WO2004004198A1 - Information processing method, information processing apparatus, program, and storage medium - Google Patents

Information processing method, information processing apparatus, program, and storage medium Download PDF

Info

Publication number
WO2004004198A1
WO2004004198A1 PCT/JP2003/007976 JP0307976W WO2004004198A1 WO 2004004198 A1 WO2004004198 A1 WO 2004004198A1 JP 0307976 W JP0307976 W JP 0307976W WO 2004004198 A1 WO2004004198 A1 WO 2004004198A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
tile
unit
parameter
image data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2003/007976
Other languages
English (en)
French (fr)
Inventor
Junichi Hayashi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Canon Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Inc filed Critical Canon Inc
Priority to AU2003243006A priority Critical patent/AU2003243006A1/en
Priority to EP20030761785 priority patent/EP1518348B1/en
Publication of WO2004004198A1 publication Critical patent/WO2004004198A1/en
Priority to US10/965,874 priority patent/US7447314B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/60Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
    • H04N19/63Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using sub-band based transform, e.g. wavelets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • H04N21/23476Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption by partially encrypting, e.g. encrypting the ending portion of a movie
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • H04N21/44055Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption by partially decrypting, e.g. decrypting a video stream that has been partially encrypted

Definitions

  • Fig. 2 is a block diagram showing the functional arrangement of an image encoding unit 11;
  • Fig. 5B is a schematic view showing the format of a code sequence
  • Fig. 9 shows an example of keys and key IDs corresponding to respective tiles and respective resolution levels of each tile when an image is made up of four tiles, tile 01 is made up of three resolution levels, tile 02 is made up of two resolution levels, tile 03 is made up of three resolution levels, and tile 04 is made up of four resolution levels;
  • Fig. 16 is a flow chart showing a process executed by a code sequence decryption unit 124 according to the third embodiment of the present invention.
  • Fig. 23A shows an example of a code sequence
  • Fig. 23B shows correspondence between respective subbands and the sizes of tiles to be displayed
  • Figs. 5A, 5B, 5C, and 5D show the format of the code sequence which is generated and output in this way.
  • Fig. 5A shows the overall format of the code sequence, in which MH is a main header; TH, a tile header; and BS, a bitstream.
  • Bitstream key K_BS is generated from image key K_I using the encoding parameters P (step S72) .
  • bitstream key K_BS is generated using:
  • K_Ti H(K_BS I I i) (8)
  • K__TiSj H(K_TiSj - 1) (9)
  • the generated resolution key K_TiSj is saved together with a key ID which is also generated in step S76.
  • Fig. 8 is a view for explaining an example of the key ID generation method. As shown in Fig. 8, the key ID of this embodiment is formed to have a tile index in the former half, and a resolution index in the latter half.
  • image key K_IMG may have a key ID "0000”
  • bitstream key K_BS may have a key ID "0001”
  • respective tile keys may have key IDs "0100”, "0200”, “0300”,....
  • each tile key is equal to a resolution key of the highest resolution in each tile (for example, in case of tile 1, K_T1 and K_T1S1) , the tile key or the resolution key of the highest resolution may be omitted.
  • the keys and key IDs have been independently explained for the sake of simplicity. However, in practice, pairs of keys and key IDs in this embodiment can be handled as keys required for decryption.
  • the code sequence encryption processing unit 13 receives the code sequence, keys generated by the previous key generation process, and ID reference table.
  • the unit 13 executes an encryption process of the code sequence using the keys and ID reference table, and outputs an encrypted code sequence. More specifically, the location of a bitstream to be encrypted in the code sequence is specified using a key ID corresponding to that bitstream and the ID reference table, and the bitstream located at the specified location is encrypted. For example, a bitstream corresponding to resolution level 2 of tile 1 is encrypted using a key paired with a key ID "0102" . Note that the code sequence encryption processing unit 13 does not use image key K_IMG, bitstream key K_BS, and tile keys.
  • the first key generation unit 121 need not always generate all the keys and key IDs unlike in the key generation process that has been explained using Fig. 6, and need only generate a key and key ID corresponding to a bitstream to be decrypted by the code sequence decryption unit 124 (to be described later) .
  • key K_Si of resolution i is generated from bitstream key K_BS (step S144) .
  • key K_Si is generated by:
  • K_TjSi of tile j is generated from key K_Si of resolution i (step S146) .
  • key K_TjSi is generated by:
  • step S147 The generated tile key K_TjSi is saved together with a key ID which is also generated in step S146. It is then checked if variable j ⁇ parameter M_i (step S147) .
  • parameter M i is the total number of tiles. That is, it is determined whether or not tile keys K_TjSi corresponding to all tiles of resolution i have been generated. If the checking result is true, the flow advances to step S148 to increment variable j by 1 (step S148), and the process in step S146 is executed. On the other hand, if the checking result in step S147 is false, the flow advances to step S149 to check if variable i ⁇ parameter N (step S149) . Note that parameter N is the number of resolution levels.
  • the encryption process is executed using different keys for respective tiles or resolution levels of a code sequence.
  • decryption control for each resolution level or each tile can be implemented.
  • the present invention is not limited to such specific process, and predetermined bitstreams in a code sequence may be encrypted using only one encryption key.
  • variable i is initialized to zero.
  • a bitstream designated by variable i is encrypted (step S173) .
  • a record of the bitstream designated by variable i in the encryption map is erased (step S174). However, if the decryption process is not normally terminated due to, e.g., use of a wrong key or the like, the record of this bitstream may be left unerased.
  • the decryption process can be executed while preventing double decryption.
  • reference numeral 181 denotes a part of a code sequence, and one rectangle indicates one packet. Also, hatched packets indicate encrypted ones.
  • reference numeral 182 denotes an example of an encryption map corresponding to the code sequence 181. As shown in Figs. 17A and 17B, one rectangle in the map 182 corresponds to one packet, and a bit value is assigned to each packet. When a packet is encrypted, a bit value "1" is assigned; when a packet is not encrypted, "0" is assigned.
  • the encryption map shown in Fig. 17B is generated in the encryption process as in that of the third embodiment.
  • an already decrypted portion can be prevented from being decrypted again (double decryption) .
  • double decryption often disturbs normal image decryption even when a correct key is used.
  • the aforementioned double decryption prevention technique is effective in such case.
  • an already encrypted portion can be prevented from being encrypted again (double encryption) .
  • the decryption apparatus comprises the first key generation unit 191, second key generation unit 193, code sequence decryption unit 194, control unit 195, and image decoding unit 196.
  • the first key generation unit 191, network unit 192, second key generation unit 193, code sequence decryption unit 194, and image decoding unit 196 in Fig. 18 make the same operations as those of the first key generation unit 121, network unit 122, second key generation unit 123, code sequence decryption unit 124, and image decoding unit 125, and a description thereof will be omitted.
  • the control unit 195 will be described below.
  • Fig. 19 is a block diagram showing the functional arrangement of the control unit 195 according to this embodiment. As shown in Fig.
  • the control unit 195 comprises a determination unit 201 and output unit 202.
  • the determination unit 201 receives the ID reference table or encryption map, speci ies encrypted bitstreams or packets using the ID reference table or encryption map, and outputs information associated with the determined bitstreams or packets. If the ID reference table or encryption map is encrypted, the determination unit 201 decrypts it. Alternatively, if the ID reference table or encryption map has undergone the signature process, the determination unit 201 executes a signature verification process. If a signature cannot be normally verified, the process ends.
  • the present invention can facilitate management of keys used in encryption.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Compression Of Band Width Or Redundancy In Fax (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)
  • Facsimile Transmission Control (AREA)
PCT/JP2003/007976 2002-06-28 2003-06-24 Information processing method, information processing apparatus, program, and storage medium Ceased WO2004004198A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
AU2003243006A AU2003243006A1 (en) 2002-06-28 2003-06-24 Information processing method, information processing apparatus, program, and storage medium
EP20030761785 EP1518348B1 (en) 2002-06-28 2003-06-24 Information processing method, information processing apparatus, program, and storage medium
US10/965,874 US7447314B2 (en) 2002-06-28 2004-10-18 Information processing method, information processing apparatus, program, and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2002191284A JP4181802B2 (ja) 2002-06-28 2002-06-28 情報処理装置、情報処理方法、プログラム、記憶媒体
JP2002-191284 2002-06-28

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10/965,874 Continuation US7447314B2 (en) 2002-06-28 2004-10-18 Information processing method, information processing apparatus, program, and storage medium

Publications (1)

Publication Number Publication Date
WO2004004198A1 true WO2004004198A1 (en) 2004-01-08

Family

ID=29996916

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2003/007976 Ceased WO2004004198A1 (en) 2002-06-28 2003-06-24 Information processing method, information processing apparatus, program, and storage medium

Country Status (6)

Country Link
US (1) US7447314B2 (enExample)
EP (1) EP1518348B1 (enExample)
JP (1) JP4181802B2 (enExample)
CN (1) CN100456668C (enExample)
AU (1) AU2003243006A1 (enExample)
WO (1) WO2004004198A1 (enExample)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7356148B2 (en) 2002-10-18 2008-04-08 Canon Kabushiki Kaisha Information processing method and apparatus, computer program, and computer-readable storage medium
US7356149B2 (en) 2002-10-18 2008-04-08 Canon Kabushiki Kaisha Information processing method and apparatus, computer program, and computer-readable storage medium
US7457419B2 (en) 2003-01-14 2008-11-25 Canon Kabushiki Kaisha Information processing method and apparatus for encrypting encoded data

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9264736B2 (en) * 2003-01-14 2016-02-16 Nippon Telegraph And Telephone Corporation Encoding method, decoding method, encoding device, and decoding device
JP4310285B2 (ja) * 2005-02-09 2009-08-05 キヤノン株式会社 情報処理方法及び装置、並びにコンピュータプログラム及びコンピュータ可読記憶媒体
KR20060107282A (ko) * 2005-04-07 2006-10-13 엘지전자 주식회사 데이터 재생방법, 데이터 기록재생 플레이어 및 데이터전송방법
JP5043421B2 (ja) 2005-12-28 2012-10-10 キヤノン株式会社 情報処理装置およびその方法
US20110075537A1 (en) * 2009-09-25 2011-03-31 General Electric Company Holographic disc with improved features and method for the same
US8363829B2 (en) * 2010-08-04 2013-01-29 Huang Lawrence P System for descrambling and methods for use therewith
IT1403450B1 (it) * 2011-01-19 2013-10-17 Sisvel S P A Flusso video costituito da frame video combinati, e procedimento e dispositivi per la sua generazione, trasmissione, ricezione e riproduzione
JP5921120B2 (ja) 2011-09-07 2016-05-24 キヤノン株式会社 情報処理装置、情報処理方法
EP2642744A1 (en) * 2012-03-19 2013-09-25 Nagravision S.A. Method and system for scrambling and descrambling a digital image
CN104637039B (zh) * 2013-11-07 2020-07-07 深圳市腾讯计算机系统有限公司 一种图片处理的方法及装置
CN108109110B (zh) * 2017-12-25 2023-03-28 努比亚技术有限公司 图片加密方法、移动终端和计算机可读存储介质
EP4113324A1 (en) * 2021-06-30 2023-01-04 PreciPoint GmbH Method for generating an image file archive, method for providing a microscopic image in an image file archive, method for restoring a partial image from an image file archive, and image file archive
KR20230023359A (ko) * 2021-08-10 2023-02-17 한화테크윈 주식회사 감시카메라 시스템

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0715715A (ja) * 1993-06-15 1995-01-17 Nec Corp 画像暗号化伝送方式
EP0768774A2 (en) 1995-10-16 1997-04-16 Sony Corporation Method and apparatus for data encryption using a key generation hierarchy
JPH09327010A (ja) * 1996-06-06 1997-12-16 Nippon Telegr & Teleph Corp <Ntt> ディジタル画像スクランブル制御装置
JPH1118070A (ja) * 1997-06-26 1999-01-22 Matsushita Electric Ind Co Ltd 画像圧縮装置および画像伸長装置および伝送装置
WO2000031964A1 (en) 1998-11-20 2000-06-02 Telefonaktiebolaget Lm Ericsson (Publ) A method and a device for encryption of images

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0937010A (ja) 1995-07-21 1997-02-07 Canon Inc 画像出力装置及びその制御方法
JPH1198487A (ja) * 1997-09-24 1999-04-09 Mitsubishi Electric Corp 画像符号化装置及び画像復号化装置
JPH11331618A (ja) 1998-05-19 1999-11-30 Canon Inc 画像処理装置、画像データ配布装置、画像データ配布システム、画像データ配布方法、及び記憶媒体
DE60239718D1 (de) 2001-02-09 2011-05-26 Canon Kk Informationsverarbeitungsgerät und seine Steuerverfahren, Computerprogramm, und Speichermedium
US6983049B2 (en) * 2001-05-04 2006-01-03 Hewlett-Packard Development Company, Lp. Storage devices for secure scalable data streaming
US7054335B2 (en) * 2001-05-04 2006-05-30 Hewlett-Packard Development Company, L.P. Method and system for midstream transcoding of secure scalable packets in response to downstream requirements
US7349539B2 (en) * 2001-05-04 2008-03-25 Hewlett-Packard Development Company, L.P. Encoding and encrypting devices for secure scalable data streaming
US7184548B2 (en) * 2001-05-04 2007-02-27 Hewlett-Packard Development Company, L.P. Encoding and decoding methods for secure scalable streaming and related systems
US6990202B2 (en) * 2001-10-04 2006-01-24 Hewlett-Packard Development Company, L.P. Packetizing devices for secure scalable data streaming
US7155010B2 (en) * 2001-05-04 2006-12-26 Hewlett-Packard Development Company, L.P. Signal format that facilitates easy scalability of encrypted streams
USPP14224P3 (en) * 2001-07-17 2003-10-14 Felix M. Jury Cordyline plant named ‘JURred’
US7006656B2 (en) * 2001-10-15 2006-02-28 The Research Foundation Of Suny Lossless embedding of data in digital objects
JP2003324418A (ja) 2002-02-27 2003-11-14 Canon Inc 画像処理装置、データ処理装置及びデータ処理方法
JP2004140668A (ja) 2002-10-18 2004-05-13 Canon Inc 情報処理方法
JP2004140667A (ja) 2002-10-18 2004-05-13 Canon Inc 情報処理方法
JP4612787B2 (ja) 2003-03-07 2011-01-12 キヤノン株式会社 画像データの暗号化装置の制御方法及び画像データ変換装置の制御方法、及び、それらの装置、並びにコンピュータプログラム及びコンピュータ可読記憶媒体
JP2004297778A (ja) 2003-03-07 2004-10-21 Canon Inc 画像データ暗号化方法及び装置、並びにコンピュータプログラム及びコンピュータ可読記憶媒体

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0715715A (ja) * 1993-06-15 1995-01-17 Nec Corp 画像暗号化伝送方式
EP0768774A2 (en) 1995-10-16 1997-04-16 Sony Corporation Method and apparatus for data encryption using a key generation hierarchy
JPH09327010A (ja) * 1996-06-06 1997-12-16 Nippon Telegr & Teleph Corp <Ntt> ディジタル画像スクランブル制御装置
JPH1118070A (ja) * 1997-06-26 1999-01-22 Matsushita Electric Ind Co Ltd 画像圧縮装置および画像伸長装置および伝送装置
WO2000031964A1 (en) 1998-11-20 2000-06-02 Telefonaktiebolaget Lm Ericsson (Publ) A method and a device for encryption of images

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1518348A4

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7356148B2 (en) 2002-10-18 2008-04-08 Canon Kabushiki Kaisha Information processing method and apparatus, computer program, and computer-readable storage medium
US7356149B2 (en) 2002-10-18 2008-04-08 Canon Kabushiki Kaisha Information processing method and apparatus, computer program, and computer-readable storage medium
US7457419B2 (en) 2003-01-14 2008-11-25 Canon Kabushiki Kaisha Information processing method and apparatus for encrypting encoded data

Also Published As

Publication number Publication date
JP2004040248A (ja) 2004-02-05
AU2003243006A1 (en) 2004-01-19
EP1518348A4 (en) 2011-03-23
EP1518348B1 (en) 2013-06-05
EP1518348A1 (en) 2005-03-30
US7447314B2 (en) 2008-11-04
CN100456668C (zh) 2009-01-28
CN1663173A (zh) 2005-08-31
JP4181802B2 (ja) 2008-11-19
US20050078820A1 (en) 2005-04-14

Similar Documents

Publication Publication Date Title
US6909810B2 (en) Image processing apparatus and method, and its computer program and storage medium
JP3960597B2 (ja) 符号生成装置、画像処理装置、符号生成プログラム、画像処理プログラムおよび記憶媒体
US7212649B2 (en) Encoder and encoding method for electronic watermark, decoder and decoding method for electronic watermark, encoding and decoding program for electronic watermark, and recording medium for recording such program
US7360093B2 (en) System and method for authentication of JPEG image data
US7571316B2 (en) Method and device for transforming a digital signal
EP1518348B1 (en) Information processing method, information processing apparatus, program, and storage medium
US7167988B2 (en) Information processing method and information processing apparatus
US7362860B2 (en) Image data encryption method, image data transform method, apparatus for the methods, computer program, and computer-readable storage medium
Cheng Partial encryption for image and video communication
US7313696B2 (en) Method for authentication of JPEG image data
Bhautmage et al. Advanced video steganography algorithm
JP4454908B2 (ja) 情報処理装置、情報処理方法、プログラム及び記録媒体
US7493489B2 (en) System and method for authentication of JPEG image data
US7627761B2 (en) System for authentication of JPEG image data
JPH10108180A (ja) 画像符号化データ作成方法及び画像符号化データ復号化方法
US7581115B2 (en) Information processing method, apparatus, and information processing program
Puteaux et al. Hierarchical high capacity data hiding in JPEG crypto-compressed images
Babel et al. Preserving data integrity of encoded medical images: the LAR compression framework
Kumar Steganography using visual cryptography
US20040109565A1 (en) Method and system for encrypting or decrypting an image code block
Lee et al. Reversible data embedding for tamper-proof watermarks
Memon Embedding Authentication and DistortionConcealment in Images–A Noisy Channel Perspective
Yang et al. Cryptographic and steganographic approaches to ensure multimedia information security and privacy
JP2001218023A (ja) 改ざん検出用情報埋込/改ざん検出装置および方法並びに当該方法を実施するプログラムを記録した記録媒体
Memon On integration of error concealment and authentication in JPEG2000 coded images

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 10965874

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2003761785

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2003814879X

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2003761785

Country of ref document: EP