOD, AND ENCRYPTION PROGRAM | |
Johnson | The Right of Publicity: Privacy Reimagined for a Public World | |
Ings | Unhappy bedfellows | |
JP2008052396A (en) | Information management system | |
Rafat | Cutting Edge Steganography Using HTML Document-An Appraisal | |
JP5413106B2 (en) | Encryption information decryption method, display device, decryption information printing film |