JP2012114556A - Camera system comprising multiple encryption function and managing method for the camera system - Google Patents

Camera system comprising multiple encryption function and managing method for the camera system Download PDF

Info

Publication number
JP2012114556A
JP2012114556A JP2010259953A JP2010259953A JP2012114556A JP 2012114556 A JP2012114556 A JP 2012114556A JP 2010259953 A JP2010259953 A JP 2010259953A JP 2010259953 A JP2010259953 A JP 2010259953A JP 2012114556 A JP2012114556 A JP 2012114556A
Authority
JP
Japan
Prior art keywords
key
image
encryption
camera
keys
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2010259953A
Other languages
Japanese (ja)
Inventor
Naoya Ota
直哉 太田
Yusaku Fujii
雄作 藤井
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
E JIKEI SYSTEM KK
Jikei System Kk E
NPO E JIKEI NETWORK PROMOTION INST
NPO E-JIKEI NETWORK PROMOTION INSTITUTE
Original Assignee
E JIKEI SYSTEM KK
Jikei System Kk E
NPO E JIKEI NETWORK PROMOTION INST
NPO E-JIKEI NETWORK PROMOTION INSTITUTE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by E JIKEI SYSTEM KK, Jikei System Kk E, NPO E JIKEI NETWORK PROMOTION INST, NPO E-JIKEI NETWORK PROMOTION INSTITUTE filed Critical E JIKEI SYSTEM KK
Priority to JP2010259953A priority Critical patent/JP2012114556A/en
Publication of JP2012114556A publication Critical patent/JP2012114556A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

PROBLEM TO BE SOLVED: To solve a problem associated with a crime prevention camera storing images in encryption for protecting privacy, the problem that the camera cannot support a mode of operation in which browsing of an image requires a consent of three parties or more for protecting the privacy as the proprietor of the camera cannot reproduce an image, requiring two parties to be able to browse the image, that is, first, the proprietor of the camera and second, a party having means for reproduction.SOLUTION: A camera includes plural encryption devices serially interconnected. Additionally to the proprietor of the camera, two parties required to give consent to browsing an image prepare respective encryption keys A (16) and B (17) so that captured images are sequentially encrypted by the respective keys. Browsing the images will only be enabled by the proprietor providing the image data, and provision of the keys A and B for decryption.

Description

本発明は防犯カメラ,特にプライバシー保護機能を備えた防犯カメラに関するものである.   The present invention relates to a security camera, and more particularly to a security camera having a privacy protection function.

公共の場所に設置された防犯カメラは犯罪を未然に防ぐ防犯効果,さらに犯罪が発生した後の犯人特定に関して大きな効力を発揮する一方,不特定多数の人が撮影されることに起因するプライバシーの侵害は大きな問題となっている.   Security cameras installed in public places are effective in preventing crimes before they happen, and are effective in identifying criminals after a crime has occurred. Infringement is a big problem.

この状況を解決するために,画像の暗号化機能を備えた防犯カメラが開発されている.このカメラは撮影した画像を保存する際に,それを暗号化してから保存する.この暗号化されたデータを復号する手段を有するのは,画像を閲覧できるは住民から信任された者,たとえば警察であり,住民を含めそれ以外の者は復号する手段を持たない.一方住民から信任された者としてここでは警察を仮定して話しを進めると,警察も防犯カメラの持ち主である住民から暗号化された画像データの提供は受けなければ画像を閲覧することができない.したがって,重大事件が発生した場合のように,住民および警察の両者が画像閲覧の必要性を認める状況になって初めて画像が閲覧できるので,プライバシー侵害の問題が解決される.   In order to solve this situation, a security camera equipped with an image encryption function has been developed. When this camera saves the captured image, it encrypts it and saves it. The person who can view the image has the means to decrypt the encrypted data, but the person who is trusted by the residents, for example, the police, and other persons including the residents do not have the means to decrypt them. On the other hand, as a person who has been trusted by the residents, assuming that the police are assumed here, the police cannot view the images without receiving the encrypted image data provided by the residents who have security cameras. Therefore, the privacy infringement problem is solved because images can be viewed only when both residents and the police recognize the necessity of image viewing, as in the case of a serious incident.

特開2009−44311号公報JP 2009-44311 A

特開2010−118959号公報JP 2010-118959 A

しかし上記の機構が有効に働くのは防犯カメラの所有者,あるいは管理者である場合である.たとえば行政が,犯罪が多発する地域に一括して防犯カメラを導入しようとする場合など,防犯カメラの管理は住民ではなく行政機関になる.導入する防犯カメラは暗号化機能が備わっていたとしても,このような使い方では行政と警察が合意すれば住民の了解無しに画像が閲覧できる.プライバシーが保護されるべき主体は住民であるので,このような使い方では,たとえば防犯カメラに暗号化の機能が備わっていたとしても,プライバシーの保護が達成できない.   However, the above mechanism works effectively when the user is the security camera owner or administrator. For example, when the government intends to introduce security cameras all over the crime-prone areas, the security cameras are managed by the government rather than the residents. Even if the security camera to be installed is equipped with an encryption function, images can be viewed without the consent of the residents if the government and the police agree in this way. Since the main actors whose privacy should be protected are residents, in this way, privacy protection cannot be achieved even if the security camera has an encryption function.

上記課題を解決するため,本発明のカメラは撮像装置と複数の画像暗号化装置と画像データ記録装置を備える.   In order to solve the above problems, the camera of the present invention includes an imaging device, a plurality of image encryption devices, and an image data recording device.

撮像装置によって撮影された画像は複数の画像暗号化装置に順次入力され,暗号化される.すなわち画像は第1の画像暗号化装置に入力され,その出力は第2の画像暗号化装置に入力され,これが画像暗号化装置の数だけ繰り返される.最後の画像暗号化装置の出力は画像データ記録装置に蓄えられる.ここで各画像暗号化装置の鍵は,画像を閲覧可能とするために合意が必要なそれぞれの主体(警察,行政,地域住民など)が少なくとも各一段の復号化が可能なように,各主体と鍵が対応して設定されている.
犯罪が起こった場合などで,画像を閲覧することに全ての主体が同意した場合,それぞれが持つ暗号化鍵を持ち寄ることにより,画像の撮影過程で行った全ての暗号化を復号できるので,画像が閲覧できる.一方,もし少なくとも一つの主体が閲覧に同意しない場合には,それに対応する暗号が解除できず,画像は閲覧できない.これによって当初の目的が実現できる.
Images taken by the imaging device are sequentially input to multiple image encryption devices and encrypted. That is, the image is input to the first image encryption device, and the output is input to the second image encryption device, which is repeated by the number of image encryption devices. The output of the last image encryption device is stored in the image data recording device. Here, the key of each image encryption device is that each subject (police, government, local residents, etc.) that needs to agree to be able to view images can decrypt at least one level. And keys are set correspondingly.
If all subjects agree to view the image, such as when a crime occurs, you can decrypt all the encryption performed in the image shooting process by bringing the encryption key that they have. Can be viewed. On the other hand, if at least one subject does not agree to view, the corresponding encryption cannot be removed and the image cannot be viewed. This achieves the original purpose.

本発明のカメラおよびその運用によって,撮影された画像に関係する全ての主体の同意が得られた場合のみその画像を閲覧することが可能なになり,これを活用すれば,たとえばプライバシーを保護しながら防犯カメラの有効性を発揮させることができる.   With the camera of the present invention and its operation, it becomes possible to view the image only when the consent of all subjects related to the captured image is obtained, and this can be used to protect privacy, for example. However, the effectiveness of the security camera can be demonstrated.

本発明の最も単純な運用形態の説明図である.It is an explanatory diagram of the simplest operation mode of the present invention. 画像の暗号化にRSA公開鍵を利用した場合の説明図である.It is explanatory drawing at the time of using an RSA public key for image encryption. 画像の暗号化にRSA公開鍵を利用し,復号手段をカメラ内部に持った場合の説明図である.It is an explanatory diagram when the RSA public key is used for image encryption and the decryption means is provided inside the camera. 暗号化の一例を説明するための説明図である.It is explanatory drawing for demonstrating an example of encryption.

図1は合意が必要な主体を住民と警察の2者とし,本発明を最も単純な形で実現した実施形態の説明図である.カメラの撮像装置によって画像が撮影(11)されると,警察が提供した鍵(16)(鍵Aと記載)によって第1の画像暗号化装置で暗号化(12)(タイプA暗号化と記載)される.その出力データはさらに住民が提供する鍵(15)(鍵Bと記載)によって第2の画像暗号化装置で暗号化(13)(タイプB暗号化と記載)され,その出力が画像データ記録装置に記録(14)される.画像の閲覧には,記録されている暗号化後の画像データをまず住民によって第2の暗号化装置で行われたタイプBの暗号化が解除(17)され,次に警察によって第1の暗号化装置で行われたタイプAの暗号化が解除(18)されるので,当初カメラによって撮影された画像(19)が閲覧できる.   FIG. 1 is an explanatory diagram of an embodiment in which the subject requiring agreement is the resident and the police, and the present invention is realized in the simplest form. When an image is photographed (11) by the imaging device of the camera, it is encrypted (12) (described as type A encryption) by the first image encryption device using the key (16) (described as key A) provided by the police. ). The output data is further encrypted (13) (described as type B encryption) by the second image encryption device using a key (15) (described as key B) provided by the residents, and the output is stored as an image data recording device. Is recorded (14). To view the image, the encrypted image data recorded is first decrypted (17) by the residents using the second encryption device, and then the first encryption is performed by the police. Since the type A encryption performed by the conversion device is released (18), the image (19) originally taken by the camera can be viewed.

以上の実施形態では鍵Aによる暗号化と鍵Bによる暗号化を別々に行ったが,それらを組み合わせて1つの暗号化鍵として暗号化を1回行う実現も可能である.たとえば鍵Aを5文字,鍵Bを5文字とし,それらを連結した10文字を暗号化のための鍵として暗号化する.画像の復号は警察が提供する鍵Aと住民が提供する鍵Bとを連結して一つの鍵とし,復号を行う.この場合,復号手段は警察と住民のどちらが所有していてもよく,さらには両者以外の第三者が所有してもよい.   In the above embodiment, the encryption with the key A and the encryption with the key B are performed separately, but it is also possible to combine them and perform the encryption once as one encryption key. For example, the key A is 5 characters, the key B is 5 characters, and the 10 characters concatenated are encrypted as encryption keys. The image is decrypted by concatenating the key A provided by the police and the key B provided by the residents into one key. In this case, the decryption means may be owned by either the police or the residents, and may be owned by a third party other than the both.

以上の例では住民と警察の2者の合意を考えたが,複雑な状況ではたとえば住民と警察に加え,行政の3者の同意も必要にした方がより良くプライバシーの保護が機能する場合もある.このような場合には第1(タイプA),第2(タイプB)の暗号化の後に更に第3(タイプC)の暗号化を施し,第3の暗号化(タイプC)の復号手段を行政のみが所有すれば良い.更に多くの者の同意が必要な場合には,このような暗号化を同意が必要な者の数だけ施せば良い.この場合にも2つの鍵による暗号化の説明で述べたように,鍵自体を必要な個数に分割し,それらを連結した一つの鍵による暗号化を行ってもよい.またここではこの暗号化の目的としてプライバシーの保護をあげたが,本発明の複数の者の合意によってのみ画像が閲覧できるという機能は,それが必要とされるそれ以外の目的に対しても利用することができる.   In the above example, the agreement between the residents and the police was considered, but in complex situations, for example, in addition to the residents and the police, it may be better to protect the privacy by requiring the consent of the three parties. is there. In such a case, after the first (type A) and second (type B) encryption, the third (type C) encryption is further performed, and the third encryption (type C) decryption means is provided. It only needs to be owned by the government. If the consent of more people is required, it is sufficient to apply such encryption to the number of people who need consent. In this case as well, as described in the description of encryption with two keys, the key itself may be divided into the required number and encryption may be performed with one key concatenated. In addition, although the protection of privacy is given here as the purpose of this encryption, the function that the image can be viewed only by the agreement of a plurality of persons of the present invention is also used for other purposes where it is necessary. can do.

上記で説明した本発明のカメラにおいて,撮像装置としてはCCDデバイスなどを利用することができ,画像暗号化装置はカメラに内蔵された組み込み型コンピュータとメモリによって実現することができる.また画像データ記録装置はハードディスクやSDカードなどの半導体記録装置を利用できる.また画像の復号手段はパソコン上で動作するソフトウエアなどで実現できる.   In the camera of the present invention described above, a CCD device or the like can be used as the imaging device, and the image encryption device can be realized by an embedded computer and a memory built in the camera. The image data recording device can be a semiconductor recording device such as a hard disk or SD card. Image decoding means can be realized by software running on a personal computer.

図1に示した実施形態で注意すべきことは暗号化・復号化のための鍵の管理である.住民や警察などのそれぞれの主体は,自身が管理する鍵を他の主体に知られてはならない.しかしながら,カメラに於いて暗号化するためには鍵の情報をカメラ内に設定・保持しなければならず,その過程で鍵情報は漏洩しやすいことは欠点である.   What should be noted in the embodiment shown in FIG. 1 is management of keys for encryption / decryption. Each subject, such as a resident or the police, must not know the key it manages to other subjects. However, in order to encrypt in the camera, the key information must be set and held in the camera, and the key information is easily leaked in the process.

図2に示す実施形態は暗号化方式にRSA暗号を用いることによって,暗号のための公開鍵と,復号のための秘密鍵に鍵を分離することによって上述の問題を解決したものである.住民および警察それぞれ独自の秘密鍵と公開鍵を生成する.   The embodiment shown in FIG. 2 solves the above-mentioned problem by separating the key into a public key for encryption and a secret key for decryption by using RSA encryption as the encryption method. A private key and a public key are generated for each resident and police.

図2では住民は暗号化用の公開鍵B(24)と復号化用の秘密鍵B(25)を生成(21)する.同様に警察も公開鍵A(23)と秘密鍵A(26)を生成(22)する.住民と警察のそれぞれは画像の暗号化用の公開鍵をカメラに設定するが,これは公開鍵であるので,それが他の主体に知れても画像の復号はできない.一方復号用の秘密鍵は警察,住民ともに他の主体に知られないように管理する.画像の復元は,カメラに保存されている画像データをまず住民が自身の秘密鍵B(25)で復号(17)し,それを警察に渡す.警察は同様に自身の秘密鍵(26)によって復号(18)し画像を閲覧できる状態にする.   In FIG. 2, the resident generates (21) a public key B (24) for encryption and a secret key B (25) for decryption. Similarly, the police generate (22) the public key A (23) and the secret key A (26). The residents and the police each set a public key for image encryption on the camera, but since this is a public key, the image cannot be decrypted even if it is known to other actors. On the other hand, the private key for decryption is managed so that neither the police nor the residents know about it. To restore the image, the residents first decrypt (17) the image data stored in the camera with their private key B (25), and give it to the police. The police similarly decrypts (18) with its own private key (26) and makes it possible to view the image.

さて,図2で示したカメラと運用形態では,住民・警察共に画像データの復号化手段を持たなければならない.これの具体的な一つの例はPCとその上で動作するプログラムによって実現できる.しかしより簡便には,その機能をカメラに内蔵することもできる.このような実施形態を図3に示す.   Now, in the camera and operation mode shown in Fig. 2, both residents and police must have a means of decoding image data. One concrete example of this can be realized by a PC and a program running on it. However, the function can be built into the camera more simply. Such an embodiment is shown in FIG.

画像の撮影から保存までは図2の実施形態と同様であるが,画像の復号化は住民が秘密鍵B(25),警察が秘密鍵A(26)を持ち寄り他の主体に知られないようにカメラに設定する.住民が持ち寄った鍵によりタイプBの復号(31)が,警察が持ち寄った鍵によりタイプAの復号(32)がカメラ内よって実行され,画像(19)が閲覧できる状態になる.もちろんこの場合には,必要な復号が終了したら,カメラ内の秘密鍵の情報は破棄される.   The process from image capture to storage is the same as in the embodiment of FIG. 2, but the image is decrypted so that the resident carries the secret key B (25) and the police carry the secret key A (26) and is not known to other subjects. Set to the camera. The type B decryption (31) is executed in the camera by the key brought by the residents, and the type A decryption (32) is executed by the police in the camera, and the image (19) can be browsed. Of course, in this case, when the necessary decryption is completed, the private key information in the camera is discarded.

図2および図3では合意の主体を住民と警察の2者を想定した例を述べたが,もちろん本発明の適用はこれ以外でも良く,更に暗号化装置を必要なだけ直列に接続することによって,同意が必要な主体が3者以上の場合も容易に実現することができる.   In FIGS. 2 and 3, an example has been described in which the subject of the agreement is assumed to be the residents and the police. Of course, the present invention may be applied other than this, and by connecting as many encryption devices as necessary in series. , It can be easily realized even if there are more than three entities that need consent.

また上記の実施形態において,RSA暗号のような公開鍵・秘密鍵による暗号方式で実現するほど暗号強度が必要でない場合には,公開鍵を暗号化鍵,秘密鍵を復号鍵に置き換
えて実装すれば良い.このようにすれば暗号化鍵が知れても直ちに復号ができないことから一定強度の暗号強度が確保される上,暗号化および復号のプロセスにも大きな計算量を必要としない.
Also, in the above embodiment, when the encryption strength is not required to be realized by a public key / private key encryption method such as RSA encryption, the public key is replaced with the encryption key and the private key is replaced with the decryption key. That's fine. In this way, even if the encryption key is known, it cannot be decrypted immediately, so that a certain level of encryption strength is secured, and the encryption and decryption processes do not require a large amount of computation.

図4は,2段階の暗号化において,最初の暗号化後の画像ファイルから,特別な追加情報なしで,元の画像のモザイク画像が得られるようにした例を示している.この例では,閲覧権者に応じて,画像を画素よりも荒い区分で分割しその区分内で画素を暗号キーに基づいて入れ替えることを特徴とする画像の暗号化方法を示している.図4では閲覧権者が2名いる場合を説明している.撮影された画像を10x10の画素単位に分割し,100個の画素のRGBの各要素,合計300個の値をキーKbに基づいて置換する.さらに,画像全体のRGBの各要素をキーKaに基づいて置換する.この結果を暗号化して保存データとする.閲覧権者は復号化キーを持ち,1人の閲覧権者はキーKaを持ち,もう1人の閲覧権者はキーKaとKbの両方を持つ. Fig. 4 shows an example in which a mosaic image of the original image can be obtained from the image file after the first encryption without any special additional information in the two-stage encryption. This example shows an image encryption method that divides an image into sections that are rougher than the pixels and replaces the pixels in the sections based on the encryption key according to the viewing rights holder. Figure 4 illustrates the case where there are two viewing rights holders. The captured image is divided into 10x10 pixel units, and each element of RGB of 100 pixels, a total of 300 values, is replaced based on the key Kb. In addition, each RGB element of the entire image is replaced based on the key Ka. This result is encrypted to save data. The viewing rights holder has a decryption key, one viewing rights holder has the key Ka, and the other viewing rights holder has both the keys Ka and Kb.

画像を閲覧する際には,閲覧権者は復号化キーと所有するキーを画像閲覧装置に入力し,画像閲覧装置は復号化キーで画像を復号化した後に,入力されたキーに基づいて,画像の構成要素の置換を元に戻し,画像を表示する.入力されたキーがKaだけであれば各10x10の画像内部の置換を元に戻すことはできないので,各10x10の画像の構成要素が置換されたままの画像が表示されることになる.入力されたキーがKaとKbであるときには,各10x10の画像内の置換も元に戻すことが可能となるため,撮影された画像がそのまま表示されることとなる. When browsing the image, the viewing right person inputs the decryption key and the key that he / she owns into the image browsing device, and after the image browsing device decrypts the image with the decryption key, based on the input key, Undo the replacement of the image components and display the image. If the only key entered is Ka, the replacement inside each 10x10 image cannot be undone, so the image with the components of each 10x10 image still replaced is displayed. When the input keys are Ka and Kb, it is possible to undo the replacement in each 10x10 image, so the captured image is displayed as it is.

入力されたキーがKaだけの場合,得られた画像に対し,各10x10画素に平均化処理(モザイク化処理)することにより,見やすい画像となる.この平均化処理を施した画像は,もと画像に対して,各10x10画素に平均化処理(モザイク化処理)を施したものと一致する.これは,各10x10画素に画素の入替がなされているだけであり,それらの平均値は変化しないからである. If the only key entered is Ka, the resulting image is averaged (mosaiced) to 10x10 pixels to make the image easy to see. This averaged image matches the original image with 10x10 pixels averaged (mosaiced). This is because each 10x10 pixel has only been replaced, and its average value does not change.

この例では,入替の暗号化は1段階のみであるが,例えば,第一段階は3×3画素,第二段階は6×6画素,第三段階は12×12画素と,暗号キーを4つ使った4段階の暗号化を行うことで,閲覧権の強度を4通りに設定できる.すなわち,キーKaだけを持つものは,12×12画素の平均化操作を行うことにより,現画像に同じ平均化操作を行ったと同じモザイク化画像が得られる.同様に,キーKaとキーKbを持つ者は,6×6画素のモザイク画像を得ることができる.キーKa,キーKbとキーKcを持つ者は,3×3画素のモザイク画像を得ることができる.そして,全てのキー,キーKa,キーKb,キーKcとキーKdを持つものは,原画像と同じ画像を得ることができる. In this example, the replacement encryption is only one stage. For example, the first stage is 3 × 3 pixels, the second stage is 6 × 6 pixels, the third stage is 12 × 12 pixels, and the encryption key is 4 By using four levels of encryption, you can set the strength of viewing rights in four ways. In other words, the image having only the key Ka can be obtained by performing the averaging operation of 12 × 12 pixels to obtain the same mosaiced image when the same averaging operation is performed on the current image. Similarly, a person with key Ka and key Kb can obtain a 6 × 6 pixel mosaic image. A person with key Ka, key Kb, and key Kc can obtain a 3 × 3 pixel mosaic image. All the keys, keys Ka, key Kb, key Kc and key Kd can obtain the same image as the original image.

上記の例では,区分内での画素の処理は,単純な入替を例に取ったが,その他,様々な方法が考えられる.画素内の各RGBの輝度値の平均値を保存するだけなら,各画素に対し,合計がゼロとなるような適当な数字の組み合わせをつくり,それを加えてもよい.さらに,これに対し,上記の入替操作を追加しても良い. In the above example, the processing of the pixels in the category is a simple replacement, but various other methods can be considered. If you only want to store the average value of the luminance values of each RGB in the pixel, you can create an appropriate combination of numbers that adds up to zero for each pixel. In addition, the above replacement operation may be added.

上記のプロセスは,カメラをインターネットに接続した環境下で使用する際にも,有効である.例えば,裁判所などによる犯罪捜査の緊急度・重大度に応じて,インターネットを通じて,自動的にキーが提供される仕組みを作ることにより,より迅速な捜査が可能となる. The above process is also effective when the camera is used in an environment connected to the Internet. For example, by making a mechanism that automatically provides keys through the Internet according to the urgency and severity of criminal investigations by courts, etc., it becomes possible to conduct more rapid investigations.

メモリは,カメラとは異なる場所に分散設置・集中設置してもよいが,データ通信量を抑制する上で,個々のカメラがメモリを内蔵する方式が好ましい.インターネット等で必要な画像ファイルを送る際も,必要な部分のみを送ることにより,システム全体の効率化を図ることができる. The memory may be installed in a distributed or centralized location different from the camera, but in order to reduce the amount of data communication, it is preferable that each camera has a built-in memory. When sending necessary image files over the Internet, the efficiency of the entire system can be improved by sending only the necessary parts.

画像ファイルの形式を独自にものとすることにより,再生は,専用のソフトウェアでなければできないようにすると,さらに,安全性は高まる.


By making the format of the image file unique, playback can be performed only by dedicated software, and safety is further enhanced.


Claims (11)

撮像装置と複数の鍵による画像暗号化装置と画像データ記録装置を備えたカメラ. A camera equipped with an imaging device, an image encryption device with multiple keys, and an image data recording device. 暗号化装置で暗号化に使用される鍵と,その復号に必要な鍵が同一でない暗号方式を採用した請求項1のカメラ. 2. The camera according to claim 1, wherein an encryption method is employed in which a key used for encryption in an encryption device and a key required for decryption are not the same. 復号に必要な鍵を一時的に外部から入力することによって,画像を復号することができる手段を備えた請求項2のカメラ. 3. The camera according to claim 2, further comprising means capable of decrypting an image by temporarily inputting a key necessary for decryption from the outside. 暗号化装置で暗号化に使用される鍵として公開鍵暗号の公開鍵を用い,復号に使用する鍵としてその秘密鍵を用いた請求項2のカメラ. The camera according to claim 2, wherein a public key of a public key cryptosystem is used as a key used for encryption in an encryption device, and a secret key thereof is used as a key used for decryption. 暗号化装置で暗号化に使用される鍵として公開鍵暗号の公開鍵を用い,復号に使用する鍵としてその秘密鍵を用いた請求項3のカメラ. 4. The camera according to claim 3, wherein a public key of public key cryptography is used as a key used for encryption in an encryption device, and a secret key is used as a key used for decryption. 画像を閲覧することに同意が必要な複数の主体それぞれが独自の暗号化鍵を持ち,それら全ての鍵を用いて順次画像を暗号化するように設定した請求項1のカメラと,画像の閲覧が必要になった場合にそれぞれの主体が自身の鍵で復号する手段をもつ,カメラの運用方法. 2. The camera according to claim 1, wherein each of a plurality of subjects who need to agree to view an image has a unique encryption key, and is configured to sequentially encrypt images using all of the keys. A camera operation method in which each subject has a means to decrypt with their own key when it becomes necessary. 画像を閲覧することに同意が必要な複数の主体それぞれが独自の暗号化鍵を持ち,それら全ての鍵を用いて順次画像を暗号化するように設定した請求項2のカメラと,画像の閲覧が必要になった場合にそれぞれの主体が自身の鍵で復号する手段をもつ,カメラの運用方法. The camera according to claim 2, wherein each of a plurality of entities that need to agree to view an image has a unique encryption key, and is configured to sequentially encrypt images using all of the keys. A camera operation method in which each subject has a means to decrypt with their own key when it becomes necessary. 画像を閲覧することに同意が必要な複数の主体それぞれが独自の暗号化鍵を持ち,それら全ての鍵を用いて順次画像を暗号化するように設定した請求項3のカメラと,画像の閲覧が必要になった場合にそれぞれの主体が復号のための鍵をカメラに入力することによって画像を閲覧する,カメラの運用方法. 4. The camera according to claim 3, wherein each of a plurality of subjects who need to agree to view an image has a unique encryption key, and is configured to sequentially encrypt images using all of the keys. A camera operation method in which each subject browses an image by inputting a decryption key into the camera when it becomes necessary. 画像を閲覧することに同意が必要な複数の主体それぞれが独自の暗号化鍵を持ち,それら全ての鍵を用いて順次画像を暗号化するように設定した請求項4のカメラと,画像の閲覧が必要になった場合にそれぞれの主体が自身の鍵で復号する手段をもつ,カメラの運用方法. The camera according to claim 4, wherein each of a plurality of entities that need to agree to view an image has a unique encryption key, and is configured to sequentially encrypt images using all of the keys. A camera operation method in which each subject has a means to decrypt with their own key when it becomes necessary. 画像を閲覧することに同意が必要な複数の主体それぞれが独自の暗号化鍵を持ち,それら全ての鍵を用いて順次画像を暗号化するように設定した請求項5のカメラと,画像の閲覧が必要になった場合にそれぞれの主体が復号のための鍵をカメラに入力することによって画像を閲覧する,カメラの運用方法. 6. The camera according to claim 5, wherein each of a plurality of entities that need to agree to view an image has a unique encryption key, and the images are sequentially encrypted using all of the keys. A camera operation method in which each subject browses an image by inputting a decryption key into the camera when it becomes necessary. 画像を画素よりも荒い区分で分割し,その各区分内の画素に対し暗号キーに基づいた処理を加えることを特徴とする請求項1,2,3,4,5,6,7,8,9のカメラ. The image is divided into sections rougher than the pixels, and processing based on the encryption key is applied to the pixels in each of the sections. 9 cameras.
JP2010259953A 2010-11-22 2010-11-22 Camera system comprising multiple encryption function and managing method for the camera system Pending JP2012114556A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2010259953A JP2012114556A (en) 2010-11-22 2010-11-22 Camera system comprising multiple encryption function and managing method for the camera system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2010259953A JP2012114556A (en) 2010-11-22 2010-11-22 Camera system comprising multiple encryption function and managing method for the camera system

Publications (1)

Publication Number Publication Date
JP2012114556A true JP2012114556A (en) 2012-06-14

Family

ID=46498319

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2010259953A Pending JP2012114556A (en) 2010-11-22 2010-11-22 Camera system comprising multiple encryption function and managing method for the camera system

Country Status (1)

Country Link
JP (1) JP2012114556A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021001950A1 (en) * 2019-07-03 2021-01-07 日本電信電話株式会社 Confidential information reference system, confidential information reference device, confidential information reference method, and program

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021001950A1 (en) * 2019-07-03 2021-01-07 日本電信電話株式会社 Confidential information reference system, confidential information reference device, confidential information reference method, and program

Similar Documents

Publication Publication Date Title
US9276745B2 (en) Preserving image privacy when manipulated by cloud services
US10489603B2 (en) Method and apparatus for image privacy protection
WO2008010275A1 (en) Medium data processing device and medium data processing method
JPH10164549A (en) System for hiding in authentication information is image and image authentication system
KR20120035299A (en) Image protection processing apparatus for privacy protection, and image security system and method using the same
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
WO2017026356A1 (en) Image processing device, image restoring device, image processing method, and image restoring method
CN114390316A (en) Processing method and device for image acquisition synchronous encryption privacy protection
CN105678114A (en) Image preview method and device
Lee et al. Selective scalable secret image sharing with verification
JP2007329688A (en) Data processing apparatus and method thereof
Khashan et al. An efficient adaptive of transparent spatial digital image encryption
Panwar et al. A multilevel secure information communication model for healthcare systems
CN105279443A (en) Picture encrypting and decrypting methods and devices
Anandakumar Image cryptography using RSA algorithm in network security
Winkler et al. Privacy and security in video surveillance
KR20140055093A (en) System and method of distrubuted data storage, restoration
CN106529316B (en) Image data encryption method and device, web camera
JP2019057880A (en) Imaging device, image processing system, image processing program, retrieval program and photographic program
US20090268056A1 (en) Digital camera with portrait image protecting function and portrait image protecting method thereof
GB2401015A (en) Security method and apparatus using biometric data
JP2012114556A (en) Camera system comprising multiple encryption function and managing method for the camera system
CN114374773A (en) Method for encrypting image acquisition synchronization information and decrypting, restoring and recovering image acquisition synchronization information at using end
CN113206926B (en) Method for balancing privacy and usability of image based on three-pixel-point encryption
JP2007150559A (en) Security device