WO2008053576A1 - Dispositif, procédé et programme de codage/décodage d'image - Google Patents
Dispositif, procédé et programme de codage/décodage d'image Download PDFInfo
- Publication number
- WO2008053576A1 WO2008053576A1 PCT/JP2007/000215 JP2007000215W WO2008053576A1 WO 2008053576 A1 WO2008053576 A1 WO 2008053576A1 JP 2007000215 W JP2007000215 W JP 2007000215W WO 2008053576 A1 WO2008053576 A1 WO 2008053576A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- encrypted
- area
- encryption
- detected
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/387—Composing, repositioning or otherwise geometrically modifying originals
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
- H04N1/4486—Rendering the image unintelligible, e.g. scrambling using digital data encryption
Definitions
- the present invention provides an image encryption and decryption method that visually encrypts a part of an image such as an important part in an image printed on a printed matter or a digital image, and prevents information leakage to a third party. This is related to the technology of crystallization.
- Patent Document 1 Japanese Patent Publication No. 8 _ 1 796 689
- the entire image is first divided into a plurality of blocks, and the images of the divided blocks are rearranged based on the parameters obtained from the input password (encryption key), and the image of the block specified by the parameters is further changed.
- Black-and-white inversion and mirror Invert to encrypt the image.
- a positioning frame is added to the outside of the image, a password (decryption key) is input, and then the original image is decrypted in the reverse procedure of encryption.
- Patent Document 2 As another conventional technique, for example, as disclosed in Japanese Patent No. 2 9 3 8 3 3 8 (hereinafter referred to as Patent Document 2), a technique for embedding binary data in a printed material is disclosed. is there.
- This conventional imaging is realized by representing binary data in a black and white square of a specified size and arranging them in a matrix. Furthermore, a positioning symbol is added to the printed position at the specified position in the matrix so that the imaged position can be known at the time of decoding. By using this positioning symbol as a reference, it is possible to capture an image with a scanner or a power camera and decode the embedded information.
- Patent Document 1 can apply encryption only to the entire image, and can perform efficient encryption when the area that needs to be encrypted is a small part of the entire image. There was a problem of not.
- Patent Document 1 has a problem in that the scrambled block unit cannot be accurately extracted as the image becomes larger because the distortion in the image is not taken into consideration.
- Patent Document 2 can embed data with a relatively small amount of information such as text information, but has a large amount of information such as images and audio information, and some decoding errors occur. However, it is not suitable for storing safe data. Furthermore, there is a constraint that it is a certain size and square. There was a problem that it could not be used for applications such as hiding part of characters.
- Patent Document 2 is premised on black and white characters and drawings, and has a problem that it cannot be applied to images having multiple gradations such as photographs. It is possible to encrypt image data with a large amount of information that cannot be encrypted by technology such as 2 so that humans do not visually recognize it.
- the following three means are used in order to encrypt a part of an input image so that the encrypted area can be specified at the time of decryption.
- the first means is a means for performing encryption by regularly converting pixel values in the encryption area and generating a unique pattern corresponding to the pixel value conversion.
- the second means is means for adding positioning markers for specifying the encryption position to at least two of the four corners of the encryption area.
- the third means is to add at least one check mark for verifying the validity of the decrypted image in the encryption area before the encryption process.
- the encrypted area can be correctly specified at the time of decryption, so that the original image can be visually recognized by humans. It is possible to restore to.
- the present invention is an image encryption executed in an image encryption apparatus that encrypts a digital image into an encrypted image, and is encrypted from the digital image.
- the pixel value of the converted processed image is set to It is characterized in that a converted image is generated by regular conversion.
- the conversion into the processed image may be performed by dividing the partial area into a plurality of minute areas and rearranging the divided minute areas based on the encryption key, or Converted into compressed data by a compression method, and the converted pressure It is desirable to arrange each bit of the reduced data as white pixels or black pixels of any size.
- the conversion to the converted image is generally performed by converting the pixel value at a constant period in the horizontal direction of the processed image, and converting the pixel value at a constant period in the vertical direction. It is desirable to generate a converted image that forms a striped pattern.
- the marker may be a solid circular shape or a polygonal shape, and a shape in which a plurality of lines intersecting the circumference of the circular shape or the polygon exist on the inside thereof, or the foreground is formed by pixel value conversion. It is desirable.
- the present invention is an image decryption executed in an image decryption device that decrypts an encrypted image into a digital image, and the position of the encrypted partial region A specific marker added to the encrypted image is detected, an encrypted encrypted image region is detected based on the detected marker, and the detected encrypted image region is detected. An encrypted position in which pixel values are regularly converted is detected, and the encrypted image area is decrypted into the digital image based on the detected encrypted position and a decryption key. .
- the present invention provides an image decryption executed in an image decryption device for decrypting an encrypted image into a digital image, wherein the encrypted image is encrypted.
- An area is detected, an encrypted position where pixel values are regularly converted in the detected encrypted image area is detected, and the encryption is performed based on the detected encrypted position and a decryption key.
- An image area is decoded into the digital image, and a specific check mark for verifying the validity of decoding is detected from the decoded digital image.
- the present invention provides an encrypted image as a digital image.
- An image decryption executed in an image decryption device for decrypting, wherein a specific marker added to the encrypted image is detected in order to identify the position of the encrypted partial region, and the detected Based on the marker, an encrypted encrypted image area is detected, an encrypted position in which pixel values are regularly converted in the detected encrypted image area is detected, and the detected encryption is detected.
- the problem of loss of image information caused by adding a positioning frame to the outside of the encrypted image is regularly converted into pixel values in the encrypted area.
- it is solved by means of generating a unique pattern corresponding to pixel value conversion. If there is an image with edges such as characters in the encrypted area, the pattern shape of the encrypted image obtained by the above processing will not be perfect, but it will be encrypted by using the statistical properties of the entire encrypted image. Can be detected correctly.
- the regular pattern for detecting the encrypted position which is generated by converting the pixel value, has a certain width, so that the encrypted image can be viewed with a low-resolution camera. Even when read, the encrypted position can be detected correctly and decrypted.
- a method of compressing and encrypting images is used in combination, a decrypted image with image quality that does not depend on the resolution of the scanner or camera can be realized.
- FIG. 1 is a diagram showing a processing outline (part 1) of an embodiment to which the present invention is applied.
- FIG. 2 is a diagram showing a processing outline (part 2) of the embodiment to which the present invention is applied.
- FIG. 3 is a diagram showing an outline of encryption processing in the first embodiment.
- FIG. 4 is a diagram showing an example of selecting an encryption area.
- FIG. 5 is a diagram showing an input example of an encryption key.
- FIG. 6 is a diagram illustrating an example of a scramble process in an image conversion unit.
- FIG. 7 is a diagram showing another example of the scramble process in the image conversion unit.
- FIG. 8 is a diagram showing a modification of the shape of a minute area in the scramble process.
- FIG. 9 is a diagram showing compression processing in an image conversion unit.
- FIG. 10 is a diagram showing a process for converting converted data into an image.
- FIG. 1 1 is a diagram showing an example (part 1) of pixel value conversion processing in a pixel value conversion unit.
- FIG. 12 is a diagram showing an example (part 2) of pixel value conversion processing in the pixel value conversion unit.
- FIG. 13 is a diagram showing an example of a positioning marker used in encryption processing.
- FIG. 14 is a diagram showing an example of an encrypted image.
- FIG. 15 is a diagram illustrating an example of encryption of a gray scale image.
- FIG. 16 is a diagram showing an outline of a decoding process in the first embodiment.
- FIG. 17 is a diagram showing a process of detecting an encryption area from a positioning marker.
- FIG. 18 is a flowchart showing the flow of an encrypted area detection process.
- FIG. 19 is a diagram showing an example in which an encrypted position is detected.
- FIG. 20 is a diagram showing an overall image of the second embodiment.
- FIG. 21 is a diagram showing an outline of encryption processing in the second embodiment.
- FIG. 22 is a diagram showing an outline of the decrypting process in the second embodiment.
- FIG. 23 is a diagram for explaining a method of detecting an encryption area.
- FIG. 24 is a diagram for explaining an encryption position (horizontal direction) detection method.
- FIG. 25 is a diagram showing an example of erroneous detection of an encrypted position.
- FIG. 26 is a diagram showing an outline of the encryption processing in the third embodiment.
- FIG. 27 is a diagram showing an outline of a decoding process in the third embodiment.
- FIG. 28 is a configuration diagram of a processing apparatus that executes encryption processing and decryption processing in the present invention.
- Fig. 29 is a diagram for describing quoting to the computer of the encryption and decryption program in the present invention.
- FIG. 1 is a diagram showing a processing outline (part 1) of the embodiment to which the present invention is applied.
- the encryption unit 1 1 (in the first to third embodiments, encryption units 1 1 A, 1 1 B, and 1 1 C, respectively) are connected to the input digital image. Based on an encryption key indicating an encryption method, an encrypted image obtained by encrypting a part of the digital image is output.
- the printer output unit 12 prints the digital image encrypted by the encryption unit 11 1 on a printable physical medium such as paper.
- the scanner (camera) reading unit 1 3 reads the print image output from the printer output unit 1 2 using a scanner or camera.
- the decoding unit 14 (in the first to third embodiments, the decoding units 14 A, 14 B, and 14 C are respectively referred to as the printer output unit 1).
- a decrypted image is obtained by the print image output by 2 and the input decryption key. Only when the input decryption key is correct, the encrypted image can be properly decrypted, and the information hidden by the encryption by the encryption unit 11 can be viewed.
- FIG. 2 is a diagram showing a processing outline (part 2) of the embodiment to which the present invention is applied.
- the encryption process and the decryption process in the first to third embodiments to which the present invention is applied include a digital image encrypted by the encryption unit 11 in a printer. It is also possible to input the electronic document image as it is to the decoding unit 14 without using a scanner or a scanner and obtain a decoded image.
- FIG. 3 is a diagram showing an outline of the encryption processing in the first embodiment.
- the encryption unit 1 1 A includes an encryption area determination unit 3 1, an image conversion unit 3 2, a pixel value conversion unit 3 3, and a marker addition unit 3 4.
- the encryption area designating unit 31 selects an area to be encrypted from the input image including the area to be encrypted.
- FIG. 4 is a diagram showing an example of selecting an encryption area.
- the encryption area designating unit 31 selects the area 42 to be encrypted from the digital image (input image) 41 including the area to be encrypted.
- This area 42 is converted into a converted image 43 as shown in (B) of FIG. 4 by the processing of the image conversion unit 32 and the pixel value conversion unit 33, which will be described later, and the digital image 41 is encrypted including the converted image 43. Converted to image 44.
- the area 42 to be encrypted is selected by the encryption area designating unit 31, the area 42 to be encrypted and the encryption key are input in the image conversion unit 32, and the area 42 to be encrypted by the conversion method corresponding to the encryption key is input.
- the conversion parameters at that time are created from binary data obtained from the input encryption key.
- FIG. 5 is a diagram illustrating an input example of the encryption key.
- the example shown in Fig. 5 is an example of an encryption key and binary data generated by the encryption key.
- the numerical value “1 234” as the encryption key is input as binary data ⁇ 1 0001 1 01 001 0 ”
- the character string“ ango ”as the encryption key is input as binary data“ 01 1 00001 01 1 01 1 1 001 ”.
- a conversion method using a process (called a scramble process) that divides an image into minute regions and rearranges the minute regions, and a conversion by compressing the image. Two methods are shown.
- the image of the selected area 42 is divided into small areas of a certain size, and then the small areas are rearranged by binary data obtained from the encryption key.
- FIG. 6 is a diagram illustrating an example of the scramble process in the image conversion unit.
- the area 42 selected by the encryption area specifying unit 31 is divided vertically, and each bit of the binary string of the encryption key 61 is divided.
- the bit is “1”, the adjacent divided columns are exchanged. If the bit is “0”, nothing is done in order from the left. If the number of bits in the binary string is insufficient relative to the number of division boundaries, the same binary string is repeated from the missing position until the right end of area 42 is exchanged.
- the image area 62 that has been subjected to the above-described exchange process is divided in the horizontal direction, and each bit of the binary string of the encryption key 61 is divided.
- the same exchange processing as that performed by vertical division is performed in order from the top in line units.
- a scrambled image 63 which is a processed image in which the original region 42 is scrambled, is obtained.
- this scramble processing example it can be performed twice or more in both the horizontal and vertical directions, and the size of the divided area can be changed in the second and subsequent exchanges.
- different binary rows can be used for exchanging the divided areas in the horizontal and vertical directions.
- FIG. 7 is a diagram showing another example of the scramble process in the image conversion unit.
- a method of exchanging pixels in units of minute regions as shown in FIG. 7 is also possible.
- the input image is divided into rectangular minute areas, and the divided minute areas are exchanged.
- the number of scrambles is larger than the method based on the exchange between the horizontal direction and the vertical direction (row and column) described above, and the encryption strength can be increased.
- FIG. 8 is a diagram showing a modification of the shape of a minute region in the scramble process.
- a triangle as shown in (A) of FIG.
- minute regions of different shapes and sizes can coexist.
- FIG. 9 is a diagram illustrating compression processing in the image conversion unit.
- the image in the area 4 2 selected by the encryption area designating section 31 is first compressed as shown in (A) of FIG. Create a binary string 7 1 as shown in).
- the compression method used here is run-length compression used when binary image data is transferred on a facsimile machine, or JBIG (Joint B i-1 eve I Image experts Grou), which is a standard binary image compression method. p) Any compression method is applicable, such as compression.
- FIG. 10 is a diagram showing a process for converting the converted data into an image.
- each bit of binary string 71 which is the converted compressed data, is changed to a bit of '0' as shown in Fig. 10 (B). If the bit size is “1”, the square image (processed image) 8 1 is created by enlarging the rectangle to the specified size of “black” if the bit is “1”. Image 8 Arranged as one.
- the size of the rectangular image 81 depends on the compression ratio of the selected area 42. Come on. For example, if the compression ratio is 1 Z 4 or less, the size of the square image 8 1 is at most 2 X 2 pixels, and if it is 1 Z 16 or less, it is at most 4 X 4 pixels.
- the size of the square image 81 is specified in advance and the compressed data is to be stored in the image of the selected area 42, it depends on the size of the square image 81 in the first image compression process. It is necessary to achieve the compression ratio. For example, if the square is 4 x 4 pixels in size, a compression ratio of 1 Z 16 or higher is required. This place In this case, it is effective to use a method in which the information in the selected area 42 is previously dropped and compressed, or a method using an irreversible compression method.
- the pixels in the processed image 63 converted by the image conversion unit 32 are converted at regular intervals so that the conversion image 43 has a grid-like striped pattern. To do.
- FIG. 11 is a diagram showing an example (part 1) of the pixel value conversion processing in the pixel value conversion unit.
- the pixels of the processed image 63 in which the region 42 is scrambled by the image conversion unit 32 are converted at regular intervals, and the encrypted image 44 as a whole has a generally lattice shape.
- Make a striped pattern For example, as shown in Fig. 11, a conversion that inverts the scrambled image 63 shown in (A) of Fig. 11 with the checkered pattern (checkered pattern) image 91 shown in (B) of the colored portion of image 91.
- the converted image 92 having an almost grid-like striped pattern as a whole is obtained.
- the generated striped pattern is used to detect the detailed position of each pixel in the encryption area when the encrypted image 44 is decrypted.
- the process of inverting the pixel value may be a process of adding a specified value.
- the checkered image 91 shown in (B) of Fig. 11 is approximately the same size as the scrambled image 63 shown in (A), but by using a size smaller than the scrambled image 63, Only the center portion other than the periphery of the scrambled image 63 may be reversed.
- FIG. 12 is a diagram illustrating an example (part 2) of the pixel value conversion processing in the pixel value conversion unit.
- various shapes can be applied to the region 42 for converting the pixel value. Since pixel value conversion is a process aimed at detecting the boundary position between small areas with high accuracy, it may be possible to convert the pixel value only at the boundary as shown in Fig. 12 (A), for example.
- the boundary between conversion and non-conversion appears at a finer interval, so encryption is performed in the decryption process.
- the pixel position of image 44 can be detected in more detail.
- pixel value conversion can be performed only on the part where the boundaries of the minute areas intersect, as shown in Fig. 12 (C)
- image quality degradation when reading and decoding images printed on paper with a scanner or camera is reduced. Can be minimized.
- pixel value conversion for example, pixel value conversion in units of regions divided in a triangular shape
- pixel value conversion in units of regions divided in a triangular shape using a divided region different from the shape of the minute region as a unit is also applicable.
- the shape of the micro area is not a square with a uniform size, but as shown in Fig. 8, when the triangle (Fig. 8 (A)) and different sizes and shapes coexist (Fig. 8 (B))
- the pixel value conversion (for example, triangular pixel value conversion to a triangular small area) may be performed by a method according to the shape, not limited to the above conversion example, or the pixel value is irrelevant to the shape of the scrambling. Conversion (for example, rectangular pixel value conversion to a triangular micro-region) may be performed.
- the regular pattern representing the encrypted position is not generated by overwriting the input image as in Patent Document 1, but the pixel value of the input image is converted. It is generated by that. Therefore, unlike the conventional technique, the image information at the end of the encrypted image is not sacrificed for position detection, and the original image information can be efficiently encrypted in the form of coexisting position detection information. Yes.
- the converted image 9 converted by the pixel value conversion unit 3 3 Of the four corners of 2 add positioning markers to three places other than the lower right, for example, to create an encrypted image 44.
- the marker adding unit 34 places the positioning markers for specifying the position of the encrypted area 42 at three places other than the lower right of the four corners of the converted image 92, for example.
- FIG. 13 is a diagram showing an example of the positioning marker used in the encryption process.
- the positioning marker used in the first embodiment is assumed to have a round cross shape as shown in Fig. 13 (A).
- the shape of the positioning marker is more broadly defined, it may be composed of a solid circle or polygon and a plurality of lines intersecting the circumference. Examples of this are the ones in the shape of “K” in the Chinese character like the positioning marker in (B) in Figure 13 and the three lines from the center to the circumference like the positioning marker in (C). And those that appear in a radial pattern, and those that have a broken line, such as (D) positioning markers.
- the color composition of the positioning marker may be the simplest as long as the background is white and the foreground is black.
- the configuration is not limited to this, and is appropriate depending on the color (pixel value) distribution of the converted image 92 It can be changed.
- a method of forming a positioning marker by inverting the foreground pixel values while the background color is still the digital image 41 can be considered. In this way, the image can be encrypted while maintaining the input image information of the positioning marker portion.
- FIG. 14 is a diagram illustrating an example of an encrypted image.
- the encrypted image 4 4 includes a converted image 9 2 and a positioning marker 1 2 1.
- FIG. 15 shows an example in which a grayscale image is encrypted.
- the grayscale image 1 3 1 shown in (A) is the encryption unit.
- an encrypted image 1 3 2 including a converted image 1 3 3 and a positioning marker 1 3 4 is generated as shown in (B).
- FIG. 16 is a diagram showing an outline of the decrypting process in the first embodiment.
- the decryption unit 14 A includes a marker detection unit 14 1, an encryption area detection unit 1 4 2, an encryption position detection unit 1 4 3, and an image reverse conversion unit 1 4 4.
- the marker detection unit 14 1 1 detects the position of the positioning marker added by the marker 1 addition unit 3 4 from the encrypted image using a general image recognition technique. As the detection method, pattern matching and analysis of figure connectivity can be applied.
- the encryption area detection unit 14 2 detects an encrypted image area based on the positional relationship of the three positioning markers detected by the marker detection unit 14 1.
- Fig. 17 shows the process of detecting the encryption area from the positioning marker.
- one encryption area 15 3 can be detected.
- the three positioning markers 1 5 2 are arranged at the four corners of the rectangular encryption area 1 5 3, these three points (positions of positioning markers 1 5 2) are connected by lines.
- the resulting figure is roughly a right triangle. Therefore, when three or more positioning markers 1 5 2 are detected, the three positioning markers 1 5 2 include an area configured by a shape close to a right triangle, and the three positioning markers 1 5 2 5 A rectangular shape with the position of 2 in the three corners out of the four corners is called encryption area 1 5 3. If the number of detection positioning markers 1 5 2 is 2 or less, the corresponding encryption area 1 5 3 cannot be specified. The decoding process is terminated assuming that no image exists.
- FIG. 18 is a flowchart showing the flow of the encrypted area detection process.
- the encryption area detection process executed by the encryption area detection unit 1 4 2 starts with the number of positioning markers 1 5 2 detected by the marker detection unit 1 4 1 in step S 1 6 0 1. Is substituted for the variable n, and in step S 1 6 0 2, 0 is substituted for the detection flag reg_detect of the encryption area 1 5 3.
- step S 1 600 it is determined whether or not the variable n to which the number of positioning markers 1 5 2 is assigned is 3 or more. If the variable n is not 3 or more, that is, the variable If n is 2 or less (step S 1600: No), the decryption process including the encrypted area detection process is terminated.
- step S1600 the positioning marker 1 5 2 detected by the marker detection unit 14 1 Three of the positioning markers 1 52 are selected, and in step S 1 6 0 5, it is determined whether or not the positional relationship of the selected three positioning markers 1 52 is a substantially right triangle.
- step S 1 6 0 6 If the positional relationship between the three selected positioning markers 1 5 2 is not a substantially right triangle (step S 1 6 0 5: No), in step S 1 6 0 6, the marker one detection unit 1 4 1 It is determined whether or not all combinations of the three positioning markers 1 5 2 detected by (1) are completed. If not (step S 1 6 0 6: No), step S 1 6 0 4 Return to, select the other three points, and if finished (step S 1 6 0 6: Y es), proceed to step S 1 6 0 8.
- step S 1 6 0 5: Y es the detection flag reg_detect is set to 1 in step S 1 6 0 7. Is assigned.
- step S 1 6 0 8 whether or not 1 is assigned to the detection flag reg_detect, that is, three positioning markers 1 5 2 in which the positional relationship between the three points is a right triangle is detected. If 1 is assigned to reg_detect (step S 1 6 0 8: Y es), the encrypted position detection unit Proceed to the processing of 1 4 3, and if 1 is not assigned to reg_detect (step S 1 600: No), the decryption processing including this encryption area detection processing is terminated.
- the detection flag reg_detect that is, three positioning markers 1 5 2 in which the positional relationship between the three points is a right triangle is detected. If 1 is assigned to reg_detect (step S 1 6 0 8: Y es), the encrypted position detection unit Proceed to the processing of 1 4 3, and if 1 is not assigned to reg_detect (step S 1 600: No), the decryption processing including this encryption area detection processing is terminated.
- the encrypted position detection unit 1 4 3 has a regular arrangement at the end of the encrypted region 1 5 3 detected by the encryption region detection unit 1 4 2.
- the detailed position of each pixel in the encryption area 15 3 is detected by frequency analysis or pattern matching. This detection uses the property that the entire encrypted image 15 1 forms a periodic pattern by the pixel value conversion (inversion) processing of the pixel value conversion unit 33.
- the period (width) of the pattern is first obtained by a frequency analysis method such as Fast Fourier Transform (FFT) in the horizontal and vertical directions of the image, and then template matching is performed.
- FFT Fast Fourier Transform
- FIG. 19 is a diagram showing an example in which the encrypted position is detected.
- the periodicity of the encrypted image 44 may be significantly impaired. In such a case, it is effective to detect the encrypted position by limiting the image area used for calculating the periodic period and the boundary position to a part having a relatively strong periodicity.
- the image reverse conversion unit 1 4 4 uses the encrypted position information detected by the encrypted position detection unit 1 4 3 and the decryption key input by the user to correspond the encrypted image 4 4 to the decryption key.
- the inverse conversion process of the conversion process by the image conversion unit 32 is executed by the method to generate a decoded image.
- the decryption process is performed in the reverse order of the encryption process, so the explanation is omitted.
- FIG. 20 is a diagram showing an overall image of the second embodiment.
- a specific check mark 1 8 2 for verifying validity of decryption of the encrypted image 1 8 3 is encrypted before the encryption process.
- 1 8 Add to any location in (1) ( Figure 20 (A)) Perform encryption ( Figure 20 (B)), and check that was added in advance after decrypting encrypted image 1 8 3
- the decoding process is terminated as being correctly decoded ((C) in FIG. 20). If the check mark 1 8 2 is not detected ((D) in Fig. 20), the encrypted position is corrected and decrypted until the check mark 1 8 2 is detected or until the specified standard is met. Repeat the process.
- FIG. 21 is a diagram showing an outline of the encryption processing in the second embodiment.
- the encryption unit 1 1 B includes an encryption area determination unit 3 1, a check mark addition unit 1 9 2, an image conversion unit 3 2, and a pixel value conversion unit 3 3.
- the encryption area specifying unit 31 selects an area to be encrypted from an input image including the area to be encrypted.
- the check mark adding unit 1 9 2 has a specific check mark 1 8 2 for verifying the validity of the decryption of the encrypted image 1 8 3 at an arbitrary place in the area 1 8 1 to be encrypted. Add. It is desirable to add the check mark 1 8 2 to a flat region with a pixel distribution with as little image information as possible.
- FIG. 22 is a diagram showing an outline of the decrypting process in the second embodiment.
- the decryption unit 1 4 B includes an encryption area detection unit 2 0 1, an encryption position detection unit 1 4 3, an image reverse conversion unit 1 4 4, a check mark detection unit 2 0 4 and And an encrypted position correction unit 205.
- the encrypted area detector 2 0 1 detects a rough area of the encrypted image 1 83.
- Encryption unit 1 1 B Due to the encryption process, the pixel distribution of encrypted image 1 8 3 has a checkered pattern, so if you perform frequency analysis such as FFT in the horizontal and vertical directions, respectively. The frequency band corresponding to the fringe period is remarkably strong.
- FIG. 23 is a diagram for explaining a method of detecting an encryption area.
- the encryption position detection unit 14 3 identifies the approximate area of encryption by the encryption area detection unit 2 0 1 and then more accurately detects the encryption area, and simultaneously detects each pixel in the encryption area. Detect detailed position. As an example of position detection, first, the boundary position (offset) of pixel value conversion is obtained from the period of the striped pattern obtained by the encryption area detector 2 0 1 and the distribution of the pixel absolute value difference, and the pixel absolute value difference is further calculated therefrom. A method of narrowing a relatively large area is conceivable. Further, as with the encrypted position detection unit 14 3 of the first embodiment, it is also possible to use Hough transform for detecting the encrypted position.
- FIG. 24 is a diagram for explaining a method of detecting the encryption position (lateral direction).
- the image reverse conversion unit 1 4 4 uses the encrypted position information and the decryption key to perform the first embodiment.
- a decoded image is generated by performing the same method as the above-described method.
- the check mark detection unit 20 4 attempts to detect a check mark from the decoded image decoded by the image inverse conversion unit 14 4. Since the detection method is the same as the marker detection process in the first embodiment, a description thereof will be omitted. If a check mark is detected, a decoded image is output and the process is completed. If the check mark is not detected, the encryption position correction unit 205 corrects the encryption position and decrypts until the check mark is detected or until the specified standard is satisfied (image reverse conversion process). Try again.
- FIG. 25 is a diagram showing an example in which the detection of the encrypted position is wrong.
- the check mark 2 2 1 can be detected by performing reverse image conversion processing by adding or deleting lines representing the encryption position at the left and right ends and the upper and lower ends. Whether or not to consider each. If the check mark 2 2 1 cannot be detected no matter how the line is added or deleted, the process ends without outputting the decoded image.
- the positioning marker that identifies the encryption area shown in the first embodiment and the check for judging the validity of the decrypted image of the second embodiment Encrypt and decrypt images using both marks.
- FIG. 26 is a diagram showing an outline of the encryption processing in the third embodiment.
- the encryption unit 1 1 C includes an encryption area determination unit 3 1, a check mark addition unit 1 9 2, an image conversion unit 3 2, a pixel value conversion unit 3 3, and a marker addition unit 3 4.
- an image area to be encrypted is selected by the encryption area designating unit 31, and a check mark for decryption verification is checked by the check mark adding unit 192 in the same manner as in the second embodiment.
- Add. After adding the check mark, the image conversion unit 32 and the pixel value conversion unit 33 perform image processing in the same manner as in the first and second embodiments, and the image is encrypted.
- the marker addition unit 34 encrypts the image.
- a positioning marker for area detection is added in the same manner as in the first embodiment. Since the contents of these processes are the same as those in the first embodiment or the second embodiment, description thereof is omitted.
- FIG. 27 is a diagram showing an outline of the decrypting process in the third embodiment.
- the decryption unit 14 C includes a marker detection unit 1 41, an encryption area detection unit 1 42, an encryption position detection unit 1 43, an image reverse conversion unit 1 44, a check mark detection unit 204, and an encryption.
- a position correction unit 205 is provided.
- the marker detection unit 144 detects a positioning marker in the same manner as in the first embodiment, and the subsequent encryption area detection unit 144 in the same way as in the first embodiment performs encryption. Detect areas. Further, the encrypted position detector 143 detects the detailed position of each pixel in the encrypted area by the same method as in the first embodiment. Also, the processing procedures executed by the image reverse conversion unit 144, the check mark detection unit 204, and the encrypted position correction unit 205 are the same as those in the second embodiment, and thus the description thereof is omitted.
- the processing apparatus that executes the encryption process and the decryption process to which the present invention is applied performs its functions. If there is, the present invention is not limited to the above-described embodiment, and processing is performed via a network such as a LAN or WAN, whether it is a single device, a system composed of a plurality of devices, or an integrated device. Needless to say, it may be a system.
- a CPU 2601 connected to a bus 2608, a ROM or RAM memory 2602, an input device 2603, an output device 2604, It can also be realized by a system including an external recording device 2605, a medium driving device 2606, a portable recording medium 2609, and a network connection device 2607.
- the ROM or RAM memory 2602, the external recording device 2605, and the portable recording medium 2609 in which the software program code for realizing the system of the above-described embodiment is recorded are supplied to the processing device. Needless to say, this can also be achieved by the processor of the processor reading and executing the program code.
- the program code itself read from the portable recording medium 2609 or the like realizes the new function of the present invention, and the portable recording medium 2609 or the like on which the program code is recorded is provided. This constitutes the present invention.
- the portable recording medium 2609 for supplying the program code includes, for example, a flexible disk, hard disk, optical disk, magneto-optical disk, CD-ROM. CD-R. DVD-ROM. DVD-RAM.
- Various recording media recorded via a network connection device 2607 such as a non-volatile memory card, ROM card, electronic mail or personal computer communication can be used.
- the function of the above-described embodiment is realized by executing the program code read out on the memory 2602 by the computer, and based on the instruction of the program code, the computer
- the OS or the like operating above performs part or all of the actual processing, and the functions of the above-described embodiment are realized by the processing.
- the program code (data) read from the portable recording medium 2609 is connected to the function expansion board or computer inserted in the computer. After being written to the memory 2602 provided in the function extension unit, the CPU 26 01 etc. provided in the function extension unit performs part or all of the actual processing based on the instructions of the program code.
- the function of the embodiment described above can also be realized by this processing. That is, the present invention is not limited to the embodiments described above, and can take various configurations or shapes without departing from the gist of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Facsimile Transmission Control (AREA)
- Image Processing (AREA)
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2008541986A JP4796150B2 (ja) | 2006-10-31 | 2007-03-13 | 画像暗号化/復号化装置、方法およびプログラム |
CN2007800397423A CN101529888B (zh) | 2006-10-31 | 2007-03-13 | 图像加密/解密装置、方法 |
EP07736874.4A EP2079228B1 (en) | 2006-10-31 | 2007-03-13 | Image encryption/decryption device, method, and program |
US12/425,977 US8433067B2 (en) | 2006-10-31 | 2009-04-17 | Device, method, and program for image encryption/decryption |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JPPCT/JP2006/321794 | 2006-10-31 | ||
PCT/JP2006/321794 WO2008053545A1 (fr) | 2006-10-31 | 2006-10-31 | Dispositif de chiffrage/déchiffrage d'images, procédé et programme |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/425,977 Continuation US8433067B2 (en) | 2006-10-31 | 2009-04-17 | Device, method, and program for image encryption/decryption |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008053576A1 true WO2008053576A1 (fr) | 2008-05-08 |
Family
ID=39343904
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2006/321794 WO2008053545A1 (fr) | 2006-10-31 | 2006-10-31 | Dispositif de chiffrage/déchiffrage d'images, procédé et programme |
PCT/JP2007/000215 WO2008053576A1 (fr) | 2006-10-31 | 2007-03-13 | Dispositif, procédé et programme de codage/décodage d'image |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2006/321794 WO2008053545A1 (fr) | 2006-10-31 | 2006-10-31 | Dispositif de chiffrage/déchiffrage d'images, procédé et programme |
Country Status (5)
Country | Link |
---|---|
US (1) | US8433067B2 (ja) |
EP (1) | EP2079228B1 (ja) |
KR (1) | KR101005377B1 (ja) |
CN (1) | CN101529888B (ja) |
WO (2) | WO2008053545A1 (ja) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1998306A1 (en) | 2007-05-30 | 2008-12-03 | Fujitsu Ltd. | Image encryption/decryption system |
JP2009244775A (ja) * | 2008-03-31 | 2009-10-22 | Fujitsu Ltd | 画像暗号装置及び画像復号化装置 |
WO2009144796A1 (ja) * | 2008-05-29 | 2009-12-03 | 株式会社Pfu | 電子ドキュメント処理システム、方法およびプログラム |
WO2010046951A1 (ja) * | 2008-10-23 | 2010-04-29 | 富士通株式会社 | 画像の暗号化装置/復号装置、画像の暗号化方法/復号方法、画像の暗号化プログラム/復号プログラム |
WO2010073409A1 (ja) | 2008-12-26 | 2010-07-01 | 富士通株式会社 | 画像処理システム、画像処理装置及び画像処理方法 |
JP2010147778A (ja) * | 2008-12-18 | 2010-07-01 | Fujitsu Ltd | 画像のマーカ付加装置、方法、及びプログラム |
JPWO2008146504A1 (ja) * | 2007-05-31 | 2010-08-19 | 株式会社Pfu | 画像処理システム |
JP4800420B2 (ja) * | 2007-05-31 | 2011-10-26 | 株式会社Pfu | 紙媒体情報暗号化システム、復号システム、プログラムおよび方法 |
WO2011161803A1 (ja) * | 2010-06-25 | 2011-12-29 | 富士通株式会社 | 画像処理装置および画像処理方法 |
EP2432211A1 (en) * | 2009-05-11 | 2012-03-21 | Fujitsu Limited | Image encryption/decoding device, method, and program |
US20130104163A1 (en) * | 2010-06-02 | 2013-04-25 | Zte Corporation | Encryption method for television service of mobile terminal, mobile terminal and server |
US8571212B2 (en) | 2007-05-30 | 2013-10-29 | Fujitsu Limited | Image encrypting device, image decrypting device and method |
US8588414B2 (en) | 2007-05-30 | 2013-11-19 | Fujitsu Limited | Image encryption and image decryption apparatus and method |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5206024B2 (ja) * | 2008-02-28 | 2013-06-12 | 富士通株式会社 | 画像復号化装置、画像暗号化装置、画像復号化方法および画像復号化プログラム |
KR101323502B1 (ko) | 2009-03-19 | 2013-10-31 | 후지쯔 가부시끼가이샤 | 마커 생성 프로그램을 기록한 기록 매체, 마커 생성 장치 및 마커 생성 방법 |
CN102340688B (zh) * | 2010-07-16 | 2017-02-15 | 于培宁 | 一种图像序列的加密、解密方法 |
US20130100243A1 (en) * | 2011-10-20 | 2013-04-25 | Broadcom Corporation | Secure Stereoscopic Display |
US8942491B2 (en) * | 2012-11-29 | 2015-01-27 | Konica Minolta Laboratory U.S.A., Inc. | Topology-preserving downsampling of binary images |
US9396310B2 (en) | 2013-07-15 | 2016-07-19 | At&T Intellectual Property I, L.P. | Method and apparatus for providing secure image encryption and decryption |
CN104637039B (zh) * | 2013-11-07 | 2020-07-07 | 深圳市腾讯计算机系统有限公司 | 一种图片处理的方法及装置 |
CN103606126A (zh) * | 2013-11-28 | 2014-02-26 | 辽宁大学 | 一种基于三维Logistic映射的图像双重置乱方法 |
CN104680077B (zh) * | 2015-01-20 | 2021-10-12 | 中兴通讯股份有限公司 | 一种加密图片的方法、查看图片的方法、系统和终端 |
CN105405092A (zh) * | 2015-11-26 | 2016-03-16 | 熊桂荣 | 基于可逆水印和马赛克技术的安全数字图像传播方法 |
JP6834771B2 (ja) * | 2017-05-19 | 2021-02-24 | 富士通株式会社 | 通信装置および通信方法 |
CN108614971A (zh) * | 2018-04-12 | 2018-10-02 | Oppo广东移动通信有限公司 | 加密处理及解密处理方法和装置 |
CN108989604B (zh) * | 2018-07-20 | 2020-05-05 | 京东方科技集团股份有限公司 | 图像加密方法、图像传输方法、电子设备、可读存储介质 |
US12063298B2 (en) * | 2018-09-14 | 2024-08-13 | Cup Sciences, Inc. | Optical encryption terminal, cryptography key distribution system and method of generating cryptography keys in a cryptography key distribution system |
US11240015B2 (en) * | 2018-09-14 | 2022-02-01 | Cup Sciences, Inc. | Optical encryption terminal, cryptography key distribution system and method of generating cryptography keys in a cryptography key distribution system |
CN112035847B (zh) * | 2019-06-03 | 2023-10-27 | 湖北微模式科技发展有限公司 | 一种图像加密、解密方法及装置、电子设备和存储介质 |
US11544415B2 (en) | 2019-12-17 | 2023-01-03 | Citrix Systems, Inc. | Context-aware obfuscation and unobfuscation of sensitive content |
US11539709B2 (en) | 2019-12-23 | 2022-12-27 | Citrix Systems, Inc. | Restricted access to sensitive content |
US11582266B2 (en) | 2020-02-03 | 2023-02-14 | Citrix Systems, Inc. | Method and system for protecting privacy of users in session recordings |
US20210303718A1 (en) * | 2020-03-31 | 2021-09-30 | Citrix Systems, Inc. | Context based data leak prevention of sensitive information |
WO2022041163A1 (en) | 2020-08-29 | 2022-03-03 | Citrix Systems, Inc. | Identity leak prevention |
CN113177876A (zh) * | 2021-04-09 | 2021-07-27 | 作业帮教育科技(北京)有限公司 | 一种图片的处理方法、装置及电子设备 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05199424A (ja) * | 1992-01-17 | 1993-08-06 | Ricoh Co Ltd | 画像暗号化再生装置 |
JPH08179689A (ja) | 1994-12-26 | 1996-07-12 | Casio Comput Co Ltd | 画像データ処理装置及び画像データ処理方法 |
JP2938338B2 (ja) | 1994-03-14 | 1999-08-23 | 株式会社デンソー | 二次元コード |
JP2000232586A (ja) * | 1999-02-09 | 2000-08-22 | Ricoh Co Ltd | 画像符号化装置及び画像復号化装置 |
JP2004032538A (ja) * | 2002-06-27 | 2004-01-29 | Canon Inc | 情報処理装置及び情報処理方法 |
JP2006080623A (ja) * | 2004-09-07 | 2006-03-23 | Canon Inc | 情報処理方法及び装置、並びにコンピュータプログラム及びコンピュータ可読記憶媒体 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5159630A (en) * | 1991-05-29 | 1992-10-27 | International Communication Systems Corporation | Facsimile message encryption system |
US5491563A (en) * | 1992-02-04 | 1996-02-13 | Aliroo Ltd. | Apparatus for scrambling and unscrambling documents |
SE513356C2 (sv) * | 1998-11-20 | 2000-08-28 | Ericsson Telefon Ab L M | Förfarande och anordning för kryptering av bilder |
US6542261B1 (en) * | 1999-04-12 | 2003-04-01 | Hewlett-Packard Development Company, L.P. | Method and apparatus for sending or receiving a secure fax |
US6839844B1 (en) * | 2000-01-03 | 2005-01-04 | Hirokazu Okano | Image encryption method and device |
JP2003324418A (ja) * | 2002-02-27 | 2003-11-14 | Canon Inc | 画像処理装置、データ処理装置及びデータ処理方法 |
JP2004242287A (ja) * | 2003-01-14 | 2004-08-26 | Canon Inc | 情報処理方法及び装置、並びにコンピュータプログラム及びコンピュータ可読記憶媒体 |
JP2008219702A (ja) * | 2007-03-07 | 2008-09-18 | Murata Mach Ltd | 画像処理装置 |
JP4348381B2 (ja) * | 2007-05-30 | 2009-10-21 | 富士通株式会社 | 画像暗号化/復号化装置、方法およびプログラム |
JP4820446B2 (ja) * | 2007-05-30 | 2011-11-24 | 富士通株式会社 | 画像暗号化装置、画像復号装置、方法、及びプログラム |
-
2006
- 2006-10-31 WO PCT/JP2006/321794 patent/WO2008053545A1/ja active Application Filing
-
2007
- 2007-03-13 EP EP07736874.4A patent/EP2079228B1/en active Active
- 2007-03-13 KR KR1020097009527A patent/KR101005377B1/ko active IP Right Grant
- 2007-03-13 CN CN2007800397423A patent/CN101529888B/zh active Active
- 2007-03-13 WO PCT/JP2007/000215 patent/WO2008053576A1/ja active Application Filing
-
2009
- 2009-04-17 US US12/425,977 patent/US8433067B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05199424A (ja) * | 1992-01-17 | 1993-08-06 | Ricoh Co Ltd | 画像暗号化再生装置 |
JP2938338B2 (ja) | 1994-03-14 | 1999-08-23 | 株式会社デンソー | 二次元コード |
JPH08179689A (ja) | 1994-12-26 | 1996-07-12 | Casio Comput Co Ltd | 画像データ処理装置及び画像データ処理方法 |
JP2000232586A (ja) * | 1999-02-09 | 2000-08-22 | Ricoh Co Ltd | 画像符号化装置及び画像復号化装置 |
JP2004032538A (ja) * | 2002-06-27 | 2004-01-29 | Canon Inc | 情報処理装置及び情報処理方法 |
JP2006080623A (ja) * | 2004-09-07 | 2006-03-23 | Canon Inc | 情報処理方法及び装置、並びにコンピュータプログラム及びコンピュータ可読記憶媒体 |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8571212B2 (en) | 2007-05-30 | 2013-10-29 | Fujitsu Limited | Image encrypting device, image decrypting device and method |
US8588414B2 (en) | 2007-05-30 | 2013-11-19 | Fujitsu Limited | Image encryption and image decryption apparatus and method |
EP1998306A1 (en) | 2007-05-30 | 2008-12-03 | Fujitsu Ltd. | Image encryption/decryption system |
JPWO2008146504A1 (ja) * | 2007-05-31 | 2010-08-19 | 株式会社Pfu | 画像処理システム |
JP4800420B2 (ja) * | 2007-05-31 | 2011-10-26 | 株式会社Pfu | 紙媒体情報暗号化システム、復号システム、プログラムおよび方法 |
JP4866959B2 (ja) * | 2007-05-31 | 2012-02-01 | 株式会社Pfu | 画像処理システム |
JP2009244775A (ja) * | 2008-03-31 | 2009-10-22 | Fujitsu Ltd | 画像暗号装置及び画像復号化装置 |
WO2009144796A1 (ja) * | 2008-05-29 | 2009-12-03 | 株式会社Pfu | 電子ドキュメント処理システム、方法およびプログラム |
JP5192039B2 (ja) * | 2008-05-29 | 2013-05-08 | 株式会社Pfu | 電子ドキュメント処理システム、方法およびプログラム |
US8873744B2 (en) | 2008-05-29 | 2014-10-28 | Pfu Limited | Electronic document processing system |
WO2010046951A1 (ja) * | 2008-10-23 | 2010-04-29 | 富士通株式会社 | 画像の暗号化装置/復号装置、画像の暗号化方法/復号方法、画像の暗号化プログラム/復号プログラム |
US20110280395A1 (en) * | 2008-10-23 | 2011-11-17 | Fujitsu Limited | Image encryption device, image decryption device and methods |
EP2343877A1 (en) * | 2008-10-23 | 2011-07-13 | Fujitsu Limited | Image encryption device/decryption device, image encryption method/decryption method, and image encryption program/decryption program |
EP2343877A4 (en) * | 2008-10-23 | 2012-03-28 | Fujitsu Ltd | ENCRYPTION DEVICE / IMAGE DE-ENCRYPTION DEVICE, ENCRYPTION METHOD / IMAGE DE-ENCRYPTION METHOD, AND IMAGE ENCRYPTION PROGRAM / ENCRYPTION PROGRAM |
JP5077439B2 (ja) * | 2008-10-23 | 2012-11-21 | 富士通株式会社 | 画像の暗号化装置/復号装置、画像の暗号化方法/復号方法、画像の暗号化プログラム/復号プログラム |
US8532433B2 (en) | 2008-12-18 | 2013-09-10 | Fujitsu Limited | Image marker attaching apparatus and method |
JP2010147778A (ja) * | 2008-12-18 | 2010-07-01 | Fujitsu Ltd | 画像のマーカ付加装置、方法、及びプログラム |
US8339677B2 (en) | 2008-12-26 | 2012-12-25 | Fujitsu Limited | Image processing system, image processing apparatus, and image processing method |
WO2010073409A1 (ja) | 2008-12-26 | 2010-07-01 | 富士通株式会社 | 画像処理システム、画像処理装置及び画像処理方法 |
EP2432211A1 (en) * | 2009-05-11 | 2012-03-21 | Fujitsu Limited | Image encryption/decoding device, method, and program |
EP2432211A4 (en) * | 2009-05-11 | 2014-09-10 | Fujitsu Ltd | IMAGE ENCODING / DECODING DEVICE, METHOD, AND PROGRAM |
US8935536B2 (en) | 2009-05-11 | 2015-01-13 | Fujitsu Limited | Image encryption/decryption device, method, and storage medium storing a program |
US20130104163A1 (en) * | 2010-06-02 | 2013-04-25 | Zte Corporation | Encryption method for television service of mobile terminal, mobile terminal and server |
WO2011161803A1 (ja) * | 2010-06-25 | 2011-12-29 | 富士通株式会社 | 画像処理装置および画像処理方法 |
US8760722B2 (en) | 2010-06-25 | 2014-06-24 | Fujitsu Limited | Apparatus and method for processing images |
JP5541360B2 (ja) * | 2010-06-25 | 2014-07-09 | 富士通株式会社 | 画像処理装置および画像処理方法 |
Also Published As
Publication number | Publication date |
---|---|
CN101529888B (zh) | 2012-06-27 |
EP2079228A1 (en) | 2009-07-15 |
KR101005377B1 (ko) | 2010-12-30 |
WO2008053545A1 (fr) | 2008-05-08 |
US8433067B2 (en) | 2013-04-30 |
EP2079228A4 (en) | 2012-12-12 |
KR20090071627A (ko) | 2009-07-01 |
CN101529888A (zh) | 2009-09-09 |
US20090262931A1 (en) | 2009-10-22 |
EP2079228B1 (en) | 2018-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008053576A1 (fr) | Dispositif, procédé et programme de codage/décodage d'image | |
JP4348381B2 (ja) | 画像暗号化/復号化装置、方法およびプログラム | |
JP5206024B2 (ja) | 画像復号化装置、画像暗号化装置、画像復号化方法および画像復号化プログラム | |
JP5192039B2 (ja) | 電子ドキュメント処理システム、方法およびプログラム | |
JP5491860B2 (ja) | 電子ドキュメント暗号化システム、プログラムおよび方法 | |
JP4800420B2 (ja) | 紙媒体情報暗号化システム、復号システム、プログラムおよび方法 | |
JP3804012B2 (ja) | 文書画像の改ざん判定方法及びシステム、並びにその制御用プログラム | |
US8509425B2 (en) | Image processing system, program and method | |
US9152810B2 (en) | Information output system, method, and program for tampering detection | |
US20100316222A1 (en) | Image processing system | |
JP2009232333A (ja) | 画像暗号化装置および画像復号化装置 | |
JP4796150B2 (ja) | 画像暗号化/復号化装置、方法およびプログラム | |
US20110280395A1 (en) | Image encryption device, image decryption device and methods | |
JP4096803B2 (ja) | 画像処理装置、画像処理方法、画像処理プログラム及び記録媒体 | |
WO2010061456A1 (ja) | 情報処理装置、画像処理方法および画像処理用プログラム | |
WO2020116176A1 (ja) | 埋め込み装置、抽出装置及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780039742.3 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07736874 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008541986 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007736874 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020097009527 Country of ref document: KR |