WO2015093254A1 - 暗号通信向け画像圧縮伸長方法及び装置、プログラム、並びに記憶媒体 - Google Patents
暗号通信向け画像圧縮伸長方法及び装置、プログラム、並びに記憶媒体 Download PDFInfo
- Publication number
- WO2015093254A1 WO2015093254A1 PCT/JP2014/081480 JP2014081480W WO2015093254A1 WO 2015093254 A1 WO2015093254 A1 WO 2015093254A1 JP 2014081480 W JP2014081480 W JP 2014081480W WO 2015093254 A1 WO2015093254 A1 WO 2015093254A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- encryption key
- spectrum
- encrypted
- function
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/42—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation
- H04N19/423—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation characterised by memory arrangements
- H04N19/426—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation characterised by memory arrangements using memory downsizing methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/50—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding
- H04N19/59—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding involving spatial sub-sampling or interpolation, e.g. alteration of picture size or resolution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/90—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
- H04N19/91—Entropy coding, e.g. variable length coding [VLC] or arithmetic coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/435—Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream
- H04N21/4355—Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream involving reformatting operations of additional data, e.g. HTML pages on a television screen
- H04N21/4356—Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream involving reformatting operations of additional data, e.g. HTML pages on a television screen by altering the spatial resolution, e.g. to reformat additional data on a handheld device, attached to the STB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
Definitions
- the present invention encrypts a digital image using an encryption key image and transmits it after reversible compression for encryption communication, and from the encrypted image decompressed on the receiving side and the separately distributed encryption key image, Bayse probabilistic Image compression / decompression apparatus and method for encryption communication for restoring an image by performing iterative edge calculation according to the method, first and second programs for causing a computer to execute the image compression / decompression method for encryption communication, and image for encryption communication
- the third to fourth programs and the first to fourth programs that constitute the means constituting the compression / decompression apparatus and that are executed by the computer are individually encrypted and stored, and can be connected to and read from the computer. 4 relates to storage media.
- Patent Document 1 As one of the methods for encrypting and decrypting images, there is a technique invented by the present inventor and achieving patent registration (Patent Document 1) in Japan.
- a digital image is transmitted using a known transfer function in a frequency space, and a specific frequency is removed for encryption. Then, the Bayes probability theory is derived from the distribution of encrypted data and the transfer function used at the time of encryption. The digital image is restored by performing an iterative operation based on the equation.
- this method has a problem that the amount of image data in the frequency space is reduced, and there is no change in the transmission capacity itself, and the traffic load remains unchanged.
- Patent Document 2 image and video data is smoothed to reduce high-frequency information, and then coded and transmitted using JPEG or MPEG compression technology.
- the receiving side uses the same JPEG or MPEG decompression technology as the transmitting side. Decoding and then image restoration by the Richardson Lucy method or the like.
- the compression ratio is as high as 1/100 at the maximum, the image is divided into minute blocks and quantization is performed. Therefore, there is a concern that noise may be generated due to enhancement of the block boundary in some cases when restoring the image. there were. Further, the transmitted images are accumulated, and there is a problem that the real-time property is poor and it is not suitable for video processing.
- Patent Document 3 discloses a method of encrypting an image by degrading the image resolution by using the encryption method disclosed in Patent Document 1.
- Patent Document 3 using the encryption method of Patent Document 1, for example, after degrading the resolution of an image to such an extent that a car number plate cannot be read, it is transmitted to a receiving device via a LAN (Local Area Network) or the Internet.
- the image is restored by performing an iterative operation only from the information of one deteriorated image received by the apparatus for decrypting the encrypted data of Patent Document 1.
- the technique of Patent Document 3 is configured such that the transfer function at the time of encryption is not distributed every time as described in the same document, the problem of the restriction that the transfer function at the time of encryption must be known.
- an encryption facsimile as a method of compressing and encrypting an image and transmitting it.
- the method of Patent Document 4 reads an original as an image, blocks it, compresses it in block units, encrypts it using an encryption key, and arranges the image original after arranging a pattern for reading control. Is sent to a plaintext document that can be opened at the destination, etc., transmitted, the received document is corrected for tilt and misalignment, printed, and then re-read on the receiver, and then the encryption key is specified. Thus, the figure of the encrypted part is decrypted and further reproduced to print the reproduced document.
- the encryption unit is difficult to leak because it is a patterned and difficult image at the time of transmission, but it is vulnerable to changes in the image due to bit corruption during transmission, cannot be used for color image transmission, and data is packetized There is a problem that it is not suitable for Internet communication, a problem that it is not always a continuous transmission means, and a problem that it is necessary to print once and the operation is complicated.
- Patent registration number Japanese Patent No. 4575387 Patent publication number: JP2012-39181A Patent publication number: JP-A-2010-103867 Patent publication number: Japanese Patent Application Laid-Open No. 09-307772
- the digital image is encrypted, the high frequency region in the frequency space is reduced, then reversibly compressed, transmitted via the network (LAN and Internet), and decompressed on the receiving side.
- a state that can be said to be visually reversible in the digital image before transmission without the occurrence of artifacts, that is, obtaining a picture quality equivalent to the digital image before transmission, and a series of steps from encryption to decryption There was a problem that it could not be performed in almost real time.
- an object of the present invention is to provide an image compression / decompression method and apparatus for encryption communication, a program, and a storage medium for solving the above problems.
- the first invention according to the present invention for solving the above problem is an image compression / decompression method for encryption communication.
- This image compression / decompression method for encryption communication encrypts an encryption key image by convolving it with a digital image to reduce high frequency components in the frequency space of the digital image and make the image unreadable.
- the image is entropy-encoded (losslessly compressed) and sent to another computer on the network, and the other computer on the receiving side receives the encrypted image that has been losslessly compressed.
- the encrypted image is obtained by decompression by the reverse method of the compression, and then iterative calculation is performed based on the Bayse probabilistic restoration formula (Formula 3 described later) from the separately distributed encryption key image and the encrypted image.
- an image compression / decompression method for encryption communication that restores a digital image by performing a predetermined number of times.
- this method since the quantization process is not included in a series of processes, there is no generation of quantization noise and noise based on block boundaries, and the number of iterations is selected by selecting an encryption key image so that the encryption strength is weakened. Real-time performance is ensured because there is little, and the encryption key image is encrypted, losslessly compressed and distributed separately, so it can be restored and strong against leakage, and a different encryption key can be used each time, so the security strength is high. It is expensive, and can solve all the above conventional problems.
- a first invention according to the present invention is the same as that described in claim 1, and relates to an image compression / decompression method for encryption communication.
- This image compression / decompression method for encryption communication includes (S1) an image capturing step for capturing a digital image, (S2) a step of preparing a grayscale encryption key image having a desired encryption strength, and (S3) an encryption key for the digital image.
- a second invention according to the present invention is the same as that described in claim 2, and relates to an encryption step constituting the image compression / decompression method for encrypted communication according to the first invention.
- This encryption step includes (S10) a first correction step of correcting the encryption key image so as to match the image size of the encryption key image with the digital image to form a first corrected encryption key image, and (S11) first correction.
- a step of Fourier transforming the encryption key image to form a first corrected encryption key image spectrum (S12) after the digital image is subjected to degamma correction, RI as a red primary image, GI as a green primary image, and BI as a blue primary image (S13) Fourier transform of RI, GI and BI, respectively, to form an RI spectrum, GI spectrum and BI spectrum; (S14) integrating the RI spectrum and the first corrected encryption key image spectrum; A step of forming the obtained product with an RIE spectrum, and (S15) a product obtained by integrating the GI spectrum and the first corrected encryption key image spectrum with the GIE spectrum.
- a third invention according to the present invention is the same as that described in claim 3, and relates to a digital image restoration process constituting the image compression / decompression method for encrypted communication according to the first invention.
- This digital image restoration step includes (S20) a second correction step of correcting the encryption key image so as to match the image size of the encryption key image with the received encrypted image to form a second corrected encryption key image, (S21) Dividing the received encrypted image into a red primary color image, a green primary color image, and a blue primary color image; (S22) forming a second corrected encryption key image with an H image and further forming a red primary color image with a Y image; A step of restoring the F image by using an image restoration calculation step of restoring the F image from the image and the Y image, and forming this as a red primary color digital image; and (S23) forming the green primary color image as a Y image, and further image restoration calculation.
- the process of making digital images (S25) Akahara Digital image, characterized in that comprises a step of synthesizing a maximum likelihood digital image from the green primary color digital image and blue primaries digital image, a certain.
- a fourth invention according to the present invention is the same as that described in claim 4, and relates to an image restoration calculation step S48 constituting a digital image restoration step according to the third invention.
- the image restoration calculation step S48 includes (S30) a step of Fourier transforming the H image to obtain an H image spectrum, (S31) a step of setting the maximum number of iterations, and (S32) a counter for counting the number of iterations.
- a step of resetting by setting to 0, (S33) a step of de-gamma correcting the Y image to form this as a Y image, and further forming the Y image as an F image initial value, and (S34) Fourier transforming the F image initial value.
- step S47 Jumping to step S47, and (S47) F image And a step of outputting further the F image forms the F image with gamma correction, is characterized in that comprises a.
- a fifth invention according to the present invention is the same as that described in claim 5, and relates to a second aspect of the image restoration calculation step according to the fourth invention.
- the second aspect of the image restoration calculation process by using a point-symmetric image as the encryption key image, the processes of S39 to S40 are deleted, and the process of S41 is changed to the spectrum of the third function (S41C). It is characterized in that it is amended as a step of integrating the H image spectrum and forming this product as a fifth function.
- a sixth invention according to the present invention is the same as that described in claim 6, and relates to a first correction step constituting an encryption step according to the second invention.
- the first correction step includes (S50) a step of matching the pixel size of the encryption key image with the pixel size of the digital image, and (S51) a first correction encryption key image having the image size of the digital image and no data. And (S52) comparing the image size of the encryption key image with the image size of the digital image, and if both are the same, jump to (S53) and the image size of the encryption key image is the image size of the digital image.
- a step of transferring (S56) a step of transferring the pixels in the transferred region to the non-transfer region using the boundary between the transferred region and the non-transfer region of the first corrected encryption key image as a mirror inversion axis, and then ending (S57) And a step of reducing the encryption key image so as to match the image size of the digital image, transferring the image to the first corrected encryption key image, and then ending.
- a seventh invention according to the present invention is the same as that described in claim 7, and relates to a second correction step constituting a digital image restoration step according to the third invention.
- the second correction step includes (S60) a step of matching the pixel size of the encryption key image with the pixel size of the reception encrypted image, and (S61) a second correction having the image size of the reception encryption image and no data.
- the eighth invention according to the present invention is the same as that described in claim 8.
- the ninth invention according to the present invention is the same as that described in claim 9.
- the tenth invention according to the present invention is the same as that described in claim 10, stores the first program according to the eighth invention in an encrypted state, is connectable to a computer, and is read by the computer. This is a possible first storage medium.
- An eleventh invention according to the present invention is the same as that described in claim 11, stores the second program according to the ninth invention in an encrypted state, is connectable to a computer, and is read by the computer. This is a possible second storage medium.
- the twelfth invention according to the present invention is the same as that described in claim 12, and the encryption is performed according to the first aspect of the image compression / decompression method for encrypted communication or the second aspect of the image compression / decompression method for encrypted communication.
- the key image is convolved with the digital image to reduce the high-frequency component in the frequency space of the digital image and make the image unreadable, and this encrypted image is entropy-coded (losslessly compressed).
- Send it to other computers on the network receive the reversibly compressed encrypted image at the other computer on the receiving side, and decompress this reversibly compressed encrypted image using the reverse method of the original compression.
- the image compression / decompression device for encryption communication includes (W1) an image capturing unit that captures a digital image, (W2) a unit that prepares a grayscale encryption key image having a desired encryption strength, and (W3) an encryption key for the digital image. (W4) Encrypting the encrypted image by entropy coding to reduce the high-frequency component of the digital image by convolving the image, reducing the resolution, and obtaining the encrypted encrypted image; (W5) means for transmitting the encrypted image code to another computer on the network; (W6) means for the computer to receive the encrypted image code; and (W7) entropy coding in the computer.
- a thirteenth aspect of the present invention is the same as that described in the thirteenth aspect, and relates to an encryption means constituting the image compression / decompression apparatus for encrypted communication according to the twelfth aspect.
- the encryption means includes (W10) first correction means for correcting the encryption key image so that the image size of the encryption key image matches the digital image to form a third correction encryption key image, and (W11) third correction.
- Means for Fourier transforming the cryptographic key image to form a third corrected cryptographic key image spectrum (W12) after the digital image is subjected to degamma correction, RI as a red primary image, GI as a green primary image, and BI as a blue primary image (W13) means for Fourier transforming RI, GI, and BI, respectively, to form an RI spectrum, GI spectrum, and BI spectrum; (W14) integrating the RI spectrum and the third corrected encryption key image spectrum; Means for making the obtained product an RIE spectrum, and (W15) the product obtained by integrating the GI spectrum and the third corrected encryption key image spectrum is the GIE spectrum.
- (W16) means for integrating the product obtained by integrating the BI spectrum and the third corrected encryption key image spectrum with the BIE spectrum, and (W17) inverse Fourier transform of the RIE spectrum, the GIE spectrum, and the BIE spectrum, respectively.
- RE which is an encrypted red primary image with a reduced high frequency region
- GE which is an encrypted green primary image with a reduced high frequency region
- an encrypted blue primary image with a reduced high frequency region is characterized in that it comprises means for forming a certain BE and (W18) means for synthesizing one color image from RE, GE and BE and forming this color image as an encrypted image after gamma correction.
- the fourteenth invention according to the present invention is the same as that described in claim 14, and relates to a digital image restoring means constituting the image compression / decompression apparatus for encryption communication according to the twelfth invention.
- the digital image restoration means comprises: (W20) second correction means for correcting the encryption key image so as to match the image size of the encryption key image with the received encrypted image to form a fourth corrected encryption key image; (W21) Means for dividing the received encrypted image into a red primary color image, a green primary color image, and a blue primary color image; and (W22) a fourth corrected encryption key image is formed as an H image, and a red primary color image is formed as a Y image.
- Means to make digital images (W25) Akahara Digital image, characterized in that comprises means for combining the maximum likelihood digital image from the green primary color digital image and blue primaries digital image, a certain.
- the fifteenth invention according to the present invention is the same as that described in claim 15, and relates to an image restoration calculation means constituting the digital image restoration means according to the fourteenth invention.
- the image restoration calculation means includes (W30) means for Fourier transform of the H image to obtain an H image spectrum, (W31) means for setting the maximum number of iterations, and (W32) a counter for counting the number of iterations. Means for setting and resetting, (W33) means for degamma correction of the Y image and forming it as a Y image, and further making the Y image as an F image initial value, and (W34) performing a Fourier transform on the F image initial value.
- Means for obtaining an F image initial value spectrum means for integrating the F image initial value spectrum with the H image spectrum and forming this product as a seventh function; and (W36) inverting the seventh function and (W37) means for adding the Y image to the eighth function and making this product the ninth function, and (W38) spectrum of the ninth function by Fourier transform of the ninth function.
- (W40) means for Fourier transforming the tenth function to obtain a spectrum of the tenth function; Means for integrating the spectrum of the tenth function into the spectrum and making this product the eleventh function;
- (W42) means for inverse Fourier transforming the eleventh function to obtain the twelfth function; and
- W43 twelfth.
- (W45) means for adding 1 to the counter; and (W46). The hypothesis that the counter value exceeds the maximum number of iterations is verified.
- Means for jumping to the process of W47; 7) means for the F image with gamma correction and outputs the addition the F image forms the F image, is characterized by comprising a.
- the sixteenth invention according to the present invention is the same as that described in claim 16, and relates to the second aspect of the image restoration calculating means according to the fifteenth invention.
- the means W39 to W40 are deleted, and the means W41 is changed to the spectrum of the ninth function (W41C).
- the feature is that the H image spectrum is integrated and this product is changed to the eleventh function.
- the seventeenth invention according to the present invention is the same as that described in claim 17, and relates to the first correcting means constituting the encrypting means according to the thirteenth invention.
- the first correction means includes (W50) means for matching the pixel size of the encryption key image with the pixel size of the digital image, and (W51) a third correction encryption key image having the image size of the digital image and no data.
- (W52) Compare the image size of the encryption key image with the image size of the digital image. If both are the same, jump to (W53) and the image size of the encryption key image is the image size of the digital image.
- (W54) Means for moving the encryption key image so that the coordinates of the center pixel of the encryption key image coincide with the coordinates of the center pixel of the third correction encryption key image; and (W55) converting the encryption key image to the third correction encryption key image.
- Means for transferring; (W56) means for transferring the pixels in the transferred area to the non-transfer area using the boundary between the transferred area and non-transfer area of the third corrected encryption key image as a mirror inversion axis; and (W57) digital.
- a means for reducing the encryption key image so as to match the image size of the image, transferring the image to the third corrected encryption key image, and then ending.
- the eighteenth invention according to the present invention is the same as that described in claim 18, and relates to a second correcting means constituting the image restoration calculating means according to the fourteenth invention.
- the second correction means includes (W60) means for matching the pixel size of the encryption key image with the pixel size of the reception encrypted image, and (W61) fourth correction that is the image size of the reception encryption image and has no data.
- Means for preparing an encryption key image (W62) comparing the image size of the encryption key image with the image size of the received encrypted image; if both are the same, jump to (W63) and image size of the encryption key image Is smaller than the image size of the received encrypted image, jumps to (W64), otherwise jumps to (W67), and (W63) transfers the encryption key image to the fourth corrected encryption key image and then Means for ending, (W64) means for moving the encryption key image so that the coordinates of the center pixel of the encryption key image coincide with the coordinates of the center pixel of the fourth corrected encryption key image, and (W65) 4 correction darkness Means for transferring to the key image; and (W66) means for ending after transferring the pixels in the transferred area to the non-transfer area with the boundary between the transferred area and the non-transfer area of the fourth corrected encryption key image as a mirror inversion axis; W67) a means for reducing the encryption key image so as to match the image size of the received encrypted image and terminating it after
- the twentieth invention according to the present invention is described in claim 20.
- a twenty-first invention according to the present invention is the same as that described in claim 21, stores the third program according to the nineteenth invention in an encrypted state, is connectable to a computer, and is read by the computer. This is a possible third storage medium.
- the fourth program according to the twentieth aspect of the present invention is the same as that described in the twenty-second aspect.
- the fourth program according to the twentieth aspect is stored in an encrypted state and can be connected to a computer and read by the computer. This is a possible fourth storage medium.
- the quantization process since the quantization process is not included in a series of processes, there is no generation of quantization noise and noise based on block boundaries, an effect that the encryption strength can be changed by selecting an encryption key image, Realization of real-time performance based on the encryption strength dependency of the number of iterations and labor-saving effect, improvement of recoverability by encrypting and reversibly compressing the encryption key image, and different encryption keys each time Security enhancement effect due to use of the image, improvement in leakage resistance due to transmission of encrypted images after lossless compression, an effect that a compression ratio of about 70% of the lossy compression level can be obtained, and compression is possible regardless of characters and images The effect of wide is at least partially realized.
- the flowchart which shows an example of the process sequence in the image compression / decompression method for encryption communication by 1st invention by this invention The flowchart which shows an example of the process sequence in the encryption process which is 2nd invention by this invention
- the flowchart which shows an example regarding the process sequence of the digital image restoration process which is 3rd invention by this invention The flowchart which shows an example regarding the process sequence of the image restoration calculation process which is 4th invention by this invention
- extension apparatus for encryption communication which is 12th invention by this invention The figure which shows an example regarding the structure of the encryption means which is 13th invention by this invention.
- amendment means which is 17th invention by this invention The figure which shows the mode of the correction
- the figure which shows an example regarding the structure of the 3rd program and 4th program by this invention The figure which shows an example regarding the structure of the encryption image communication system of Example 1 by this invention.
- the figure which shows an example of the operation window by this invention The figure which shows an example regarding the structure of the improved encryption image communication system by this invention
- the figure which shows an example of the encryption communication by the improved encryption image communication system by Example 2 by this invention The figure which shows an example regarding the structure of the encryption communication monitoring camera system of Example 3 by this invention.
- a digital image, an encryption key image, an encrypted image, and a received encrypted image are configured by laying square pixels of the same size without borders, and each pixel is a red primary color having a depth of 8 bits.
- R red primary color having a depth of 8 bits.
- G green primary color
- B blue primary color
- RGB has the same number of bits, it is a gray scale pixel.
- the encryption key image consists only of gray scale pixels.
- the digital image, the encryption key image, the encrypted image, and the received encrypted image have the pixel at the upper left corner as the origin, and the row where the origin exists is changed to the row of pixels that face in the horizontal direction without changing the row.
- the parallel axis be the x-axis
- the column where the origin exists be the y-axis the axis parallel to the column of pixels facing the vertical direction without changing the column. All pixels in the digital image, the encryption key image, the encrypted image, and the received encrypted image can be designated by a two-dimensional coordinate (x, y).
- the digital image, the encryption key image, the encrypted image, and the received encrypted image have the same image size and the same coordinates.
- the digital image, the encryption key image, and the received encrypted image are uncompressed and are BMP (BitMaP) or DIB (Device Independent Bitmap) images.
- FIG. 1 is a flowchart illustrating an example of a processing procedure in the image compression / decompression method for encryption communication according to the first aspect of the present invention.
- the image compression / decompression method for encryption communication in FIG. 1 includes (S1) an image capturing step for capturing a digital image 1, (S2) a step of preparing a grayscale encryption key image 2 having a desired encryption strength, and (S3) a digital An encryption step of convolution of the encryption key image 2 with the image 1 to reduce the high-frequency component of the digital image 1 and reduce the resolution and to encrypt the encrypted image 3; (S4) Entropy-encoding and converting to encrypted image code 4; (S5) transmitting encrypted image code 4 to another computer 5 on network 7; and (S6) computer 5 encrypting image code 4 (S7) In the computer 5, the encrypted image code 4 is decrypted by the method used for entropy encoding, and the received encrypted image is received.
- steps S1 to S5 are on the transmitting side, and steps S6 to S9 are on the receiving side.
- the network 7 may be any of a LAN (Local Area Network), the Internet, and a dedicated line, and the encrypted image code 4 is transmitted by a method according to the protocol of the network 7.
- Huffman codes used in JPEG are used for images as entropy codes, and MPEG2 and H.264 are used for images.
- a variable length code which is an improved code of the arithmetic code and Huffman code used in H.264 is used.
- the pixel size and image size of the encryption key image 2 must be the same as those of the digital image 1, but the encryption key image 2 is always a gray scale image. Therefore, in the present invention, one image is prepared by selecting one from a plurality of encryption key images prepared in advance, and the image size is fitted to the digital image 1 in the encryption process.
- FIG. 2 shows an example of a processing procedure in the encryption step S3 according to the second invention of the present invention as a flowchart.
- the encryption step S3 of FIG. 2 includes (S10) a first correction step in which the encryption key image 2 is corrected to be the first corrected encryption key image 8 by making the image size of the encryption key image 2 coincide with the digital image 1.
- (S11) Fourier transform of the first corrected encryption key image 8 to form the first corrected encryption key image spectrum 9;
- S12 RI and green primary color images which are red primary images after the digital image 1 is subjected to degamma correction.
- (S13) RI, GI, and BI are respectively Fourier transformed to form RI spectrum RIS, GI spectrum GIS, and BI spectrum BIS, and (S14) RI.
- the RIE spectrum RIES, the GIE spectrum GIES, and the BIE spectrum BIES are each subjected to inverse Fourier transform to reduce the high frequency region, and the encrypted red primary color image RE, the high frequency region is reduced and encrypted.
- the digital image 1 and the encryption key image 2 are Fourier-transformed according to the following mathematical formulas (1) and (2), and the result is the result of convolution by taking the product of both in the frequency space.
- D which is the encrypted image 3 is obtained by performing inverse Fourier transform on C.
- Equations 1 and 2 A is the digital image 1
- B is the encryption key image 2
- C is the convolution result
- D is the encrypted image 3
- DFT () is the discrete Fourier transform
- IDFT () is Discrete inverse Fourier transform is meant respectively.
- the image has a finite size, a discrete Fourier transform and a discrete inverse Fourier transform are used.
- Encrypting is performed by reducing the high frequency region of the digital image 1 by compressing the encryption process S3, compressing the information itself, and making it difficult for humans to discern it. Even after the encryption step S3, since the image size and the pixel size remain the same, there is no change in the data amount itself when the digital image 1 is viewed as BMP or DIB, but entropy coding (lossless compression) is performed thereafter. This completes the encryption and compression.
- the data amount of the digital image 1 at the time of completion of the encryption compression depends on the encryption key image 2, but is approximately 30%, which is almost the same as the compression rate by the JPEG method.
- FIG. 3 illustrates a state in which the encrypted image 3 is created from an example of the digital image 1 and an example of the encryption key image 2.
- FIG. 3 shows an example of the digital image 1, an example of the encryption key image 2, and the encrypted image 3 on the right from the left.
- the characters and images in the digital image 1 are clear, but the encrypted image 3 generated in the encryption step S3 is unclear in both characters and images. It is a suitable state.
- the encryption in the present invention means that the image is very unclear as in this example.
- the encryption strength of the encryption key image 2 varies depending on the design of the image. For example, in the case of a design in which the background is black (0 bits in luminance 8 bits), a disk centered on the center of the encryption key image 2 and the center is white (8 bits in luminance 8 bits) and gradually becomes black as it goes to the periphery The larger the disc radius, the stronger the encryption strength.
- the encryption key image 2 may be any design as long as it is arranged in the center of the image and has no bias, and need not be particular about the point target. For example, a company logo, character string, Characters, diamonds, spades, hearts, rings, circles, diamonds, polygons having three or more vertices, and the like can be used. The filling of these figures may have a gradation.
- FIG. 4 is a flowchart illustrating an example of the processing procedure of the digital image restoration step S9 according to the third aspect of the present invention.
- (S20) a second correction that is made as the second corrected encryption key image 11 by correcting the encryption key image 2 so that the image size of the encryption key image 2 matches the received encrypted image 6.
- Image 14 is formed with Y image 16
- the image restoration calculation step S48 is used to restore the F image 17 and make it the blue primary color digital image 20, and (S25) the maximum likelihood from the red primary color digital image 18, the green primary color digital image 19 and the blue primary color digital image 20.
- a step of synthesizing the digital image 21 is used to restore the F image 17 and make it the blue primary color digital image 20, and (S25) the maximum likelihood from the red primary color digital image 18, the green primary color digital image 19 and the blue primary color digital image 20.
- the red primary color image 12, the green primary color image 13, the blue primary color image 14, and the maximum likelihood digital image 21 have the same pixel size and image size as the received encrypted image 6.
- FIG. 5 is a flowchart illustrating an example of the processing procedure of the image restoration calculation step S48 according to the fourth aspect of the present invention.
- the image restoration calculation step S48 of FIG. 5 includes (S30) a step of Fourier transforming the H image 15 to obtain the H image spectrum 22, (S31) a step of setting the maximum number of iterations 23, and (S32) the number of iterations. (S33) a step of resetting the Y image 16 by de-gamma correction, forming the Y image 16 with the Y image 16, and further forming the Y image 16 with the F image initial value 24 (S34).
- Equation 3 is a rewrite of Formula 15 described in Patent Registration No. 4568730 invented and registered by the present inventor for the present invention.
- F () is the discrete Fourier transform
- F -1 () is a discrete inverse Fourier transform
- F is the F image
- subscript k of F is F images early in the k + 1 th iteration calculation
- the subscript of F is k + 1, the F image in the k + 1 iteration, and the F image initial value in the k + 2 iteration
- Y is the Y image
- H is the H image
- H is the suffix #.
- K is an integer of 0 or more.
- the initial value of the F image may be any.
- the Y image is used as the initial value of the F image.
- FIG. 6 is a flowchart illustrating an example of a processing procedure in the second mode S49 of the image restoration calculation step S48 according to the fifth aspect of the present invention.
- the steps S39 to S40 are deleted by using a point-symmetric image for the encryption key image 2 in the image restoration calculation step S48 according to the fourth invention.
- the step S41 is characterized in that (S41C) the H image spectrum 22 is added to the spectrum 26 of the third function and this product is formed as the fifth function F5. This is because the H image 15 is the encryption key image 2, and if the encryption key image 2 is point symmetric, the inversion function of the H image 15 is the H image 15, so the steps S39 to S40 are unnecessary.
- the H image spectrum 22 is directly added to the spectrum 26 of the fourth function to obtain the fifth function F5, which is the product, in S39 of the image restoration calculation step S48. This is because the process of S41 can be replaced.
- FIG. 7 is a flowchart illustrating an example of a processing procedure in the first correction step S10 according to the sixth aspect of the present invention.
- the first correction step S10 in FIG. 7 includes (S50) a step of matching the pixel size of the encryption key image 2 with the pixel size of the digital image 1, and (S51) a first image size of the digital image 1 and no data.
- the step of preparing the corrected encryption key image 8 (S52) The image size of the encryption key image 2 is compared with the image size of the digital image 1, and if they are the same, the process jumps to (S53) and the encryption key image If the image size of 2 is smaller than the image size of the digital image 1, the process jumps to (S54); otherwise, the process jumps to (S57); and (S53) the encryption key image 2 is changed to the first corrected encryption key image.
- FIG. 8 is a flowchart illustrating an example of a processing procedure in the second correction step S20 according to the seventh aspect of the present invention.
- the second correction step S20 of FIG. 8 includes (S60) a step of matching the pixel size of the encryption key image 2 with the pixel size of the reception encrypted image 6, and (S61) the image size of the reception encryption image 6 and what The step of preparing the second corrected encryption key image 11 having no data, (S62) The image size of the encryption key image 2 is compared with the image size of the reception encryption image 6, and if both are the same, proceed to (S63).
- the first program 34 as an example of the present invention includes an encryption step S3 according to the second invention, a digital image restoration step S9 according to the third invention, an image restoration calculation step S48 according to the fourth invention,
- the first correction step S10 according to the invention and the second correction step S20 according to the seventh invention are used to execute all the steps in the first aspect of the image compression / decompression method for encryption communication according to the first invention. is there.
- the second program 35 as an example of the present invention includes an encryption step S3 according to the second invention, a digital image restoration step S9 according to the third invention, and a second aspect S49 of the image restoration calculation step according to the fifth invention. And all the steps in the second aspect of the image compression / decompression method for encryption communication according to the first invention, including the first correction step S10 according to the sixth invention and the second correction step S20 according to the seventh invention. It is for making it happen.
- the first program and the second program are described in Visual C ++ language, but some of them described in XML and JAVA (registered trademark) may be used. C, C +, HTTP, XML, JAVA (Registered trademark) may be described in combination.
- a first storage medium stores the first program according to the eighth aspect in an encrypted state, can be connected to a computer, and can be read by the computer.
- the encryption / decryption circuit may be built in, or the computer connected may perform encryption / decryption and simply record the encrypted data.
- a device incorporating an encryption / decryption circuit can use a USB flash memory, an SD memory card, or the like, and uses a USB flash memory as the first storage medium. There are a USB flash memory, an SD memory card, a CD (Compact Disk), and a DVD (Digital Versatile Disk) which can be used to record encrypted data, and any of them may be used.
- the second storage medium according to the eleventh aspect of the present invention stores the second program according to the ninth aspect in an encrypted state, can be connected to a computer, and can be read by the computer.
- the same storage medium is used.
- the second storage medium can be the same as the first storage medium, but may be selected from an SD memory card, CD, DVD, or the like.
- FIG. 9 shows an example of the configuration of the image compression / decompression apparatus 28 for encryption communication according to the twelfth aspect of the present invention.
- the image compression / decompression apparatus 28 for encryption communication in FIG. 9 includes (W1) an image capturing unit that captures the digital image 1, (W2) a unit that prepares a grayscale encryption key image 2 having a desired encryption strength, and (W3) (W4) Encrypted image 3 that convolves the digital key 1 with the encryption key image 2 to reduce the high-frequency component of the digital image 1, reduce the resolution, and obtain the encrypted encrypted image 3.
- Is entropy-encoded and converted into an encrypted image code 4 (W5) a means for transmitting the encrypted image code 4 to another computer 5 on the network 7, and (W6) the computer 5 is an encrypted image code. 4 and (W7) the encrypted image code by the decoding method corresponding to the encoding used in the entropy encoding in the computer 5 (W8) means for decrypting and preparing the encryption key image 2 used in the encryption means that has been encrypted and distributed separately, and (W9) the encryption key image. 2 and digital image restoration means for restoring the most likely digital image 21 most likely to the received encrypted image 6 from the received encrypted image 6.
- the encryption key image 2 used by the encryption means W3 is separately encrypted (shown by a dotted box in the figure) and distributed in advance to a computer such as the computer 5 on the network 7 such as the Internet or a LAN.
- This encryption method may be a common key method, a private key method, or a built-in ZIP file.
- the encryption key image 2 may be exchanged periodically as a library.
- FIG. 10 shows an example of the configuration of the encryption means W3 according to the thirteenth aspect of the present invention.
- the encryption unit W3 in FIG. 10 includes (W10) first correction unit that corrects the encryption key image 2 so that the image size of the encryption key image 2 matches the digital image 1 and forms the third correction encryption key image 29.
- (W11) means for Fourier transforming the third corrected encryption key image 29 to form a third corrected encryption key image spectrum 30, and
- (W13) means for dividing the RI, GI, and BI into Fourier transforms to form RI spectrum RIS, GI spectrum GIS, and BI spectrum BIS, and (W14) RI.
- RIE spectrum RIES, GIE spectrum GIES, and BIE spectrum BIES are each inverse Fourier transformed to reduce the high frequency region, and is an encrypted red primary color image RE, high frequency region (W18) one color image 10 from the RE, GE, and BE, and a means for forming a GE that is a green primary color image that has been reduced and BE and a BE that is an encrypted blue primary image in which the high frequency region has been reduced. And a means for forming the encrypted image 3 after the color image 10 is gamma-corrected. .
- FIG. 11 shows an example of the configuration of the digital image restoration means W9 according to the fourteenth aspect of the present invention.
- the digital image restoration means W9 of FIG. 11 (W20) corrects the encryption key image 2 so that the image size of the encryption key image 2 matches the received encrypted image 6, and forms a second corrected encryption key image 31.
- (W23) means for forming the green primary color image 13 with the Y image 16, further restoring the F image 17 by using the image restoration calculation means W48, and forming it as the green primary color digital image 19, and (W24) blue
- the primary color image 14 is changed to the Y image 1
- FIG. 12 shows an example of the configuration of the image restoration calculation means W48 according to the fifteenth aspect of the present invention.
- the image restoration calculation means W48 of FIG. 12 includes (W30) means for Fourier transforming the H image 15 to obtain the H image spectrum 22, (W31) means for setting the maximum number of iterations 23, and (W32) number of iterations.
- Means for setting the counter for counting to 0 and resetting (W33) means for de-gamma correcting the Y image 16 to form it as the Y image 16, and further forming the Y image 16 as the F image initial value 24, (W34) ) Means for Fourier transforming the F image initial value 24 to obtain the F image initial value spectrum 25; and (W35) means for integrating the F image initial value spectrum 25 into the H image spectrum 22 and forming this product as a seventh function F7.
- W36 means for inverting the seventh function F7 to form an eighth function F8, and
- ( 38) means for obtaining a spectrum 32 of the ninth function by Fourier transforming the ninth function F9;
- (W39) means for obtaining an inversion function of the H image 15 and forming it as the tenth function F10;
- (W40) Means for Fourier transform of the tenth function F10 to obtain the spectrum 33 of the tenth function;
- (W41) the spectrum 33 of the tenth function is added to the spectrum 32 of the ninth function, and this product is multiplied by the eleventh function.
- (W42) means for performing inverse Fourier transform on the eleventh function F11 to obtain the twelfth function F12; and
- (W43) integrating the F image initial value 24 to the twelfth function F12 and multiplying this product by Means for forming the F image 17;
- (W44) means for forming the F image 17 with the F image initial value 24;
- (W45) means for adding 1 to the counter; and
- the counter value n is the maximum number of iterations 23.
- FIG. 13 illustrates an example of the configuration of the second aspect W49 of the image restoration calculation means according to the sixteenth aspect of the present invention.
- the second aspect W49 of the image restoration calculation means of FIG. 13 uses the encryption key image 2 that is point-symmetric, thereby eliminating the means W39 to W40 and replacing the means W41 with (W41C)
- the feature is that the function image 32 is integrated with the spectrum 32 of the function and this product is changed to the eleventh function F11.
- FIG. 14 shows an example of the configuration of the first correction means W10 according to the seventeenth aspect of the present invention.
- the first correction means W10 in FIG. 14 includes (W50) means for matching the pixel size of the encryption key image 2 with the pixel size of the digital image 1, and (W51) the first image size of the digital image 1 and no data.
- (W55) means for transferring the encryption key image 2 to the third corrected encryption key image 29, and (W56) the transfer area of the third correction encryption key image 29 with the boundary between the transferred area and the non-transfer area as the mirror inversion axis.
- Means for transferring the pixels to the non-transfer area and ending, and (W57) means for reducing the encryption key image 2 so as to match the image size of the digital image 1 and transferring it to the third corrected encryption key image 29 and then ending And is characterized by having.
- FIG. 15 illustrates a state of correction performed by the means W56 of the first correction means W10 of FIG.
- the left figure of FIG. 15 shows the situation at the end of the means W55, and the right figure shows the operation at the means W56 and the situation at the completion of the operation.
- the third corrected encryption key image 29 at the end of the means W55 has a transferred area and a non-transferred area.
- the means W56 performs a mirror inversion operation with the boundary between the transferred area and the non-transfer area as the mirror inversion axis as shown in the right figure of FIG.
- the right diagram of FIG. 15 is also a diagram when the operation in the means W56 is completed, and shows that a mirror symmetry axis is generated on the divided transfer boundary during the mirror reversal operation.
- FIG. 16 shows an example of the configuration of the second correction means W20 according to the eighteenth aspect of the present invention.
- the second correction means W20 in FIG. 16 includes (W60) means for matching the pixel size of the encryption key image 2 with the pixel size of the reception encrypted image 6, and (W61) the pixel size of the reception encryption image 6 and what The means for preparing the fourth corrected encryption key image 31 having no data; (W62) The image size of the encryption key image 2 is compared with the image size of the reception encryption image 6, and if both are the same, go to (W63) Jump to (W64) if the image size of the encryption key image 2 is smaller than the image size of the received encrypted image 6, otherwise (W63) the encryption key image; (W64) an encryption key so that the coordinates of the center pixel of the encryption key image 2 coincide with the coordinates of the center pixel of the fourth correction encryption key image 31.
- the correction performed by the means W66 of the second correction means W20 in FIG. 16 is the same as the correction performed by the means W56 of the first correction means W10, and follows the method of FIG.
- the third program 36 which is an example of the present invention, includes an encryption means W3 according to the thirteenth invention, a digital image restoration means W9 according to the fourteenth invention, an image restoration calculation means W48 according to the fifteenth invention, All the means in the first mode of the image compression / decompression apparatus 28 for encryption communication according to the twelfth invention having the first correction means W20 according to the invention and the second correction means W20 according to the eighteenth invention constitute and all of these. This is to execute all the means.
- the fourth program 37 which is an example of the present invention, includes an encryption means W3 according to the thirteenth invention, a digital image restoration means W9 according to the fourteenth invention, and a second aspect W49 of the image restoration calculation means according to the sixteenth invention. And all the means in the second aspect of the image compression / decompression apparatus 28 for encryption communication according to the twelfth invention, comprising the first correction means W10 according to the seventeenth invention and the second correction means W20 according to the eighteenth invention. To configure and to execute all these means.
- the third program and the fourth program are described in Visual C ++ language, but some of them described in XML and JAVA (registered trademark) may be used. C, C +, HTTP, XML, JAVA (Registered trademark) may be described in combination.
- a third storage medium stores the third program according to the nineteenth aspect in an encrypted state, can be connected to a computer, and can be read by the computer.
- the same storage medium is used.
- a fourth storage medium according to a twenty-second invention of the present invention stores the fourth program according to the twentieth invention in an encrypted state, is connectable to a computer, and is readable by the computer.
- the same storage medium is used.
- the third to fourth storage media may be selected from an SD memory card, CD, DVD, etc. in addition to a USB flash memory.
- FIG. 17 illustrates an example of the configuration of the third program 36 and the fourth program 37.
- Each of the third program 36 and the fourth program 37 is further composed of one dedicated subprogram and two common subprograms.
- the dedicated subprogram is an apparatus subprogram that configures all of the means in accordance with the mode of the image compression / decompression apparatus 28 for encryption communication and describes the execution procedure thereof.
- the third program 36 includes an apparatus subprogram 38. Yes, the fourth program 37 is a device subprogram 39.
- the common subprogram creates an operation window 54 for performing operations related to the image compression / decompression apparatus 28 for encryption communication and displays all the programs in the operation window 54 and the operation window creation subprogram 40 common to all programs displayed on the computer monitor.
- the operation window monitoring subprogram 41 is common to all programs.
- the first embodiment is an encrypted image communication system 45 capable of performing encrypted image communication by configuring the image compression / decompression apparatus 28 for encrypted communication according to the present invention in the computer 42 and the computer 44 on the Internet 43 by the third program 36.
- the second aspect of the encryption / compression image compression / decompression apparatus 28 in which a part of the configuration means constituted by the fourth program 37 is different is the first aspect of the encryption / compression communication image compression / decompression apparatus 28 constituted by the third program 36.
- the first mode of the image compression / decompression device 28 for encryption communication configured by the third program 36 is selected as the first embodiment as a representative of the image compression / decompression device 28 for encryption communication.
- FIG. 18 illustrates an example of the configuration of the encrypted image communication system 45 according to the first embodiment of the present invention.
- the encrypted image communication system 45 in FIG. 18 is a first aspect of the image compression / decompression device 28 for encrypted communication by executing the digital image 1, the encryption key image 2, the maximum likelihood digital image 21, and the third program 36 in advance after installation.
- Computer 42 (corresponding to the transmitting side in FIG. 9) and receiving apparatus 47 (corresponding to the receiving side in FIG. 9), and image compression for encryption communication by executing the third program 36 in advance after installation
- the transmission device 48 (corresponding to the transmission side in FIG. 9) and the reception device 49 (corresponding to the reception side in FIG. 9) of the image compression / decompression device 73 for encryption communication having the same configuration as the first mode of the expansion device 28 are configured.
- the computer 44 on the Internet 43 and the encryption key image 2 are encrypted and reversibly compressed using the encryption function of the Zip file 51 using the password 50 as a verification key.
- Zip file 51 is distributed in a form that is attached to Le, the digital image 52 to be used for transmission from the computer 44, and a maximum likelihood digital image 53 corresponding to the digital image 52.
- the computers 42 and 44 have the same configuration, a 64-bit instruction set 32-bit 6-core / chip CPU (Central Processing Unit), a GPU (Graphic Processing Unit), a memory of 32 GB or more, an HDD having a storage capacity of 1 terabyte or more, SDD (Solidstate Disk Drive) having a storage capacity of 128 GB or more, three or more USB terminals, one or more LAN terminals, wireless communication modules such as WiFi (Wireless Fidelity) and Bluetooth (registered trademark), telephone terminals, and keyboards 53, mouse 54, FHD (Full High Definition) display, Microsoft Windows (registered trader) ) 8 O / S, Microsoft Visual Studio 2010 (registered trademark) (including Visual C ++ 2010), Microsoft Office 2013 (registered trademark), WiFi, Bluetooth (registered trademark), LAN, USB and Internet It is possible to communicate with other computers via the network.
- Computers 42 and 44 are selected from many types of desktop computers mass-produced and distributed in the market, and may be workstations as long
- FIG. 19 shows an example of the operation window 54 according to the present invention.
- 19 is an image window 55 for displaying the digital image 1, the encryption key image 2, the maximum likelihood digital image 21, etc. in a tiled or overlaid or thumbnailed form, and the encryption key image 2 in use is displayed in the thumbnail.
- the encryption key image thumbnail display window 56 for displaying the file name overlapping the lower part of the thumbnail in the state, the digital image 1 directly from the scanner under the predetermined conditions (the condition in which the scanner properties are opened and set by right-clicking the button) ),
- a digital image reading button 58 for reading the digital image 1 from the file system of the computer 42 or 44, and an encryption key image for reading the encryption key image 2 from the file system of the computer 42 or computer 44.
- Read button 59 the maximum likelihood digital image storage button 60 for storing the maximum likelihood digital image 21 in the file system of the computer 42 or the computer 44, the maximum number of iterations setting button 61 for setting the maximum number of iterations 23, and reading A transmission button 62 for encrypting the digital image 1 with the read encryption key image 2 and transmitting it after further reversible compression, an interruption button 63 for interrupting the operation being executed, and the computer 42 or the computer 44 upon completion of reception.
- decrypt the received encrypted image display button 64 for reading the received encrypted image 6 in the received encrypted image box in the file system, and the encryption key image when the read received encrypted image is encrypted.
- Decryption button 65 of this system being sent from the other computer through the Internet 43 in this system
- Receiving display 66 for displaying and a completion button 67, for ending the system.
- the operation window 54 is displayed on the monitor of the computer 42 and the monitor of the computer 44, and all buttons in the operation window 54 respond interactively to clicks and touches.
- a usage example of the encrypted image communication system 45 will be described with reference to FIG.
- the user 68 who operates the computer 42 first calls the user 69 who operates the computer 44 and requests to start up the image compression / decompression device 73 for encryption communication. Further, the password 50 of the Zip file 51 is changed to the Zip file 51. Informs that it was sent in a private email with another SSL cipher. Next, the user 68 starts up the first mode of the image compression / decompression apparatus 28 for encryption communication in the computer 42. Thus, the encrypted image communication system 45 is formed.
- the user 68 reads the digital image 1 from the file system of the computer 42 by clicking the digital image reading button 58 in the operation window 54. Then, the digital image 1 is displayed in the image window 55. Next, the user 68 clicks the encryption key image read button 59 to read the encryption key image 2 from the file system of the computer 42. Then, the thumbnail of the encryption key image 2 and its file name are displayed in the encryption key image thumbnail display window 56. Next, the user 68 clicks the send button 62 and sends the digital image 1 encrypted and losslessly compressed to the image compression / decompression apparatus 73 for encryption communication of the computer 44.
- the user 69 While confirming the operation window 70 having the same configuration as the operation window 54 on the monitor of the computer 44, the user 69 confirms the incoming e-mail, obtains the Zip file 51 and the password 50, and uses the password 50 for the Zip file 51. Is extracted, and the encryption key image 2 is taken out and stored in the file system of the computer 44. During this work, the user 69 notices that the display corresponding to the receiving display 66 on the operation window 70 is lit, and the display corresponding to the receiving display 66 blinks and then turns off, completing the receiving operation. Wait to do.
- the user 69 clicks a button corresponding to the received encrypted image display button 64 to read the received encrypted image 6 in the received encrypted image box in the file system of the computer 44. Then, the received encrypted image 6 is displayed in an image window corresponding to the image window 55 of the operation window 70 having the same specifications corresponding to the operation window 54. Next, the user 69 clicks a button corresponding to the encryption key image reading button 59 to read the encryption key image 2 from the file system of the computer 44. Then, the thumbnail of the encryption key image 2 and its file name are displayed in a window corresponding to the encryption key image thumbnail display window 56. Next, the user 69 clicks a button corresponding to the maximum number of iterations setting button 61 to set the maximum number of iterations 23, and then clicks a button corresponding to the decryption button 65 to start decoding.
- the received encrypted image 6 in the image window corresponding to the image window 55 of the operation window 70 is gradually restored, and the maximum likelihood digital image 21 appears eventually, and the decryption operation is completed.
- the user 69 looks at the result, and if there is a lot of noise and thinks that additional restoration is necessary, the user 69 clicks the button corresponding to the maximum number of iterations setting button 61 and sets the maximum number of iterations 23. Then, it is only necessary to start decoding by clicking the button corresponding to the decoding button 65. If not, click the button corresponding to the maximum likelihood digital image saving button 60 and name it.
- the maximum likelihood digital image 21 is stored in the file system of the computer 44.
- the user 69 encrypts the digital image 52 with the encryption key image 2 and further reversibly compresses it to send it to the first mode of the image compression / decompression device 28 for encryption communication of the computer 42.
- the digital image 52 is read from the file system of the computer 44 by clicking a corresponding button. Then, the digital image 52 is displayed in an image window corresponding to the image window 55.
- the user 68 notices that the receiving display 66 on the operation window 70 is lit, turns off after the receiving display 66 blinks, and waits for the reception operation to be completed.
- the user 68 clicks the received encrypted image display button 64 to read the received encrypted image 71 in the received encrypted image box in the file system of the computer 42.
- the received encrypted image 71 is displayed in the image window 55 of the operation window 54.
- the user 69 clicks the maximum number of iterations setting button 61 to set the maximum number of iterations 23, and then clicks a button corresponding to the decryption button 65 to start decoding.
- the received encrypted image 71 in the image window 55 of the operation window 54 is gradually restored, and eventually the maximum likelihood digital image 53 appears and the decryption operation is completed.
- the user 68 looks at the result, and if there is a lot of noise and thinks that additional restoration is necessary, the user 68 clicks the maximum iterative operation number setting button 61 to set the maximum iterative operation number 23, and then decodes it. It is only necessary to start decoding by clicking the button 65. If not, if this is acceptable, click the maximum likelihood digital image save button 60 to name the maximum likelihood digital image 53 as a file on the computer 42. Save to the system.
- the second embodiment is an improved encrypted image communication system 72 in which a part of the configuration of the encrypted image communication system 45 is made hardware, and a part of the operation is shared with a server.
- FIG. 20 illustrates an example of the configuration of the improved encrypted image communication system 72.
- a computer 42 and a computer 44 are connected to servers 74 to 77 on the Internet 43 via a LAN module with a LAN terminal and a VPN router, respectively, and the servers 74 to 77 are connected to the Internet 43 via a VPN router.
- Each of the computer 42, the computer 44, and the servers 74 to 77 includes an FFT / IFFT (First Fourier Transfer / Inverse First Transfer Transfer) circuit board for performing a Fourier transform and an inverse Fourier transform, which are produced using an FPGA.
- FFT / IFFT First Fourier Transfer / Inverse First Transfer Transfer
- the Fourier transform and inverse Fourier transform in the image restoration calculation means W48 used by the digital image restoration means W9 are calculated using an FFT / IFFT circuit board, and the servers 74 to 77 are image restorations made using FPGA.
- the image restoration calculation means W48H is characterized in that it performs Fourier transform and inverse Fourier transform calculations using an FFT / IFFT circuit board.
- the FFT / IFFT circuit board is provided as a library by FPGA manufacturers such as Xilinx Corporation and Altera Corporation, and can be obtained from companies that manufacture and sell motherboards and logic circuit boards.
- a cryptographic and high-speed one is preferable.
- each of the computer 42, the computer 44, and the servers 74 to 77 needs to use products of the same manufacturer and the same model number.
- the improved encrypted image communication system 72 in FIG. 20 performs the Fourier transform and inverse Fourier transform operations of the encryption means W3 in the image compression / decompression apparatus 28 for encryption communication of the transmission device 46 of the computer 42 and the transmission device 48 of the computer 44.
- the digital image of the first aspect of the image compression / decompression apparatus 28 for encryption communication of the reception device 47 of the computer 42 and the reception device 49 of the computer 44 is configured to use the FFT / IFFT circuit board of each computer.
- the main computing means of the restoring means W9 is configured to be shared by the servers 74 to 77.
- the means W10 to W18 of the encryption means W3 are changed as follows.
- (W12) the digital image 1 is subjected to degamma correction and then RI, which is a red primary image, and GI, which is a green primary image
- a step of integrating the product obtained by integrating the RI spectrum RIS and the third corrected encryption key image spectrum 30 with the RIE spectrum RIES means for integrating the product obtained by integrating the GI spectrum GIS and the third corrected encryption key image spectrum 30 with the GIE spectrum GIES; (W16) integrating the BI spectrum BIS and the third correction encryption key image spectrum 30; (W17) Using the FFT / IFFT circuit board, the RIE spectrum RIES, the GIE spectrum GIES, and the BIE spectrum BIES are respectively inverse Fourier transformed to reduce the high frequency region and to encrypt the product obtained in this way with the BIE spectrum BIES.
- (W18) means for forming a red primary color image that has been converted into an RE, a high-frequency region reduced and encrypted green primary color image GE, and a high-frequency region reduced and encrypted blue primary color image BE
- One color image 10 is synthesized from RE, GE and BE, and this color image 10 is gamma It means for forming an encrypted image 3 after correct, to those with a made to change.
- the means W20 to W25 of the digital image restoration means W9 are changed as follows.
- (W20) means for transmitting the encryption key image 2 and the received encrypted image 6 to the server 74
- (W21) means for setting the maximum number of iterations 23, and (W22) sending the maximum number of iterations 23 to the servers 75 to 77.
- Means, (W23) means for receiving the red primary color digital image 18 from the server 75
- (W24) means for receiving the green primary color digital image 19 from the server 76
- (W25) means for receiving the blue primary color digital image 20 from the server 77
- (W26) It is changed to the one provided with means for synthesizing the maximum likelihood digital image 21 from the red primary color digital image 18, the green primary color digital image 19 and the blue primary color digital image 20.
- the server 74 includes second correcting means W20, dividing means for dividing the color image into blue primary colors and green primary colors and blue primary colors, Fourier transform means using an FFT / IFFT circuit board, and inverse Fourier transform means using an FFT / IFFT circuit board.
- the encryption key image 2 and the received encrypted image 6 are received from the digital image restoration means W9 of the reception device 47 in the computer 42 or the digital image restoration means W9 of the reception device 49 in the computer 44, and then the second correction means W20.
- the fourth corrected encryption key image 31 is obtained by the following, and then the fourth correction encryption key image 31 is transmitted as the H image 15 to the servers 75 to 77.
- the reception encrypted image 6 is received by the dividing means.
- red primary color image 12 is transmitted to the server 75 as a Y image 16.
- green primary color image 13 is transmitted as the Y image 16 to the server 76, a service to be transmitted to the server 77 then blue primary color image 15 as the Y image 16.
- the server 75 includes a Fourier transform unit using an FFT / IFFT circuit board, an inverse Fourier transform unit using an FFT / IFFT circuit board, and an image restoration calculation unit W48H.
- the reception device 47 in the computer 42 or the reception device in the computer 44 49 receives the maximum number of iterations 23 from the digital image restoration means W9, then receives the H image 15 and the Y image 16 from the server 74, and then uses the image restoration calculation means W48H to use the H image 15 and the Y image 16
- the F image 17 is obtained by executing the iterative calculation from the maximum number of iterations to 23, and this F image 17 is then stored in the digital image restoration means W9 of the receiving device 47 in the computer 42 or in the computer 44.
- a service to be transmitted to the means W23 in the digital image restoration means W9 of the receiving device 49 is performed.
- the server 76 includes a Fourier transform unit using an FFT / IFFT circuit board, an inverse Fourier transform unit using an FFT / IFFT circuit board, and an image restoration calculation unit W48H.
- the receiving device 47 in the computer 42 or the receiving device in the computer 44 49 receives the maximum number of iterations 23 from the digital image restoration means W9, then receives the H image 15 and the Y image 16 from the server 74, and then uses the image restoration calculation means W48H to use the H image 15 and the Y image 16
- the F image 17 is obtained by performing the iterative operation from the maximum number of repetitive operations 23 to the maximum number of repetitive operations 23, and this F image 17 is then stored in the digital image restoration means W9 of the receiving device 47 in the computer 42 or in the computer 44.
- a service to be transmitted to the means W24 in the digital image restoration means W9 of the receiving device 49 is performed.
- the server 77 includes a Fourier transform unit using an FFT / IFFT circuit board, an inverse Fourier transform unit using an FFT / IFFT circuit board, and an image restoration calculation unit W48H.
- the reception device 47 in the computer 42 or the reception device in the computer 44 49 receives the maximum number of iterations 23 from the digital image restoration means W9, then receives the H image 15 and the Y image 16 from the server 74, and then uses the image restoration calculation means W48H to use the H image 15 and the Y image 16
- the F image 17 is obtained by performing the iterative operation from the maximum number of repetitive operations 23 to the maximum number of repetitive operations 23, and this F image 17 is then stored in the means W25 in the digital image restoration means W9 of the receiving device 47 in the computer 42 or in the computer 44.
- a service to be transmitted to the means W25 in the digital image restoration means W9 of the receiving device 49 is performed.
- the improved encrypted image communication system 72 according to the second embodiment has a processing speed significantly improved as compared with the encrypted image communication system 45 according to the first embodiment, but the usage method is not changed and the processing quality is not different. There is no.
- FIG. 21 illustrates an example of encrypted communication by the improved encrypted image communication system 72 according to the second embodiment.
- FIG. 21 shows a digital image 1, an encryption key image 2, an encrypted image 3 from the upper left, and a maximum likelihood digital image 21 from the lower.
- the maximum number of iterations 23 is 5,000. However, in the method of determining automatic convergence from the degree of change of the F image 17 before and after the kth iteration, the number of iterations stops at about 100 to 400.
- the maximum likelihood digital image 21 is a result obtained by continuously performing additional iterative operations in the sense of reducing ambient noise until the maximum number of iterative operations 23 is reached.
- the compression rate by entropy coding of the encrypted image 3 is 69%, and an expected result is obtained. According to FIG.
- the digital image 1 is sufficiently encrypted to be indistinguishable and high-frequency data in the frequency space is removed, and is restored as the maximum likelihood digital image 21 by the improved cryptographic image communication system 72. Yes.
- the maximum likelihood digital image 21 is not substantially different from the digital image 1 with the naked eye, and may be said to be visually reversible compression / decompression and lossless encryption / decryption.
- the quality of the encrypted communication of the encrypted image communication system 45 according to the first embodiment is the same as that shown in FIG. In the example of FIG. 21, since the encryption key image 2 is designed to generate an intermediate encryption strength between medium and strong, the maximum number of iterations 23 is 5,000, but the encryption key image 2 is weak.
- the maximum likelihood digital image 21 visually equivalent to the digital image 1 can be obtained in approximately real time after about 200 to 300 times.
- the encryption strength can be further reduced by the design of the encryption key image 2, and the real-time property is further improved.
- the third embodiment is an encryption communication monitoring camera system 78 to which a high-speed improved encryption image communication system 85 obtained by increasing the speed of the improved encryption image communication system 72 for video is applied.
- the FFT / IFFT circuit board of the computer 42, the computer 44, and the servers 74 to 77 is changed to a DCT / IDCT (Discrete Cosine Transform / Inverse Discrete Cosine Transform) circuit board, and further image restoration calculation is performed.
- the means W48H is changed to the second aspect W49H of the image restoration calculation means in which the second aspect W49 of the image restoration calculation means is realized by using FPGA.
- the high-speed improved encrypted image communication system 85 is about 65% faster than the improved encrypted image communication system 72.
- the encryption key image 2 needs to be point-symmetric, in the third embodiment, a ring with an arbitrary radius and a width of 1 pixel is used. Since the encryption strength increases as the radius of the ring increases, the required radius is set in advance.
- FIG. 22 illustrates an example of the configuration of the encrypted communication monitoring camera system 78 according to the third embodiment.
- the encrypted communication monitoring camera system 78 of FIG. 22 includes the Internet 43, the transmission device 46 of the image compression / decompression device 28 for encrypted communication of the improved encryption image communication system 72, and the image compression / decompression device for encryption communication of the improved encryption image communication system 72.
- a surveillance camera 79 is connected to a capture board 80 by, for example, an IEEE 1394 cable 83, and HDMI (registration) is provided between the computer 44 and the TV imaging circuit board 81 and between the TV imaging circuit board 81 and the TV monitor 82.
- HDMI registration
- (Trademark) cable 84 but it may be other.
- An example of a processing procedure in the encrypted communication monitoring camera system 78 is as follows.
- the user 68 designates the encryption key image 2, and separately encrypts the encryption key image 2 by a password verification encryption method such as a Zip file.
- This Zip file 51 is attached to an electronic mail and transmitted to the computer 44.
- the password 50 for decrypting the encryption of the Zip file 51 is sent confidentially to the computer 44 by SSL mail.
- the user 69 who is an operator decrypts the Zip file 51 using the password 50 and stores it in the file system of the computer 44.
- the surveillance camera 79 captures the video signal in the progressive digital BMP format on the capture board 80.
- Step 5 capture board 80
- One digital image 1 in BMP format is transferred to the transmission device 46.
- the transmission device 46 creates an encrypted image 3 from the digital image 1 and the encryption key image 2, and further entropy-encodes the encrypted image 3.
- the image code 4 is generated and further transmitted to the computer 44 on the Internet 43 via the LAN module and the VPN router.
- the receiving device 49 of the computer 44 receives the encrypted image code 4 and entropy it.
- the received encrypted image 6 is reversibly decompressed by the reverse method at the time of encoding, and further decrypted by using the encryption key image 2 in the file system of the computer 44 to form the maximum likelihood digital image 21, which is further converted into the maximum likelihood digital image 21.
- the TV imaging circuit board 81 converts the maximum likelihood digital image 21 into a TV image and outputs the TV image. It sends a signal to the TV monitor 82, (Step 9) TV monitor 82 displays the maximum likelihood digital image 21, which is TV imaging.
- the encryption communication monitoring camera system 78 is based on the improved encryption image communication system 72 that uses a lot of hardware, but supports large images such as 1,360 horizontal pixels ⁇ 1,024 vertical pixels. Therefore, it is desirable to design the encryption key image 2 so that characters in the video, human face, etc. can be read and restored by about 20 iterations.
- a low-pass filter in the spatial frequency domain of a well-known technique is used, the high-frequency domain can be easily removed, but the low-frequency part of the image remains and is sufficiently distinguishable, so it is not suitable for the present invention.
- the quality of the maximum likelihood digital image 21 of the encryption communication monitoring camera system 78 of the third embodiment has no practical problem, and is so high that no significant difference is recognized from FIG.
- the present invention uses a cryptographic key image that is encrypted and compressed by transmitting it over the Internet by separately concealing an encryption key image into an image or video and making it indistinguishable, and using a separately distributed encryption key image.
- a service that performs iterative operations based on theoretical formulas and decrypts images and videos before encryption, and transmits images and videos via the Internet, such as image and video content distribution, surveillance camera device manufacturing and sales , Precision equipment and electronic equipment that develop and manufacture video cameras and digital cameras, software development such as applications and games, medical equipment such as endoscopes and MRI, information equipment such as monitors, surveillance cameras, etc. It can be used in the disaster prevention / crime prevention equipment industry, archiving industry, etc.
- Zip file 52 ... Digital image, 53 ... Maximum likelihood digital image, 54 ... Operation window, 55 ... Image window, 56 ... Encryption key image thumbnail display window, 57 ... Scanner import button, 58 ... Digital image read button, 59 ... Encryption key image read button, 60 ... Likelihood digital image save button, 61 ... Maximum number of iterations setting button, 62 ... Send button, 63 ... Interrupt button, 64 ... Received encrypted image display button, 65 ... Decryption button, 66 ... Display during reception, 67 ... End button, 68 ... User, 69 ... User, 70 ... Operation window, 71 ... Received encrypted image, 72 ... Improved dark No. image communication system, 73...
- Image compression / decompression device for encryption communication 74... Server, 75 .. server, 76 .. server, 77. 79 ... Surveillance camera, 80 ... Capture board, 81 ... TV imaging circuit board, 82 ... TV monitor, 83 ... IEEE1394 cable, 84 ... HDMI (registered trademark) cable, BE ... encrypted blue primary color image, BI ... blue primary color image of digital image 1, BIES ... BIE spectrum, BIS ... BI spectrum, F1 ... first function, F2 ... first 2 function, F3 ... third function, F4 ... fourth function, F5 ... fifth function, F6 ... sixth function, F7 ... seventh function, F8 ... Eighth function, F9 ...
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Facsimile Transmission Control (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Compression Of Band Width Or Redundancy In Fax (AREA)
Abstract
Description
Claims (22)
- デジタル画像を暗号化しながら圧縮してネットワーク送信し受信側で伸長及び復号する事によりデジタル画像を復元する暗号通信向け画像圧縮伸長方法であって、
(S1)デジタル画像を取り込む画像取り込み工程と、
(S2)希望する暗号強度のグレイスケールの暗号鍵画像を準備する工程と、
(S3)前記デジタル画像に暗号鍵画像をコンボリューションする事により前記デジタル画像の高周波成分を削減し且つ解像度を低減し且つ暗号化した暗号化画像を得る暗号化工程と、
(S4)前記暗号化画像をエントロピー符号化して、暗号化画像コードに変換する工程と、
(S5)前記暗号化画像コードをネットワーク上の他のコンピュータに送信する工程と、
(S6)前記コンピュータが前記暗号化画像コードを受信する工程と、
(S7)前記コンピュータにおいて、エントロピー符号化する際に使用した符号化に対応する復号化方法で前記暗号化画像コードを復号し受信暗号化画像と成す工程と、
(S8)事前に暗号化され別途配信された前記暗号化工程で使用した前記暗号鍵画像を復号して準備する工程と、
(S9)前記暗号鍵画像及び前記受信暗号化画像から前記受信暗号化画像に最も尤もらしい最尤デジタル画像を復元するデジタル画像復元工程と
を備える事に特徴が有る暗号通信向け画像圧縮伸長方法。 - 請求項1に記載された暗号化工程は、
(S10)前記暗号鍵画像の画像サイズを前記デジタル画像に一致させる様に前記暗号鍵画像を補正して第1補正暗号鍵画像と成す第1補正工程と、
(S11)前記第1補正暗号鍵画像をフーリエ変換し、第1補正暗号鍵画像スペクトルと成す工程と、
(S12)前記デジタル画像をデガンマ補正の後に赤原色画像であるRI、緑原色画像であるGI及び青原色画像であるBIに分割する工程と、
(S13)前記RI、前記GI及び前記BIをそれぞれフーリエ変換し、RIスペクトル、GIスペクトル及びBIスペクトルと成す工程と、
(S14)前記RIスペクトルと前記第1補正暗号鍵画像スペクトルを積算して得られた積をRIEスペクトルと成す工程と、
(S15)前記GIスペクトルと前記第1補正暗号鍵画像スペクトルを積算して得られた積をGIEスペクトルと成す工程と、
(S16)前記BIスペクトルと前記第1補正暗号鍵画像スペクトルを積算して得られた積をBIEスペクトルと成す工程と、
(S17)前記RIEスペクトル、前記GIEスペクトル及び前記BIEスペクトルをそれぞれ逆フーリエ変換し、高周波数領域が削減され暗号化された赤原色画像であるRE、高周波数領域が削減され暗号化された緑原色画像であるGE及び高周波数領域が削減され暗号化された青原色画像であるBEと成す工程と、
(S18)前記RE、前記GE及び前記BEから1枚のカラー画像を合成し、このカラー画像をガンマ補正の後に暗号化画像と成す工程と
を備える事に特徴が有る暗号通信向け画像圧縮伸長方法。 - 請求項1に記載されたデジタル画像復元工程は、
(S20)前記暗号鍵画像の画像サイズを前記受信暗号化画像に一致させる様に前記暗号鍵画像を補正して第2補正暗号鍵画像と成す第2補正工程と、
(S21)前記受信暗号化画像を赤原色画像、緑原色画像及び青原色画像に分割する工程、
(S22)前記第2補正暗号鍵画像をH画像と成し更に前記赤原色画像をY画像と成し、更に前記H画像及び前記Y画像からF画像を復元する画像復元演算工程を用いてF画像を復元しこれを赤原色デジタル画像と成す工程と、
(S23)前記緑原色画像をY画像と成し、更に前記画像復元演算工程を用いてF画像を復元しこれを緑原色デジタル画像と成す工程と、
(S24)前記青原色画像をY画像と成し、更に前記画像復元演算工程を用いてF画像を復元しこれを青原色デジタル画像と成す工程と、
(S25)前記赤原色デジタル画像、前記緑原色デジタル画像及び前記青原色デジタル画像から最尤デジタル画像を合成する工程と
を備える事に特徴が有る暗号通信向け画像圧縮伸長方法。 - 請求項3に記載された画像復元演算工程は、
(S30)前記H画像をフーリエ変換してH画像スペクトルを得る工程と、
(S31)最大反復演算回数を設定する工程と、
(S32)反復演算回数を計数するカウンターを0に設定しリセットする工程と、
(S33)前記Y画像をデガンマ補正しこれをY画像と成し更に当該Y画像をF画像初期値と成す工程と、
(S34)前記F画像初期値をフーリエ変換してF画像初期値スペクトルを得る工程と、
(S35)前記F画像初期値スペクトルを前記H画像スペクトルに積算しこの積を第1の関数と成す工程と、
(S36)前記第1の関数を反転して第2の関数と成す工程と、
(S37)前記第2の関数に前記Y画像を積算しこの積を第3の関数と成す工程と、
(S38)前記第3の関数をフーリエ変換して第3の関数のスペクトルを得る工程と、
(S39)前記H画像の反転関数を求めこれを第4の関数と成す工程と、
(S40)前記第4の関数をフーリエ変換して第4の関数のスペクトルを得る工程と、
(S41)前記第3の関数のスペクトルに前記第4の関数のスペクトルを積算しこの積を第5の関数と成す工程と、
(S42)前記第5の関数を逆フーリエ変換して第6の関数を得る工程と、
(S43)前記第6の関数に前記F画像初期値を積算しこの積をF画像と成す工程と、
(S44)前記F画像を前記F画像初期値と成す工程と、
(S45)前記カウンターに1を加算する工程と、
(S46)前記カウンターの値が前記最大反復演算回数を超えているという仮説を検証し、もしこの検証結果が偽で有れば、S34の工程へ戻り、そうではなくて、もし前記検証結果が真で有れば、S47の工程へジャンプする工程と、
(S47)前記F画像をガンマ補正してF画像と成し更に当該F画像を出力する工程と
を備える事に特徴が有る暗号通信向け画像圧縮伸長方法。 - 請求項4に記載された画像復元演算工程の第2の態様は、
前記暗号鍵画像に点対称のものを使用する事により、S39~S40の工程を削除し且つS41の工程を、
(S41C)前記第3の関数のスペクトルに前記H画像スペクトルを積算しこの積を第5の関数と成す工程、
と改める事に特徴が有る暗号通信向け画像圧縮伸長方法。 - 請求項2に記載された第1補正工程は、
(S50)前記暗号鍵画像の画素サイズを前記デジタル画像の画素サイズに一致させる工程と、
(S51)前記デジタル画像の画像サイズで且つ何のデータも無い第1補正暗号鍵画像を準備する工程と、
(S52)前記暗号鍵画像の画像サイズを前記デジタル画像の画像サイズと比較し、両者が同じであれば、(S53)へジャンプし、前記暗号鍵画像の画像サイズが前記デジタル画像の画像サイズよりも小さい場合、(S54)へジャンプし、それ以外では、(S57)へジャンプする工程と、
(S53)前記暗号鍵画像を前記第1補正暗号鍵画像に転写しその後終了する工程と、
(S54)前記第1補正暗号鍵画像の中心画素の座標に前記暗号鍵画像の中心画素の座標を一致させるように前記暗号鍵画像を移動する工程と、
(S55)前記暗号鍵画像を前記第1補正暗号鍵画像へ転写する工程と、
(S56)前記第1補正暗号鍵画像の転写済み領域と非転写領域の境界をミラー反転軸として前記転写済み領域の画素を非転写領域へ転写しその後終了する工程と、
(S57)前記デジタル画像の画像サイズに一致する様に前記暗号鍵画像を縮小しこれを第1補正暗号鍵画像に転写しその後終了する工程と
を備える事に特徴が有る暗号通信向け画像圧縮伸長方法。 - 請求項3に記載された第2補正工程は、
(S60)前記暗号鍵画像の画素サイズを前記受信暗号化画像の画素サイズに一致させる工程と、
(S61)前記受信暗号化画像の画像サイズで且つ何のデータも無い第2補正暗号鍵画像を準備する工程と、
(S62)前記暗号鍵画像の画像サイズを前記受信暗号化画像の画像サイズと比較し、両者が同じであれば、(S63)へジャンプし、前記暗号鍵画像の画像サイズが前記受信暗号化画像の画像サイズよりも小さい場合、(S64)へジャンプし、それ以外では、(S67)へジャンプする工程と、
(S63)前記暗号鍵画像を第2補正暗号鍵画像へ転写しその後終了する工程と、
(S64)前記第2補正暗号鍵画像の中心画素の座標に前記暗号鍵画像の中心画素の座標を一致させるように前記暗号鍵画像を移動する工程と、
(S65)前記暗号鍵画像を前記第2補正暗号鍵画像へ転写する工程と、
(S66)前記第2補正暗号鍵画像の転写済み領域と非転写領域の境界をミラー反転軸として前記転写済み領域の画素を非転写領域へ転写後に終了する工程と、
(S67)前記受信暗号化画像の画像サイズに一致する様に前記暗号鍵画像を縮小しこれを前記第2補正暗号鍵画像に転写後に終了する工程と
を備える事に特徴が有る暗号通信向け画像圧縮伸長方法。 - 請求項1~4、6~7に記載された暗号通信向け画像圧縮伸長方法をコンピュータに実行させるための第1プログラム。
- 請求項1~3、5、6~7に記載された暗号通信向け画像圧縮伸長方法をコンピュータに実行させるための第2プログラム。
- 請求項8に記載された第1プログラムを暗号化された状態で記憶し且つコンピュータに接続可能で且つ前記コンピュータが読込可能な第1記憶媒体。
- 請求項9に記載された第2プログラムを暗号化された状態で記憶し且つコンピュータに接続可能で且つ前記コンピュータが読込可能な第2記憶媒体。
- 請求項8に記載された暗号通信向け画像圧縮伸長方法又は請求項9に記載された暗号通信向け画像圧縮伸長方法に従い、デジタル画像を暗号化しながら圧縮してネットワーク送信し受信側で伸長及び復号する事によりデジタル画像を復元する装置であって、
(W1)デジタル画像を取り込む画像取り込み手段と、
(W2)希望する暗号強度のグレイスケールの暗号鍵画像を準備する手段と、
(W3)前記デジタル画像に暗号鍵画像をコンボリューションする事により前記デジタル画像の高周波成分を削減し且つ解像度を低減し且つ暗号化した暗号化画像を得る暗号化手段と、
(W4)前記暗号化画像をエントロピー符号化して、暗号化画像コードに変換する手段と、
(W5)前記暗号化画像コードをネットワーク上の他のコンピュータに送信する手段と、
(W6)前記コンピュータが前記暗号化画像コードを受信する手段と、
(W7)前記コンピュータにおいて、エントロピー符号化する際に使用した符号化に対応する復号化方法で前記暗号化画像コードを復号し受信暗号化画像と成す手段と、
(W8)事前に暗号化され別途配信された前記暗号化手段で使用した前記暗号鍵画像を復号して準備する手段と、
(W9)前記暗号鍵画像及び前記受信暗号化画像から前記受信暗号化画像に最も尤もらしい最尤デジタル画像を復元するデジタル画像復元手段と
を備える事に特徴が有る暗号通信向け画像圧縮伸長装置。 - 請求項12に記載された暗号化手段は、
(W10)前記暗号鍵画像の画像サイズを前記デジタル画像に一致させる様に前記暗号鍵画像を補正して第3補正暗号鍵画像と成す第1補正手段と、
(W11)前記第3補正暗号鍵画像をフーリエ変換し、第3補正暗号鍵画像スペクトルと成す手段と、
(W12)前記デジタル画像をデガンマ補正の後に赤原色画像であるRI、緑原色画像であるGI及び青原色画像であるBIに分割する手段と、
(W13)前記RI、前記GI及び前記BIをそれぞれフーリエ変換し、RIスペクトル、GIスペクトル及びBIスペクトルと成す手段と、
(W14)前記RIスペクトルと前記第3補正暗号鍵画像スペクトルを積算して得られた積をRIEスペクトルと成す手段と、
(W15)前記GIスペクトルと前記第3補正暗号鍵画像スペクトルを積算して得られた積をGIEスペクトルと成す手段と、
(W16)前記BIスペクトルと前記第3補正暗号鍵画像スペクトルを積算して得られた積をBIEスペクトルと成す手段と、
(W17)前記RIEスペクトル、前記GIEスペクトル及び前記BIEスペクトルをそれぞれ逆フーリエ変換し、高周波数領域が削減され暗号化された赤原色画像であるRE、高周波数領域が削減され暗号化された緑原色画像であるGE及び高周波数領域が削減され暗号化された青原色画像であるBEと成す手段と、
(W18)前記RE、前記GE及び前記BEから1枚のカラー画像を合成し、このカラー画像をガンマ補正の後に暗号化画像と成す手段と
を備える事に特徴が有る暗号通信向け画像圧縮伸長装置。 - 請求項12に記載されたデジタル画像復元手段は、
(W20)前記暗号鍵画像の画像サイズを前記受信暗号化画像に一致させる様に前記暗号鍵画像を補正して第4補正暗号鍵画像と成す第2補正手段と、
(W21)前記受信暗号化画像を赤原色画像、緑原色画像及び青原色画像に分割する手段と、
(W22)前記第4補正暗号鍵画像をH画像と成し更に前記赤原色画像をY画像と成し、更に前記H画像及び前記Y画像からF画像を復元する画像復元演算手段を用いてF画像を復元しこれを赤原色デジタル画像と成す手段と、
(W23)前記緑原色画像をY画像と成し、更に前記画像復元演算手段を用いてF画像を復元しこれを緑原色デジタル画像と成す手段と、
(W24)前記青原色画像をY画像と成し、更に前記画像復元演算手段を用いてF画像を復元しこれを青原色デジタル画像と成す手段と、
(W25)前記赤原色デジタル画像、前記緑原色デジタル画像及び前記青原色デジタル画像から最尤デジタル画像を合成する手段と
を備える事に特徴が有る暗号通信向け画像圧縮伸長装置。 - 請求項14に記載された画像復元演算手段は、
(W30)前記H画像をフーリエ変換してH画像スペクトルを得る手段と、
(W31)最大反復演算回数を設定する手段と、
(W32)反復演算回数を計数するカウンターを0に設定しリセットする手段と、
(W33)前記Y画像をデガンマ補正しこれをY画像と成し更に当該Y画像をF画像初期値と成す手段と、
(W34)前記F画像初期値をフーリエ変換してF画像初期値スペクトルを得る手段と、
(W35)前記F画像初期値スペクトルを前記H画像スペクトルに積算しこの積を第7の関数と成す手段と、
(W36)前記第7の関数を反転して第8の関数と成す手段と、
(W37)前記第8の関数に前記Y画像を積算しこの積を第9の関数と成す手段と、
(W38)前記第9の関数をフーリエ変換して第9の関数のスペクトルを得る手段と、
(W39)前記H画像の反転関数を求めこれを第10の関数と成す手段と、
(W40)前記第10の関数をフーリエ変換して第10の関数のスペクトルを得る手段と、
(W41)前記第9の関数のスペクトルに前記第10の関数のスペクトルを積算しこの積を第11の関数と成す手段と、
(W42)前記第11の関数を逆フーリエ変換して第12の関数を得る手段と、
(W43)前記第12の関数に前記F画像初期値を積算しこの積をF画像と成す手段と、
(W44)前記F画像を前記F画像初期値と成す手段と、
(W45)前記カウンターに1を加算する手段と、
(W46)前記カウンターの値が前記最大反復演算回数を超えているという仮説を検証し、もしこの検証結果が偽で有れば、W34の手段へ戻り、そうではなくて、もし前記検証結果が真で有れば、W47の工程へジャンプする手段と、
(W47)前記F画像をガンマ補正してF画像と成し更に当該F画像を出力する手段と
を備える事に特徴が有る暗号通信向け画像圧縮伸長装置。 - 請求項15に記載された画像復元演算手段の第2の態様は、
前記暗号鍵画像に点対称のものを使用する事により、W39~W40の手段を削除し且つW41の手段を、
(W41C)前記第9の関数のスペクトルに前記H画像スペクトルを積算しこの積を第11の関数と成す手段、
と改める事に特徴が有る暗号通信向け画像圧縮伸長装置。 - 請求項13に記載された第1補正手段は、
(W50)前記暗号鍵画像の画素サイズを前記デジタル画像の画素サイズに一致させる手段と、
(W51)前記デジタル画像の画像サイズで且つ何のデータも無い第3補正暗号鍵画像を準備する手段と、
(W52)前記暗号鍵画像の画像サイズを前記デジタル画像の画像サイズと比較し、両者が同じであれば、(W53)へジャンプし、前記暗号鍵画像の画像サイズが前記デジタル画像の画像サイズよりも小さい場合、(W54)へジャンプし、それ以外では、(W57)へジャンプする手段と、
(W53)前記暗号鍵画像を第3補正暗号鍵画像に転写しその後終了する手段と、
(W54)前記第3補正暗号鍵画像の中心画素の座標に前記暗号鍵画像の中心画素の座標を一致させるように前記暗号鍵画像を移動する手段と、
(W55)前記暗号鍵画像を前記第3補正暗号鍵画像へ転写する手段と、
(W56)前記第3補正暗号鍵画像の転写済み領域と非転写領域の境界をミラー反転軸として前記転写済み領域の画素を非転写領域へ転写し終了する手段と、
(W57)前記デジタル画像の画像サイズに一致する様に前記暗号鍵画像を縮小しこれを前記第3補正暗号鍵画像に転写しその後終了する手段と
を備える事に特徴が有る暗号通信向け画像圧縮伸長装置。 - 請求項14に記載された第2補正手段は、
(W60)前記暗号鍵画像の画素サイズを前記受信暗号化画像の画素サイズに一致させる手段と、
(W61)前記受信暗号化画像の画像サイズで且つ何のデータも無い第4補正暗号鍵画像を準備する手段と、
(W62)前記暗号鍵画像の画像サイズを前記受信暗号化画像の画像サイズと比較し、両者が同じであれば、(W63)へジャンプし、前記暗号鍵画像の画像サイズが前記受信暗号化画像の画像サイズよりも小さい場合、(W64)へジャンプし、それ以外では、(W67)へジャンプする手段と、
(W63)前記暗号鍵画像を第4補正暗号鍵画像へ転写しその後終了する手段と、
W64)前記第4補正暗号鍵画像の中心画素の座標に前記暗号鍵画像の中心画素の座標を一致させるように前記暗号鍵画像を移動する手段と、
(W65)前記暗号鍵画像を前記第4補正暗号鍵画像へ転写する手段と、
(W66)前記第4補正暗号鍵画像の転写済み領域と非転写領域の境界をミラー反転軸として前記転写済み領域の画素を非転写領域へ転写後に終了する手段と、
(W67)前記受信暗号化画像の画像サイズに一致する様に前記暗号鍵画像を縮小しこれを前記第4補正暗号鍵画像に転写後に終了する手段と
を備える事に特徴が有る暗号通信向け画像圧縮伸長装置。 - 請求項12~15、17~18に記載された暗号通信向け画像圧縮伸長装置としてコンピュータを機能させるための第3プログラム。
- 請求項12~14、16~18に記載された暗号通信向け画像圧縮伸長装置としてコンピュータを機能させるための第4プログラム。
- 請求項19に記載された第3プログラムを暗号化された状態で記憶し且つコンピュータに接続可能で且つ前記コンピュータが読込可能な第3記憶媒体。
- 請求項20に記載された第4プログラムを暗号化された状態で記憶し且つコンピュータに接続可能で且つ前記コンピュータが読込可能な第4記憶媒体。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201480068621.1A CN105830134B (zh) | 2013-12-16 | 2014-11-27 | 面向加密通信的图像压缩扩展方法及装置、程序以及存储介质 |
US15/104,616 US9883215B2 (en) | 2013-12-16 | 2014-11-27 | Method and device for compressing and expanding image intended for encrypted communication, program, and storage medium |
KR1020167015375A KR101819700B1 (ko) | 2013-12-16 | 2014-11-27 | 암호 통신용 화상 압축 신장 방법 및 장치, 프로그램과 기억 매체 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2013259046A JP6116059B2 (ja) | 2013-12-16 | 2013-12-16 | 暗号通信向け画像圧縮伸長方法及び装置、プログラム、並びに記憶媒体 |
JP2013-259046 | 2013-12-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015093254A1 true WO2015093254A1 (ja) | 2015-06-25 |
Family
ID=53402607
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2014/081480 WO2015093254A1 (ja) | 2013-12-16 | 2014-11-27 | 暗号通信向け画像圧縮伸長方法及び装置、プログラム、並びに記憶媒体 |
Country Status (5)
Country | Link |
---|---|
US (1) | US9883215B2 (ja) |
JP (1) | JP6116059B2 (ja) |
KR (1) | KR101819700B1 (ja) |
CN (1) | CN105830134B (ja) |
WO (1) | WO2015093254A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110945505A (zh) * | 2017-07-24 | 2020-03-31 | 三星电子株式会社 | 电子设备和控制电子设备的方法 |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10217438B2 (en) * | 2014-05-30 | 2019-02-26 | Apple Inc. | User interface and method for directly setting display white point |
US20160078785A1 (en) * | 2014-09-16 | 2016-03-17 | Jennifer Dana Leary | Method for Hiding Messages and Revealing Said Messages Utilizing Phosphorescent Devices |
US9922173B2 (en) * | 2014-09-18 | 2018-03-20 | Claydo Lab Ltd. | Digital rights management |
US10097534B2 (en) * | 2015-08-28 | 2018-10-09 | Dell Products L.P. | System and method to redirect hardware secure USB storage devices in high latency VDI environments |
CN105653909B (zh) * | 2016-01-26 | 2018-09-25 | 腾讯科技(深圳)有限公司 | 信息处理方法、第一终端、第二终端、服务器及系统 |
CN105872305B (zh) * | 2016-04-13 | 2018-06-05 | 宁波工程学院 | 一种完全可分离的加密域图像可逆数据隐藏方法 |
CN106941402B (zh) * | 2017-04-01 | 2020-07-10 | 中国人民武装警察部队工程大学 | 一种同态密文域可逆隐藏方法 |
CN108063663B (zh) * | 2017-12-19 | 2021-01-26 | 广东工业大学 | 一种视频加密传输方法、装置及系统 |
CN108846816B (zh) * | 2018-06-20 | 2021-10-01 | 上海理工大学 | 一种密文域图像修复方法 |
CN108882029B (zh) * | 2018-06-29 | 2020-07-31 | 银河威尔科技(北京)有限公司 | 一种视频解密方法和装置 |
CN108881953B (zh) * | 2018-06-29 | 2020-07-31 | 银河威尔科技(北京)有限公司 | 一种视频加密方法和装置 |
CN109379507A (zh) * | 2018-09-18 | 2019-02-22 | 湖北工程学院 | 一种图像的保护方法、存储介质 |
CN111294480B (zh) * | 2018-12-06 | 2021-04-16 | 中国科学院深圳先进技术研究院 | 一种图像加密与校正方法、装置及图像解密方法、装置 |
CN109903351B (zh) * | 2019-03-02 | 2023-05-30 | 复旦大学 | 基于卷积神经网络和传统编码相结合的图像压缩方法 |
CN111027040B (zh) * | 2019-11-21 | 2022-11-08 | 中国农业银行股份有限公司 | 密码设置方法、密码验证方法以及对应方法的装置 |
CN112351151B (zh) * | 2020-11-10 | 2022-09-16 | 广东工业大学 | 基于fcn的图像信息加密方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08288940A (ja) * | 1994-12-13 | 1996-11-01 | Mitsubishi Corp | 暗号鍵システム |
US5903648A (en) * | 1996-02-06 | 1999-05-11 | The University Of Connecticut | Method and apparatus for encryption |
WO2006041126A1 (ja) * | 2004-10-14 | 2006-04-20 | Lightron Co., Ltd. | 劣化情報復元方法と復元装置 |
JP2012039181A (ja) * | 2010-08-03 | 2012-02-23 | Hitachi Advanced Digital Inc | 画像伝送装置 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0719045B1 (en) | 1994-12-13 | 2003-10-29 | Mitsubishi Corporation | Crypt key system for secure electronic transactions |
JPH09307772A (ja) | 1996-05-14 | 1997-11-28 | Sharp Corp | ファクシミリ通信装置 |
AU2002301752B2 (en) * | 2001-11-28 | 2004-02-12 | Canon Kabushiki Kaisha | Encrypting a Coded Representation of an Image to Prevent Unauthorised Access |
US7792295B2 (en) * | 2005-04-25 | 2010-09-07 | Panasonic Corporation | Monitoring camera system, imaging device, and video display device |
JP2007288747A (ja) * | 2006-04-20 | 2007-11-01 | Ricoh Co Ltd | 画像処理システムおよび画像処理システムの制御方法および画像形成装置および画像再生装置 |
JP2010103867A (ja) | 2008-10-27 | 2010-05-06 | Hitachi Advanced Digital Inc | 画質劣化機能を備えたカメラ装置およびそのシステム |
KR101145110B1 (ko) * | 2011-04-21 | 2012-05-15 | 아스텔 주식회사 | 연성 워터마크 삽입/추출 장치 및 방법 |
-
2013
- 2013-12-16 JP JP2013259046A patent/JP6116059B2/ja active Active
-
2014
- 2014-11-27 KR KR1020167015375A patent/KR101819700B1/ko active IP Right Grant
- 2014-11-27 US US15/104,616 patent/US9883215B2/en active Active
- 2014-11-27 CN CN201480068621.1A patent/CN105830134B/zh active Active
- 2014-11-27 WO PCT/JP2014/081480 patent/WO2015093254A1/ja active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08288940A (ja) * | 1994-12-13 | 1996-11-01 | Mitsubishi Corp | 暗号鍵システム |
US5903648A (en) * | 1996-02-06 | 1999-05-11 | The University Of Connecticut | Method and apparatus for encryption |
WO2006041126A1 (ja) * | 2004-10-14 | 2006-04-20 | Lightron Co., Ltd. | 劣化情報復元方法と復元装置 |
JP2012039181A (ja) * | 2010-08-03 | 2012-02-23 | Hitachi Advanced Digital Inc | 画像伝送装置 |
Non-Patent Citations (2)
Title |
---|
YANG, H.-G. ET AL.: "Practical image encryption scheme by real-valued data", OPTICAL ENGINEERING, vol. 35, no. ISSUE, pages 2473 - 2478, Retrieved from the Internet <URL:http://opticalengineering.spiedigitallibrary.org/article.aspx?articleid=1074387> [retrieved on 20141224] * |
ZHANG, S. ET AL.: "COLOR IMAGE ENCRYPTION USING DOUBLE RANDOM PHASE ENCODING", MICROWAVE AND OPTICAL TECHNOLOGY LETTERS, vol. 21, no. 5, 5 June 1999 (1999-06-05), pages 318 - 323 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110945505A (zh) * | 2017-07-24 | 2020-03-31 | 三星电子株式会社 | 电子设备和控制电子设备的方法 |
CN110945505B (zh) * | 2017-07-24 | 2023-09-05 | 三星电子株式会社 | 电子设备和控制电子设备的方法 |
Also Published As
Publication number | Publication date |
---|---|
KR20160083113A (ko) | 2016-07-11 |
KR101819700B1 (ko) | 2018-01-17 |
JP6116059B2 (ja) | 2017-04-19 |
JP2015115921A (ja) | 2015-06-22 |
CN105830134B (zh) | 2019-11-19 |
CN105830134A (zh) | 2016-08-03 |
US20160330492A1 (en) | 2016-11-10 |
US9883215B2 (en) | 2018-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6116059B2 (ja) | 暗号通信向け画像圧縮伸長方法及び装置、プログラム、並びに記憶媒体 | |
KR101136346B1 (ko) | 삽입된 전-서브픽셀 렌더링된 이미지를 갖는 이미지 데이터 세트 | |
JP4082131B2 (ja) | 透かし挿入方法、装置、プログラム、媒体および画像販売方法 | |
CN109922344B (zh) | 用于对高动态范围图像进行编码、解码和表示的技术 | |
JP2015144404A5 (ja) | ||
WO2019187609A1 (ja) | コンピュータプログラム、画像処理装置及び画像処理方法 | |
JP5995864B2 (ja) | 表示データの符号化方法及びシステム | |
TWI309135B (en) | Image compression and decompresion methdo capable of encoding and decoding pixel data based on a color conversion method | |
CN106797447A (zh) | 颜色索引图压缩装置和方法 | |
US11750825B2 (en) | Methods, apparatuses, computer programs and computer-readable media for processing configuration data | |
Rebollo-Neira et al. | Self-contained encrypted image folding | |
CN109413445B (zh) | 一种视频传输方法及装置 | |
CN108737877B (zh) | 图像处理的方法、装置和终端设备 | |
Dixit et al. | Modelling and hardware implementation of quantization levels of digital cameras in DCT based image compression | |
TWI358046B (en) | Method of decompressing a set of subsampled image | |
JP5757904B2 (ja) | 画像圧縮装置 | |
RU2339998C1 (ru) | Контурный способ сжатия графических файлов | |
Molina-Garcia et al. | Parallel image and video self-recovery scheme with high recovery capability | |
Rajagopal et al. | Partial video encryption using random permutation based on modification on Dct based transformation | |
KR20170046279A (ko) | 디코딩 장치, 전자 장치 및 그 제어 방법 | |
Ji et al. | Image encryption schemes for joint photographic experts group and graphics interchange format formats based on three-dimensional baker with compound chaotic sequence generator | |
KR101673675B1 (ko) | 압축된 이미지의 기하학적 변환 방법 및 시스템 | |
Neji et al. | Simultaneous encryption and arithmetic coding for performing image compression | |
CN117834951A (zh) | 签名信息发送方法、装置、电子设备和计算机可读介质 | |
JP2005204220A (ja) | 画像通信方法、画像通信システム、画像送信装置および画像受信装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14871602 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20167015375 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15104616 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14871602 Country of ref document: EP Kind code of ref document: A1 |