WO2018230366A1 - 信号処理装置および方法、並びにプログラム - Google Patents
信号処理装置および方法、並びにプログラム Download PDFInfo
- Publication number
- WO2018230366A1 WO2018230366A1 PCT/JP2018/021143 JP2018021143W WO2018230366A1 WO 2018230366 A1 WO2018230366 A1 WO 2018230366A1 JP 2018021143 W JP2018021143 W JP 2018021143W WO 2018230366 A1 WO2018230366 A1 WO 2018230366A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- encrypted
- unit
- data
- control unit
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/48—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/56—Context or environment of the image exterior to a vehicle by using sensors mounted on the vehicle
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8355—Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
Definitions
- the present technology relates to a signal processing device, method, and program, and more particularly, to a signal processing device, method, and program that can reduce processing load while ensuring safety.
- the output image obtained by the camera is analyzed, and the steering wheel, the accelerator, the brake, and the like are controlled based on the analysis result. Therefore, the correctness of the output image of the camera is required.
- a signature for verifying the presence / absence of falsification is generated using part or all of video data obtained by shooting, and video data with a signature is output.
- the thing is proposed (for example, refer patent document 1).
- analysis processing for the output image of the camera is performed at the latter stage of the camera, and control related to driving of the accelerator and brakes is performed based on the analysis result. high.
- the present technology has been made in view of such a situation, and enables the processing load to be reduced while ensuring safety.
- the signal processing device includes a control unit that obtains designation information indicating a designation portion to be encrypted of output data, and the designation portion indicated by the designation information in the output data is a key. And the designated part indicated by the designation information changes with time.
- the signal processing method or program obtains designation information indicating a designated portion to be encrypted of output data, and uses the designated portion indicated by the designation information in the output data as a key.
- the designated portion indicated by the designation information varies with time.
- designation information indicating a designated portion to be encrypted of output data is acquired, and the designated portion indicated by the designation information in the output data is encrypted using a key. Is done. Further, the designated portion indicated by the designation information changes with time.
- the signal processing device transmits the designation information and a control unit that generates designation information indicating the designation portion while changing the designation portion to be encrypted of the acquired data with time.
- the signal processing method or program according to the second aspect of the present technology generates designation information indicating the designation portion while changing the designation portion to be encrypted of acquired data with time, transmits the designation information, Obtaining encrypted data obtained by encrypting the designated portion indicated by the designation information in the obtained data, and obtaining the obtained data.
- the designation information indicating the designation portion is generated while the designation portion to be encrypted of the acquired data is changed with time, the designation information is transmitted, and the acquisition data includes the designation information. Encrypted data obtained by encrypting the designated portion indicated by the designation information, and the acquired data are obtained.
- FIG. 2 is a diagram illustrating a configuration example of an image processing system. It is a figure explaining replacement of an image sensor. It is a figure explaining falsification of a picked-up image. It is a figure which shows the structural example of an image sensor. It is a figure which shows the structural example of a vehicle control part. It is a flowchart explaining a response process and a connection sensor authentication process. It is a flowchart explaining an image output process. It is a figure explaining embedding of an encryption picture. It is a flowchart explaining an image acquisition process. It is a figure which shows the structural example of a computer.
- security by changing the encryption target area with time, that is, by making the encryption target area arbitrary in each frame of the captured image, security (security Property).
- the area to be encrypted is randomly changed for each frame of the captured image, it is difficult for a malicious third party to specify the area to be encrypted, so that it is difficult to tamper with the captured image, and there are few processes Sufficient safety can be ensured even with an amount, that is, a low processing load.
- the present technology is a camera mounted on a moving body such as a motorcycle, a bicycle, an electric wheelchair, personal mobility, an airplane, a ship, a train, and a robot. It can also be applied to a system using such a camera.
- the data to be secured in this technology is not limited to image data, and may be arbitrary data such as audio data and various measurement data.
- encrypt the specified part of the target data while changing the specified part to be encrypted of the target data to be secured over time, and the encrypted data obtained by the encryption and the target Data can be output.
- the target data is voice data
- a predetermined voice section (range) in the voice data may be set as a designated portion to be encrypted, and the voice section may be changed with time.
- the designated portion of the target data may be one or plural.
- the image data of the photographed image obtained by photographing corresponds to the target data to be secured as described above, and a part of the area that is subject to encryption of the photographed image corresponds to the above-described designated portion.
- An encrypted image obtained by encrypting a part of the captured image corresponds to the above-described encrypted data.
- FIG. 1 is a diagram illustrating a configuration example of an embodiment of a vehicle having an image processing system to which the present technology is applied.
- the vehicle 11 shown in FIG. 1 is an automobile, and a plurality of in-vehicle cameras are mounted on the vehicle 11 in accordance with front sensing, around view sensing, and the like. That is, for example, the vehicle 11 is provided with in-vehicle cameras 21-1 to 21-4 for obtaining captured images used for control related to driving of the vehicle 11.
- the camera 21-1 is a camera for obtaining a photographed image using the region R11-1 in front of the vehicle 11 as a subject.
- the camera 21-2 is a camera for obtaining a captured image using the region R11-2 on the left side of the vehicle 11 as a subject.
- the camera 21-3 uses the region R11-3 on the right side of the vehicle 11 as a subject. This is a camera for obtaining a photographed image.
- the camera 21-4 is a camera for obtaining a photographed image using the region R11-4 behind the vehicle 11 as a subject.
- the cameras 21-1 to 21-4 are also simply referred to as cameras 21 when it is not necessary to distinguish between them.
- the captured images obtained by these cameras 21 are supplied to, for example, a vehicle control unit 22 disposed in the center of the vehicle 11 and used for control related to the operation of the vehicle 11.
- the vehicle control unit 22 is composed of, for example, an ADAS (Advanced Driving Assistant) system, and performs image analysis on the captured image supplied from the camera 21, and based on the result of the image analysis, a steering wheel, an accelerator, Control related to driving of the vehicle 11 such as a brake is performed.
- ADAS Advanced Driving Assistant
- a system having a camera 21 and a vehicle control unit 22 is an image processing system, and more specifically, the image processing system is configured as shown in FIG.
- FIG. 2 the same reference numerals are given to the portions corresponding to those in FIG. 1, and the description thereof will be omitted as appropriate.
- the image processing system shown in FIG. 2 includes a lens 51, an image sensor 52, an input / output unit 53, an input / output unit 54, and a vehicle control unit 22.
- an imaging apparatus having a lens 51 and an image sensor 52 corresponds to one camera 21 shown in FIG. Therefore, in more detail, the image processing system is provided with four cameras 21 having the lens 51 and the image sensor 52, but in FIG. 2, a lens corresponding to one camera 21 is provided for the sake of simplicity. Only 51 and image sensor 52 are shown.
- the lens 51 is composed of one or a plurality of optical lenses, collects light incident from the subject, and guides it to the imaging surface of the image sensor 52.
- the image sensor 52 is composed of, for example, a CMOS (Complementary Metal Oxide Semiconductor) image sensor and operates according to control information supplied from the vehicle control unit 22 via the input / output unit 53 and the input / output unit 54.
- the image sensor 52 captures a captured image by receiving and photoelectrically converting light incident from the lens 51, and supplies image data of the captured image obtained to the input / output unit 53.
- the captured image may be a still image or a moving image, but here the captured image is assumed to be a moving image.
- the input / output unit 53 and the input / output unit 54 are communication I / F (Interface) for long-distance communication in the vehicle 11 such as a serializer or a deserializer, and perform communication between the image sensor 52 and the vehicle control unit 22. Realize.
- the input / output unit 53 converts the image data and various information of the captured image supplied from the image sensor 52 from parallel data to serial data, and supplies the serial data to the input / output unit 54.
- the input / output unit 54 converts the image data and various information supplied from the input / output unit 53 from serial data to parallel data, and supplies the converted data to the vehicle control unit 22.
- the input / output unit 54 converts various types of information supplied from the vehicle control unit 22 from parallel data to serial data, and supplies the serial data to the input / output unit 53.
- the input / output unit 53 converts various types of information supplied from the input / output unit 54 from serial data to parallel data and supplies the converted data to the image sensor 52.
- the image sensor 52 captures a captured image according to control by the vehicle control unit 22 or supplies the captured image obtained by the capture to the vehicle control unit 22.
- the vehicle control unit 22 performs control related to driving of the vehicle 11 based on the captured image obtained by the image sensor 52.
- the camera 21 including the image sensor 52 to be originally connected to the vehicle control unit 22 is removed and replaced with a camera having another unauthorized image sensor DC11. There is a need to prevent.
- the image sensor DC11 is instructed by the vehicle control unit 22 even if the vehicle control unit 22 supplies control information to perform shooting settings. It may not work as expected, and the safety of the captured image cannot be ensured. If it does so, control regarding a driving
- a common secret key that is, the same secret key is held in advance in each of the image sensor 52 and the vehicle control unit 22, and the vehicle control unit 22 uses the secret key to perform an image.
- the sensor 52 is authenticated. That is, authentication processing using a common secret key is performed in the image sensor 52 that is the output source (acquisition source) of the captured image and the vehicle control unit 22 that is the output destination of the captured image.
- authentication of whether the correct image sensor 52 is connected to the vehicle control unit 22 is performed by exchanging an authentication message encrypted with a secret key.
- an unauthorized image sensor DC11 is connected to the vehicle control unit 22, authentication is not performed correctly, and it can be detected (detected) by authentication processing that the correct image sensor 52 is not connected.
- authentication of the image sensor 52 is performed when the camera 21 is activated. Thereby, it is possible to prevent the occurrence of an accident due to replacement of the camera 21 from the start of operation of the vehicle 11 (starting).
- a secure (safe) channel is established between the vehicle 52 and the vehicle control unit 22.
- an unauthorized device DV11 may be inserted between the image sensor 52 and the vehicle control unit 22.
- an unauthorized device is not inserted between the vehicle control unit 22 and the image sensor 52 with respect to a communication path through which control information such as shooting settings is exchanged.
- the control unit 22 can control the image sensor 52 as intended.
- the unauthorized device DV11 is inserted between the image sensor 52 and the vehicle control unit 22 with respect to a communication path through which a captured image is supplied, that is, a channel (hereinafter also referred to as an image channel). Therefore, the unauthorized device DV11 is in a state where the captured image output from the image sensor 52 can be falsified and supplied to the vehicle control unit 22.
- a channel hereinafter also referred to as an image channel
- data of each frame of the photographed image is secured using the above-described secret key held in the image sensor 52 and the vehicle control unit 22. That is, the tampering of the captured image is detected to ensure safety.
- the image sensor 52 encrypts for each frame of the captured image with a secret key that holds an image of a portion of the encrypted area that is an area designated by the vehicle control unit 22 on the captured image, The encrypted image obtained as a result is output to the vehicle control unit 22.
- the encrypted image obtained by encrypting with the private key holding the image of the encrypted area portion of the captured image supplied from the image sensor 52, and the encryption supplied from the image sensor 52 By comparing with the digitized image, it is possible to detect whether the captured image has been tampered with. By such processing, the safety of the captured image can be ensured for each frame.
- the encryption area that is subject to tampering detection processing is narrow (small)
- the security of the captured image will be reduced.
- the encryption area is changed over time, such as every frame. Thus, sufficient safety of the captured image is ensured.
- the encryption area is specified by the vehicle control unit 22.
- the vehicle control unit 22 randomly changes the position and size of the encryption area on the captured image and the number of encryption areas for each frame. It is possible.
- the encryption area is randomly changed for each frame, it is difficult for a third party who tries to tamper with the captured image to specify the encryption area in each frame. Further, even if the encryption area in a certain frame is specified by a malicious third party, the position and size of the encryption area in the next frame have changed, so that the vehicle control unit 22 cannot detect them. It is difficult to tamper with the captured image.
- the processing load on the image sensor 52 and the vehicle control unit 22 can be reduced while ensuring the safety of the captured image by changing the encryption area with time. That is, according to the image processing system, it is possible to construct a robust image channel at low cost, that is, secure image security.
- FIG. 5 is a diagram illustrating a more detailed configuration example of the image sensor 52.
- the image sensor 52 shown in FIG. 5 includes a control unit 81, a pixel array unit 82, a signal processing unit 83, an encryption processing unit 84, and an image output unit 85.
- the control unit 81 communicates with the vehicle control unit 22 via the input / output unit 53 and the input / output unit 54 and controls the overall operation of the image sensor 52. For example, the control unit 81 communicates with the vehicle control unit 22 and acquires (receives) encrypted area designation information indicating the encrypted area from the vehicle control unit 22.
- the control unit 81 includes a holding unit 101 and a decoding unit 102.
- the holding unit 101 holds a secret key supplied in advance.
- the secret key held in the holding unit 101 is also referred to as a secret key KYC.
- the decryption unit 102 decrypts predetermined information such as encrypted encryption area designation information received from the vehicle control unit 22 by the control unit 81 using the secret key KYC held in the holding unit 101. .
- the pixel array unit 82 includes a pixel array in which a plurality of pixels are arranged in a row direction and a column direction, and each pixel receives light incident from a subject under the control of the control unit 81 and photoelectrically converts the received image. Generate image data. That is, a captured image is captured. The pixel array unit 82 supplies a captured image obtained by imaging to the signal processing unit 83.
- the signal processing unit 83 performs predetermined processing such as gain adjustment and white balance adjustment on the captured image supplied from the pixel array unit 82 under the control of the control unit 81 to perform the encryption processing unit 84 and the image output unit 85. To supply.
- the encryption processing unit 84 uses the secret key KYC supplied from the control unit 81 under the control of the control unit 81 to encrypt the image of the portion of the encryption area in the captured image supplied from the signal processing unit 83, The encrypted image obtained as a result is supplied to the image output unit 85.
- the image output unit 85 embeds the encrypted image supplied from the encryption processing unit 84 in the last part of the data of one frame of the captured image supplied from the signal processing unit 83, and the encrypted image is embedded.
- the captured image is transmitted to the vehicle control unit 22 via the input / output unit 53 and the input / output unit 54.
- vehicle control part 22 is comprised as shown, for example in FIG.
- the 6 has an image input unit 141, a memory 142, a recording unit 143, a control unit 144, a communication unit 145, and a bus 146.
- the image input unit 141 to the communication unit 145 are connected to each other via a bus 146.
- the image input unit 141 receives the captured image embedded with the encrypted image transmitted from the image output unit 85 of the image sensor 52 via the input / output unit 54 and the input / output unit 53, and outputs the received image to the memory 142 or the like. To do. That is, the image input unit 141 functions as an acquisition unit that acquires an encrypted image and a captured image from the image sensor 52.
- the memory 142 is a volatile memory, and temporarily records various images and information supplied from the image input unit 141, the control unit 144, and the like.
- the recording unit 143 includes a non-volatile recording unit. The recording unit 143 records various images, information, programs, and the like supplied from the control unit 144 and the like, and stores the recorded images and information as necessary. To supply.
- the control unit 144 controls the operation of the entire vehicle control unit 22.
- the control unit 144 includes a holding unit 161, an authentication processing unit 162, a setting unit 163, an encryption processing unit 164, and an image processing unit 165.
- the holding unit 161 holds the same secret key as the secret key KYC held in the holding unit 101 of the image sensor 52 in advance.
- the secret key held in the holding unit 161 is also referred to as a secret key KYA.
- the authentication processing unit 162 performs authentication processing for authenticating the image sensor 52 using the secret key KYA held in the holding unit 161.
- the setting unit 163 performs settings related to the operation of the image sensor 52 such as settings at the time of shooting a shot image.
- the encryption processing unit 164 encrypts various information and images using the secret key KYA held in the holding unit 161. For example, the encryption processing unit 164 encrypts the image in the encryption area of the captured image received by the image input unit 141, and generates an encrypted image.
- the image processing unit 165 performs processing related to driving control of the vehicle 11 based on the captured image received by the image input unit 141. For example, the image processing unit 165 detects an obstacle or the like from the captured image, generates a control signal for stopping the traveling of the vehicle 11 according to the detection result, and outputs the control signal to the brake device or the like.
- the communication unit 145 communicates with the control unit 81 of the image sensor 52 via the input / output unit 54 and the input / output unit 53 to exchange various types of information.
- the authentication processing unit 162 of the vehicle control unit 22 that is the output destination of the captured image and the control unit 81 of the image sensor 52 that is the output source (acquisition source) of the captured image are common.
- the authentication process using the private key is started. That is, the connection sensor authentication process is performed by the vehicle control unit 22, the response process is performed by the image sensor 52, and the image sensor 52 is authenticated.
- step S11 the image sensor 52 is powered on, and power is supplied to each part of the image sensor 52.
- control unit 144 controls the communication unit 145 to communicate with the image sensor 52 in step S41.
- control unit 144 generates a response request for confirming whether the camera 21, that is, the image sensor 52 is connected, and supplies the response request to the communication unit 145.
- the communication unit 145 is supplied from the control unit 144.
- a response request is transmitted to the image sensor 52.
- the response request transmitted (output) from the communication unit 145 is supplied to the control unit 81 of the image sensor 52 via the input / output unit 54 and the input / output unit 53.
- the control unit 81 receives the response request transmitted from the communication unit 145 via the input / output unit 53 and the input / output unit 54, and sends a response according to the response request. Do.
- control unit 81 generates response information indicating that a response request has been received, for example, and transmits the response information to the communication unit 145 of the vehicle control unit 22 via the input / output unit 53 and the input / output unit 54.
- the communication unit 145 supplies the response information to the control unit 144 via the bus 146.
- the control unit 144 can know that the image sensor 52 is connected to the vehicle control unit 22 and can communicate with the image sensor 52 correctly.
- the authentication processing unit 162 of the control unit 144 generates an authentication message for the image sensor 52 in step S42.
- the authentication message is a random number generated by the authentication processing unit 162.
- step S43 the encryption processing unit 164 encrypts the authentication message generated in the process of step S42 using the secret key KYA held in the holding unit 161, and the encrypted message obtained as a result Is supplied to the communication unit 145 via the bus 146.
- step S44 the communication unit 145 transmits the encrypted message supplied from the encryption processing unit 164 to the image sensor 52.
- the encrypted message transmitted by the communication unit 145 is supplied to the control unit 81 of the image sensor 52 via the input / output unit 54 and the input / output unit 53.
- control unit 81 receives the encrypted message transmitted from the communication unit 145 in step S13.
- step S14 the decryption unit 102 decrypts the encrypted message received in step S13 using the secret key KYC retained in the retention unit 101.
- step S15 the control unit 81 transmits the decrypted message obtained by decrypting the encrypted message in step S14 to the communication unit 145 of the vehicle control unit 22 via the input / output unit 53 and the input / output unit 54. Then, the response process ends.
- the decrypted message obtained by decrypting the encrypted message should be the same as the authentication message generated in step S42.
- the vehicle control unit 22 can confirm that the image sensor 52 is a legitimate image sensor holding a predetermined secret key KYC by comparing the authentication message and the decryption message. That is, it is possible to authenticate whether the image sensor 52 is correct.
- the communication unit 145 receives the decrypted message transmitted by the control unit 81 of the image sensor 52 in step S45, and the received decrypted message is transmitted to the bus 146. To the control unit 144.
- step S46 the authentication processing unit 162 compares the authentication message generated in step S42 with the decrypted message received in step S45.
- steps S42 to S46 and the processes in steps S13 to S15 for example, in both AES (Advanced Encryption Standard) CBC (Cipher Block Encryption) mode and DES (Data Encryption Standard) method, etc.
- AES Advanced Encryption Standard
- CBC Cipher Block Encryption
- DES Data Encryption Standard
- an authentication process has been performed using a secret key encryption method (common key encryption method) in which authentication is performed using the held secret key.
- the encryption method in the authentication process is not limited to the AES method or the DES method as long as it is a secret key encryption method, and any other method may be used.
- step S47 the authentication processing unit 162 determines whether or not the image sensor 52 connected to the vehicle control unit 22 has been authenticated based on the comparison result in step S46.
- the decrypted message matches the authentication message generated in step S42, it is determined that the image sensor 52 has been authenticated.
- step S47 If it is determined in step S47 that the authentication has been made, the connection sensor authentication process is terminated, and thereafter, control related to the driving of the vehicle 11 is performed based on the captured image output from the image sensor 52. That is, an image acquisition process described later is performed.
- step S47 when it is determined in step S47 that the image sensor 52 has not been authenticated as correct, the control unit 144 restarts the image sensor 52, and the connection sensor authentication process ends.
- control unit 144 generates control information instructing restart of the image sensor 52, that is, the camera 21, and transmits the control information to the image sensor 52 by the communication unit 145.
- the control unit 81 of the image sensor 52 receives the control information instructing the restart transmitted from the communication unit 145 via the input / output unit 53 and the input / output unit 54, and restarts according to the received control information. Do.
- the image sensor 52 restarts according to the control information and newly performs the response process.
- the vehicle control unit 22 newly performs a connection sensor authentication process in response to the restart of the image sensor 52.
- the control unit 144 notifies that an unauthorized image sensor is connected. Etc. may be output to the outside so that subsequent processing is not performed.
- the image sensor 52 and the vehicle control unit 22 perform authentication by exchanging a message for authentication using the secret key KYC and the secret key KYA that are common to each other. By doing so, it is possible to prevent replacement with an unauthorized image sensor and to ensure safety. In particular, by performing the authentication process when the camera 21 (image sensor 52) is activated, it is possible to prevent an accident from occurring when the vehicle 11 starts.
- Image acquisition processing is performed in which a captured image output from the sensor 52 is acquired and control related to driving is performed.
- step S81 the control unit 81 receives the initial setting information transmitted from the vehicle control unit 22 via the input / output unit 53 and the input / output unit 54.
- the initial setting information is information indicating initial settings when shooting a captured image.
- the initial setting information is information about a captured image such as the frame rate of the captured image and the size of the captured image at the start of capturing.
- step S82 the control unit 81 performs initial setting at the time of shooting a shot image based on the initial setting information received in step S81. That is, the control unit 81 determines the size of the captured image, the frame rate, and the like based on the initial setting information.
- step S83 the control unit 81 activates each unit of the image sensor 52.
- step S84 the pixel array unit 82 captures a captured image.
- control unit 81 controls the operation of the pixel array unit 82 according to the initial setting, and the pixel array unit 82 performs shooting according to the control of the control unit 81, and signals the captured image obtained as a result, that is, the image data of the captured image. This is supplied to the processing unit 83.
- the pixel array unit 82 receives light incident from the subject via the lens 51 and photoelectrically converts it to obtain a photographed image. Further, the signal processing unit 83 performs processing such as gain adjustment and white balance adjustment on the captured image supplied from the pixel array unit 82 according to the control of the control unit 81, so that the encryption processing unit 84 and the image output unit 85. To supply.
- step S85 the control unit 81 determines whether to change (update) the encrypted area of the captured image. For example, when the vehicle control unit 22 changes the encryption region, the communication region 145 of the vehicle control unit 22 transmits the encryption region designation information indicating the changed encryption region to the control unit 81 at an appropriate timing. come. Therefore, when the encryption area designation information is transmitted from the communication unit 145, the control unit 81 determines to change the encryption area in step S85.
- step S85 If it is determined in step S85 that the encryption area is not changed, the processing from step S86 to step S88 is not performed, and then the processing proceeds to step S89.
- the control unit 81 transmits the encryption area transmitted from the communication unit 145 via the input / output unit 53 and the input / output unit 54 in step S86. Receive specified information. That is, the control unit 81 acquires encrypted area designation information from the vehicle control unit 22.
- the encryption area designation information transmitted from the vehicle control unit 22 is encrypted with the secret key KYA.
- step S87 the decryption unit 102 decrypts the encrypted area designation information received in step S86 using the secret key KYC held in the holding unit 101.
- control unit 81 supplies the encrypted area designation information after decryption to the encryption processing unit 84 and instructs to change the encrypted area. Further, the control unit 81 supplies the encryption key 84 and the secret key KYC held in the holding unit 101 together with the encryption area designation information.
- step S88 the encryption processing unit 84 changes (updates) the encryption area based on the encryption area designation information supplied from the control unit 81, and the process proceeds to step S89. That is, the encryption processing unit 84 changes the encryption area to be encrypted on the photographed image to the area indicated by the newly supplied encryption area designation information. Note that there may be one or more encryption areas indicated by the encryption area designation information.
- step S89 If the process in step S88 has been performed or if it is determined in step S85 that the encryption area is not changed, the process in step S89 is performed.
- step S89 the encryption processing unit 84 encrypts the image of the portion of the encryption area in the captured image supplied from the signal processing unit 83 using the secret key KYC supplied from the control unit 81, and the result The obtained encrypted image is supplied to the image output unit 85.
- the image data of the photographed image that is output data output from the image sensor 52 to the vehicle control unit 22, that is, the image data of the photographed image that is a target of ensuring safety (target of tampering detection) is encrypted. That is, the encrypted image portion is generated by encrypting the encrypted area indicated by the area designation information.
- step S90 the image output unit 85 embeds the encrypted image supplied from the encryption processing unit 84 in the captured image supplied from the signal processing unit 83.
- a photographed image is output from the image output unit 85 in the format shown in FIG. 9 for each frame.
- data from FS (Frame) End) to FE (Frame End) is data for one frame of a captured image that is a moving image, and the data is stored in a packet and output.
- an area R51 in which image data for one frame of a captured image is stored and an Embedded R area R52 are provided between PH (Packet Footer) and PF (Packet Footer).
- the area R51 is an area for storing image data for one frame of a captured image obtained by shooting
- the area R52 following the area R51 is an area for storing image data of an encrypted image. is there. That is, the region R52 is a region where the encrypted image is embedded.
- a region R52 which is a free region that can store arbitrary data different from the image data of the captured image, is used as a region in which the encrypted image is embedded.
- image data for one frame of the captured image is stored and output in several packets to which a packet header and a packet footer are added.
- the encrypted image is also stored and output in a packet with a packet header and a packet footer added.
- the encryption processing unit 84 encrypts the image of the region R53 in the photographed image with the secret key KYC and generates an encrypted image.
- the image output unit 85 embeds the encrypted image obtained by encryption in the area R52 of the captured image. That is, the image data of the encrypted image is added after the image data for one frame of the photographed image.
- the vehicle control unit 22 makes the image data of one frame of the photographed image and the frame.
- the encrypted image can be obtained. Therefore, the vehicle control unit 22 can immediately detect the presence or absence of falsification of the captured image.
- one area R53 on the photographed image is an encryption area
- the images in the respective encrypted areas are encrypted, and each of the plurality of encrypted images corresponding to each of the plurality of encrypted areas is Generated.
- step S91 the image output unit 85 outputs a captured image in which the encrypted image is embedded. That is, in step S91, the captured image and the encrypted image are output.
- the image output unit 85 transmits the captured image in which the encrypted image is embedded to the image input unit 141 of the vehicle control unit 22 via the input / output unit 53 and the input / output unit 54.
- step S84 to step S91 is performed for each frame of the captured image.
- step S92 the control unit 81 determines whether or not to end the process of capturing and outputting the captured image. For example, when the vehicle control unit 22 or the like instructs the end of shooting of a shot image, it is determined that the process is to be ended.
- step S92 If it is determined in step S92 that the process is not yet finished, the process returns to step S84, and the above-described process is repeated.
- step S92 if it is determined in step S92 that the process is to be terminated, the image output process is terminated.
- the image sensor 52 captures the captured image, encrypts the image in the encrypted area of the captured image, generates an encrypted image, and outputs the captured image and the encrypted image.
- the image sensor 52 captures the captured image, encrypts the image in the encrypted area of the captured image, generates an encrypted image, and outputs the captured image and the encrypted image.
- the image sensor 52 encrypts the image in the encryption area designated by the encryption area designation information that changes with time for each frame, even when only a part of the captured image is encrypted. Sufficient safety can be ensured.
- step S131 the setting unit 163 generates initial setting information, and supplies the generated initial setting information to the communication unit 145 via the bus 146.
- the initial setting information may be encrypted, but not particularly encrypted.
- step S132 the communication unit 145 transmits the initial setting information supplied from the setting unit 163 to the control unit 81 of the image sensor 52 via the input / output unit 54 and the input / output unit 53.
- the initial setting information transmitted in this way is received by the control unit 81 in step S81 of the image output process described with reference to FIG.
- the setting unit 163 generates setting information indicating the setting related to the shooting after the change, and the setting information is transmitted by the communication unit 145.
- the control unit 81 receives the setting information, and controls the pixel array unit 82 and the signal processing unit 83 according to the received setting information to perform an operation according to the setting.
- step S133 the control unit 144 determines whether to change the encryption area.
- the encryption area is changed (updated) for each frame of the captured image, it is determined that the encryption area is changed at the timing when the processing for one frame is completed.
- the encryption area may be changed for each of a plurality of frames in addition to being changed for each frame of the captured image. Further, the encryption area may be changed every fixed period, or may be changed at an indefinite period, that is, at random timing.
- step S133 If it is determined in step S133 that the encryption area is not changed, the processing from step S134 to step S136 is not performed, and then the processing proceeds to step S137.
- step S134 the control unit 144 generates encryption area designation information indicating the new encryption area after the change.
- control unit 144 determines the encryption area in each frame (time) so that the position and size of the encryption area and the number of encryption areas change randomly for each frame, and the determined encryption Encrypted area designation information indicating the area is generated.
- the maximum safety is ensured within the range that the control unit 144 can process in real time. Will be able to.
- an area including the subject may be set as an encryption area.
- the image processing unit 165 of the control unit 144 detects another vehicle traveling in front of the vehicle 11 from the captured image, and the traveling speed of the vehicle 11 is prevented from colliding with another vehicle based on the detection result. And so on.
- an area including other vehicles in the captured image more specifically, an area including other vehicles is defined as an encryption area
- alteration of an area including at least another vehicle as a subject in the captured image is performed. It can always be detected. Accordingly, the vehicle control unit 22 can correctly control the traveling speed and the like so as not to collide with another vehicle, and sufficient safety can be ensured even with a small processing load.
- the entire captured image needs to be used as an encryption area.
- the necessary subject area such as an area in which another vehicle is captured as a subject as in the example described above
- the encrypted area is an area for several lines of the captured image.
- the safety of at least the necessary area on the captured image can be completely ensured.
- step S135 the encryption processing unit 164 encrypts the encrypted area designation information generated in step S134 with the secret key KYA held in the holding unit 161, and the encrypted encrypted area designation information is stored on the bus.
- the data is supplied to the communication unit 145 via 146.
- encryption area designation information for designating an encryption area is encrypted with the secret key KYA as a parameter used for encryption of an image in the encryption area of the photographed image.
- the parameter is also a secret key. Encrypted by KYA.
- step S ⁇ b> 136 the communication unit 145 sends the encrypted encryption area designation information supplied from the encryption processing unit 164 of the control unit 144 to the image sensor 52 via the input / output unit 54 and the input / output unit 53. Transmit to the control unit 81.
- step S86 of the image output process described with reference to FIG. 8 the encrypted area designation information transmitted in the process of step S136 is received.
- step S136 If the process in step S136 has been performed, or if it is determined in step S133 that the encryption area is not changed, the process in step S137 is performed.
- step S ⁇ b> 137 the image input unit 141 acquires the captured image embedded with the encrypted image output from the image output unit 85 of the image sensor 52 via the input / output unit 54 and the input / output unit 53. .
- the image input unit 141 receives the captured image transmitted by the image output unit 85.
- a captured image as acquired data acquired from the image sensor 52 and an encrypted image embedded in the captured image are acquired.
- step S91 the captured image output in step S91 in the image output process described with reference to FIG. 8 is acquired in step S137.
- the image input unit 141 appropriately supplies the received captured image to the memory 142 and holds it, or supplies it to the control unit 144.
- the received captured image is supplied from the image input unit 141 to the control unit 144 via the bus 146.
- step S138 the encryption processing unit 164 holds the image of the encryption area indicated by the encryption area designation information generated in step S134 in the captured image supplied from the image input unit 141, in the holding unit 161. Encrypt using the private key KYA. As a result, an encrypted image encrypted using the secret key KYA is obtained.
- step S139 the control unit 144 compares the encrypted image embedded in the captured image acquired in step S137 with the encrypted image generated in the process of step S138.
- These encrypted images are images obtained by encrypting images of the same area on the photographed image with the same secret key. Therefore, if the captured image is not tampered between the time when it is output from the image output unit 85 and the time when it is received by the image input unit 141, those two encrypted images should match.
- step S140 the control unit 144 determines whether falsification of the captured image is detected based on the comparison result in step S139.
- step S139 if the two encrypted images do not match, that is, if the encrypted image embedded in the photographed image and the encrypted image generated in step S138 are not the same, tampering of the photographed image is detected. It is determined that
- step S140 If it is determined in step S140 that falsification has been detected, the process proceeds to step S142 without performing the process in step S141.
- the control unit 144 outputs a notification or the like indicating that falsification of the captured image has been detected (detected), and appropriately performs processing such as stopping automatic driving of the vehicle 11.
- step S141 the image processing unit 165 performs predetermined image processing based on the captured image supplied from the image input unit 141.
- the image processing unit 165 detects a forward vehicle, a pedestrian, or the like from the captured image by performing image analysis or the like on the captured image, and controls the driving of the vehicle 11 according to the detection result. Operation control information is generated and output to an engine, a brake device or the like.
- steps S133 to S141 are performed for each frame of the captured image. By performing the processing from step S133 to step S141 for each frame of the captured image, safety can be ensured for all frames of the captured image.
- the process of step S141 is performed, the process thereafter proceeds to step S142.
- step S141 If it is determined in step S141 that the process in step S141 has been performed or that tampering has been detected in step S140, in step S142, the control unit 144 determines whether to end the process of acquiring a captured image and performing control related to driving. Determine.
- step S140 when it is determined in step S140 that tampering has been detected, or when shooting of the captured image is terminated by stopping the vehicle 11 or the like, it is determined that the process is to be terminated when an instruction to terminate the process is given from the outside.
- step S142 If it is determined in step S142 that the process is not yet finished, the process returns to step S133, and the above-described process is repeated.
- step S142 if it is determined in step S142 that the process is to be terminated, the image acquisition process is terminated.
- the control unit 144 notifies the image sensor 52 of the end of processing via the communication unit 145.
- the vehicle control unit 22 acquires the captured image from the image sensor 52 and compares the encrypted image generated from the acquired captured image with the encrypted image embedded in the captured image. To detect tampering of the captured image.
- the processing load on the image sensor 52 and the vehicle control unit 22 can be reduced while ensuring sufficient safety by changing the position and size of the encryption area with time.
- the vehicle control unit 22 performs image processing with a high processing load, such as step S141, and the image sensor 52 is also required to have low power consumption. Therefore, in order to ensure the safety of the captured image in the image sensor 52 or the vehicle control unit 22. It is significant to reduce the processing load.
- the secret key KYC and the secret key KYA are written in advance in the holding unit 101 and the holding unit 161 in a secure state. It may not be possible to keep it in a state.
- the communication unit 145 of the vehicle control unit 22 may transmit the secret key KYC to the control unit 81 of the image sensor 52 via the input / output unit 54 and the input / output unit 53 at an appropriate timing. If the control unit 81 supplies the private key KYC received from the communication unit 145 to the holding unit 101 and holds it, the control unit 81 can perform the above-described processing using the private key KYC.
- the secret key KYC is appropriately transmitted from the vehicle control unit 22 to the image sensor 52, for example, the secret key KYC is updated for each frame of the photographed image, and is transmitted from the vehicle control unit 22 to the image sensor 52 in each frame. If the secret key KYC is transmitted, the security can be further improved.
- the above-described series of processing can be executed by hardware or can be executed by software.
- a program constituting the software is installed in the computer.
- the computer includes, for example, a general-purpose personal computer capable of executing various functions by installing a computer incorporated in dedicated hardware and various programs.
- FIG. 11 is a block diagram showing an example of a hardware configuration of a computer that executes the above-described series of processing by a program.
- a CPU Central Processing Unit
- ROM Read Only Memory
- RAM Random Access Memory
- An input / output interface 505 is further connected to the bus 504.
- An input unit 506, an output unit 507, a recording unit 508, a communication unit 509, and a drive 510 are connected to the input / output interface 505.
- the input unit 506 includes a keyboard, a mouse, a microphone, an image sensor, and the like.
- the output unit 507 includes a display, a speaker, and the like.
- the recording unit 508 includes a hard disk, a nonvolatile memory, and the like.
- the communication unit 509 includes a network interface or the like.
- the drive 510 drives a removable recording medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, or a semiconductor memory.
- the CPU 501 loads the program recorded in the recording unit 508 to the RAM 503 via the input / output interface 505 and the bus 504 and executes the program, for example. Is performed.
- the program executed by the computer (CPU 501) can be provided by being recorded in a removable recording medium 511 as a package medium, for example.
- the program can be provided via a wired or wireless transmission medium such as a local area network, the Internet, or digital satellite broadcasting.
- the program can be installed in the recording unit 508 via the input / output interface 505 by attaching the removable recording medium 511 to the drive 510. Further, the program can be received by the communication unit 509 via a wired or wireless transmission medium and installed in the recording unit 508. In addition, the program can be installed in the ROM 502 or the recording unit 508 in advance.
- the program executed by the computer may be a program that is processed in time series in the order described in this specification, or in parallel or at a necessary timing such as when a call is made. It may be a program for processing.
- the present technology can take a cloud computing configuration in which one function is shared by a plurality of devices via a network and is jointly processed.
- each step described in the above flowchart can be executed by one device or can be shared by a plurality of devices.
- the plurality of processes included in the one step can be executed by being shared by a plurality of apparatuses in addition to being executed by one apparatus.
- the present technology can be configured as follows.
- a control unit that acquires specified information indicating a specified part to be encrypted in the output data; An encryption processing unit that encrypts the designated portion indicated by the designation information in the output data using a key; The designated portion indicated by the designation information changes with time.
- the signal processing apparatus according to (1) further comprising: an output unit that outputs the encrypted data obtained by the encryption and the output data.
- the control unit performs an authentication process using the output destination of the encrypted data and the output data and the key.
- the signal processing device performs the authentication process when the signal processing device is activated.
- An encryption processing unit that encrypts the specified portion of the acquired data using a key; The signal processing apparatus according to (10), wherein the control unit compares the encrypted data acquired by the acquisition unit with encrypted data obtained by encryption by the encryption processing unit. (12) The encryption processing unit encrypts the designation information using the key, The signal processing device according to (11), wherein the communication unit transmits the designation information encrypted by the encryption processing unit. (13) The signal processing apparatus according to (11) or (12), further including an authentication processing unit that performs an authentication process using the acquisition source of the acquired data and the encrypted data and the key. (14) The signal processing device according to (13), wherein the authentication processing unit performs the authentication processing when the acquisition source is activated.
- the signal processing device according to any one of (10) to (14), wherein the control unit generates the designation information indicating a plurality of the designated portions.
- the acquired data is image data.
- the designation information indicating the designated portion is generated, Send the specified information,
- a signal processing method comprising: obtaining encrypted data obtained by encrypting the designated portion indicated by the designation information in the obtained data, and obtaining the obtained data.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Closed-Circuit Television Systems (AREA)
- Traffic Control Systems (AREA)
- Studio Devices (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Description
〈画像処理システムの構成例〉
本技術は、車載用のカメラの撮影画像の一部の領域を暗号化してカメラの後段に出力するようにするとともに、暗号化の対象となる領域を時間とともに変化させることで、安全性を確保しつつ処理負荷を低減させることができるようにするものである。
続いて、図2に示したイメージセンサ52と車両制御部22のより詳細な構成例について説明する。
また、車両制御部22は、例えば図6に示すように構成される。
次に、画像処理システムの具体的な動作について説明する。
以上において説明した接続センサ認証処理と応答処理が行われ、イメージセンサ52が認証されると、その後、イメージセンサ52が撮影を行って撮影画像を出力する画像出力処理と、車両制御部22がイメージセンサ52から出力された撮影画像を取得して運転に関する制御を行う画像取得処理が行われる。
続いて、イメージセンサ52により図8を参照して説明した画像出力処理が行われるときに車両制御部22により行われる画像取得処理について説明する。すなわち、以下、図10のフローチャートを参照して、車両制御部22による画像取得処理について説明する。
ところで、上述した一連の処理は、ハードウェアにより実行することもできるし、ソフトウェアにより実行することもできる。一連の処理をソフトウェアにより実行する場合には、そのソフトウェアを構成するプログラムが、コンピュータにインストールされる。ここで、コンピュータには、専用のハードウェアに組み込まれているコンピュータや、各種のプログラムをインストールすることで、各種の機能を実行することが可能な、例えば汎用のパーソナルコンピュータなどが含まれる。
出力データの暗号化対象とする指定部分を示す指定情報を取得する制御部と、
前記出力データにおける前記指定情報により示される前記指定部分を、鍵を用いて暗号化する暗号化処理部と
を備え、
前記指定情報により示される前記指定部分は時間とともに変化する
信号処理装置。
(2)
前記暗号化により得られた暗号化データ、および前記出力データを出力する出力部をさらに備える
(1)に記載の信号処理装置。
(3)
前記制御部は、前記暗号化データおよび前記出力データの出力先と、前記鍵を用いた認証処理を行う
(2)に記載の信号処理装置。
(4)
前記制御部は、前記信号処理装置の起動時に前記認証処理を行う
(3)に記載の信号処理装置。
(5)
前記制御部は、暗号化された前記指定情報を取得し、前記暗号化された前記指定情報を前記鍵を用いて復号する
(1)乃至(4)の何れか一項に記載の信号処理装置。
(6)
前記暗号化処理部は、前記出力データにおける前記指定情報により示される複数の前記指定部分を暗号化する
(1)乃至(5)の何れか一項に記載の信号処理装置。
(7)
前記出力データは画像データである
(1)乃至(6)の何れか一項に記載の信号処理装置。
(8)
出力データの暗号化対象とする指定部分を示す指定情報を取得し、
前記出力データにおける前記指定情報により示される前記指定部分を、鍵を用いて暗号化する
ステップを含み、
前記指定情報により示される前記指定部分は時間とともに変化する
信号処理方法。
(9)
出力データの暗号化対象とする指定部分を示す指定情報を取得し、
前記出力データにおける前記指定情報により示される前記指定部分を、鍵を用いて暗号化する
ステップを含む処理をコンピュータに実行させ、
前記指定情報により示される前記指定部分は時間とともに変化する
プログラム。
(10)
取得データの暗号化対象とする指定部分を時間とともに変化させながら、前記指定部分を示す指定情報を生成する制御部と、
前記指定情報を送信する通信部と、
前記取得データにおける前記指定情報により示される前記指定部分を暗号化して得られた暗号化データ、および前記取得データを取得する取得部と
を備える信号処理装置。
(11)
前記取得データにおける前記指定部分を、鍵を用いて暗号化する暗号化処理部をさらに備え、
前記制御部は、前記取得部により取得された前記暗号化データと、前記暗号化処理部による暗号化により得られた暗号化データとを比較する
(10)に記載の信号処理装置。
(12)
前記暗号化処理部は、前記鍵を用いて前記指定情報を暗号化し、
前記通信部は、前記暗号化処理部により暗号化された前記指定情報を送信する
(11)に記載の信号処理装置。
(13)
前記取得データおよび前記暗号化データの取得元と、前記鍵を用いた認証処理を行う認証処理部をさらに備える
(11)または(12)に記載の信号処理装置。
(14)
前記認証処理部は、前記取得元の起動時に前記認証処理を行う
(13)に記載の信号処理装置。
(15)
前記制御部は、複数の前記指定部分を示す前記指定情報を生成する
(10)乃至(14)の何れか一項に記載の信号処理装置。
(16)
前記取得データは画像データである
(10)乃至(15)の何れか一項に記載の信号処理装置。
(17)
取得データの暗号化対象とする指定部分を時間とともに変化させながら、前記指定部分を示す指定情報を生成し、
前記指定情報を送信し、
前記取得データにおける前記指定情報により示される前記指定部分を暗号化して得られた暗号化データ、および前記取得データを取得する
ステップを含む信号処理方法。
(18)
取得データの暗号化対象とする指定部分を時間とともに変化させながら、前記指定部分を示す指定情報を生成し、
前記指定情報を送信し、
前記取得データにおける前記指定情報により示される前記指定部分を暗号化して得られた暗号化データ、および前記取得データを取得する
ステップを含む処理をコンピュータに実行させるプログラム。
Claims (18)
- 出力データの暗号化対象とする指定部分を示す指定情報を取得する制御部と、
前記出力データにおける前記指定情報により示される前記指定部分を、鍵を用いて暗号化する暗号化処理部と
を備え、
前記指定情報により示される前記指定部分は時間とともに変化する
信号処理装置。 - 前記暗号化により得られた暗号化データ、および前記出力データを出力する出力部をさらに備える
請求項1に記載の信号処理装置。 - 前記制御部は、前記暗号化データおよび前記出力データの出力先と、前記鍵を用いた認証処理を行う
請求項2に記載の信号処理装置。 - 前記制御部は、前記信号処理装置の起動時に前記認証処理を行う
請求項3に記載の信号処理装置。 - 前記制御部は、暗号化された前記指定情報を取得し、前記暗号化された前記指定情報を前記鍵を用いて復号する
請求項1に記載の信号処理装置。 - 前記暗号化処理部は、前記出力データにおける前記指定情報により示される複数の前記指定部分を暗号化する
請求項1に記載の信号処理装置。 - 前記出力データは画像データである
請求項1に記載の信号処理装置。 - 出力データの暗号化対象とする指定部分を示す指定情報を取得し、
前記出力データにおける前記指定情報により示される前記指定部分を、鍵を用いて暗号化する
ステップを含み、
前記指定情報により示される前記指定部分は時間とともに変化する
信号処理方法。 - 出力データの暗号化対象とする指定部分を示す指定情報を取得し、
前記出力データにおける前記指定情報により示される前記指定部分を、鍵を用いて暗号化する
ステップを含む処理をコンピュータに実行させ、
前記指定情報により示される前記指定部分は時間とともに変化する
プログラム。 - 取得データの暗号化対象とする指定部分を時間とともに変化させながら、前記指定部分を示す指定情報を生成する制御部と、
前記指定情報を送信する通信部と、
前記取得データにおける前記指定情報により示される前記指定部分を暗号化して得られた暗号化データ、および前記取得データを取得する取得部と
を備える信号処理装置。 - 前記取得データにおける前記指定部分を、鍵を用いて暗号化する暗号化処理部をさらに備え、
前記制御部は、前記取得部により取得された前記暗号化データと、前記暗号化処理部による暗号化により得られた暗号化データとを比較する
請求項10に記載の信号処理装置。 - 前記暗号化処理部は、前記鍵を用いて前記指定情報を暗号化し、
前記通信部は、前記暗号化処理部により暗号化された前記指定情報を送信する
請求項11に記載の信号処理装置。 - 前記取得データおよび前記暗号化データの取得元と、前記鍵を用いた認証処理を行う認証処理部をさらに備える
請求項11に記載の信号処理装置。 - 前記認証処理部は、前記取得元の起動時に前記認証処理を行う
請求項13に記載の信号処理装置。 - 前記制御部は、複数の前記指定部分を示す前記指定情報を生成する
請求項10に記載の信号処理装置。 - 前記取得データは画像データである
請求項10に記載の信号処理装置。 - 取得データの暗号化対象とする指定部分を時間とともに変化させながら、前記指定部分を示す指定情報を生成し、
前記指定情報を送信し、
前記取得データにおける前記指定情報により示される前記指定部分を暗号化して得られた暗号化データ、および前記取得データを取得する
ステップを含む信号処理方法。 - 取得データの暗号化対象とする指定部分を時間とともに変化させながら、前記指定部分を示す指定情報を生成し、
前記指定情報を送信し、
前記取得データにおける前記指定情報により示される前記指定部分を暗号化して得られた暗号化データ、および前記取得データを取得する
ステップを含む処理をコンピュータに実行させるプログラム。
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2019525311A JP7229647B2 (ja) | 2017-06-16 | 2018-06-01 | 信号処理装置および方法、並びにプログラム |
CN202311246747.0A CN117221473A (zh) | 2017-06-16 | 2018-06-01 | 成像装置、车辆控制装置和成像系统 |
CN201880038092.9A CN110771090B (zh) | 2017-06-16 | 2018-06-01 | 信号处理装置、信号处理方法和程序 |
EP18816808.2A EP3641214A1 (en) | 2017-06-16 | 2018-06-01 | Signal processing device and method, and program |
EP22205522.0A EP4149054A1 (en) | 2017-06-16 | 2018-06-01 | Signal processing device, signal processing method, and program |
US16/620,086 US11361085B2 (en) | 2017-06-16 | 2018-06-01 | Signal processing device and signal processing method |
CN202211293533.4A CN115766989A (zh) | 2017-06-16 | 2018-06-01 | 用于车辆的成像装置 |
US17/718,628 US11868487B2 (en) | 2017-06-16 | 2022-04-12 | Signal processing device and signal processing method |
US17/986,114 US20230071178A1 (en) | 2017-06-16 | 2022-11-14 | Signal processing device, signal processing method, and program |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2017-118494 | 2017-06-16 | ||
JP2017118494 | 2017-06-16 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/620,086 A-371-Of-International US11361085B2 (en) | 2017-06-16 | 2018-06-01 | Signal processing device and signal processing method |
US17/718,628 Continuation US11868487B2 (en) | 2017-06-16 | 2022-04-12 | Signal processing device and signal processing method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018230366A1 true WO2018230366A1 (ja) | 2018-12-20 |
Family
ID=64659155
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2018/021143 WO2018230366A1 (ja) | 2017-06-16 | 2018-06-01 | 信号処理装置および方法、並びにプログラム |
Country Status (5)
Country | Link |
---|---|
US (3) | US11361085B2 (ja) |
EP (2) | EP4149054A1 (ja) |
JP (1) | JP7229647B2 (ja) |
CN (3) | CN110771090B (ja) |
WO (1) | WO2018230366A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113474792A (zh) * | 2019-03-28 | 2021-10-01 | 康蒂-特米克微电子有限公司 | 对抗攻击的自动识别和分类 |
WO2023171623A1 (ja) * | 2022-03-07 | 2023-09-14 | ソニーセミコンダクタソリューションズ株式会社 | 信号処理装置及び信号処理方法 |
WO2023223821A1 (ja) * | 2022-05-18 | 2023-11-23 | ソニーセミコンダクタソリューションズ株式会社 | 送信装置、受信装置、情報処理方法、プログラム、および通信システム |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11386678B2 (en) * | 2018-11-13 | 2022-07-12 | Denso International America, Inc. | Driver authentication for vehicle-sharing fleet |
US11210946B2 (en) * | 2019-07-15 | 2021-12-28 | Verizon Patent And Licensing Inc. | Content sharing between vehicles based on a peer-to-peer connection |
US11626997B2 (en) * | 2020-03-06 | 2023-04-11 | Vaultie, Inc. | System and method for authenticating digitally signed documents |
CN114267096A (zh) * | 2021-12-03 | 2022-04-01 | 联通智网科技股份有限公司 | 行车记录数据处理方法、装置及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005029765A1 (ja) * | 2003-09-19 | 2005-03-31 | Sony Corporation | 送信装置および方法、受信装置および方法、ならびに、データ伝送システム |
JP2008035234A (ja) * | 2006-07-28 | 2008-02-14 | Nec Infrontia Corp | クライアント・サーバ型分散システム、クライアント装置、サーバ装置及びそれらに用いるメッセージ暗号方法 |
WO2009058914A1 (en) * | 2007-10-30 | 2009-05-07 | Webster Allen E | Vehicle safety camera system |
JP2017041841A (ja) | 2015-08-21 | 2017-02-23 | パナソニックIpマネジメント株式会社 | 署名生成システム、署名生成装置及び署名生成方法 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4019619B2 (ja) * | 2000-09-18 | 2007-12-12 | 三菱電機株式会社 | 情報伝送システム、無線通信装置および移動体 |
JP4557548B2 (ja) * | 2002-01-02 | 2010-10-06 | ソニー エレクトロニクス インク | 部分暗号化及びパケット識別子のマッピング |
CN100435580C (zh) * | 2002-01-02 | 2008-11-19 | 索尼电子有限公司 | 对部分加密的信息的解码和解密 |
JP2006080623A (ja) * | 2004-09-07 | 2006-03-23 | Canon Inc | 情報処理方法及び装置、並びにコンピュータプログラム及びコンピュータ可読記憶媒体 |
US20070110236A1 (en) * | 2004-10-29 | 2007-05-17 | Pioneer Corporation | Encryption/recording device and method |
US20070011105A1 (en) * | 2005-05-03 | 2007-01-11 | Greg Benson | Trusted decision support system and method |
US8214516B2 (en) * | 2006-01-06 | 2012-07-03 | Google Inc. | Dynamic media serving infrastructure |
US20070258586A1 (en) * | 2006-04-28 | 2007-11-08 | Chien-Chung Huang | Personal video recorder having dynamic security functions and method thereof |
JP4912921B2 (ja) * | 2007-02-27 | 2012-04-11 | 富士通セミコンダクター株式会社 | セキュアプロセッサシステム、セキュアプロセッサ及びセキュアプロセッサシステムの制御方法 |
JPWO2009110055A1 (ja) * | 2008-03-03 | 2011-07-14 | 株式会社Pfu | 画像処理システム、方法およびプログラム |
CN101847184A (zh) * | 2009-12-16 | 2010-09-29 | 深圳市虹安信息技术有限公司 | 采用加密沙箱的文件加密方法 |
EP2541829B1 (en) * | 2010-02-24 | 2020-04-15 | Renesas Electronics Corporation | Wireless communications device and authentication processing method |
JP5616810B2 (ja) * | 2011-01-31 | 2014-10-29 | カヤバ工業株式会社 | ドライブレコーダ及びドライブレコーダシステム |
JP5621675B2 (ja) * | 2011-03-18 | 2014-11-12 | 富士通株式会社 | 署名装置、署名方法、および署名プログラム |
US9288048B2 (en) * | 2013-09-24 | 2016-03-15 | The Regents Of The University Of Michigan | Real-time frame authentication using ID anonymization in automotive networks |
WO2016076449A1 (en) * | 2014-11-11 | 2016-05-19 | Movon Corporation | Method and system for detecting an approaching obstacle based on image recognition |
WO2016122003A1 (ko) * | 2015-01-26 | 2016-08-04 | 재단법인 다차원 스마트 아이티 융합시스템 연구단 | 이벤트 영상을 부분적으로 암호화하는 방법 및 시스템 |
KR102444044B1 (ko) * | 2015-09-25 | 2022-09-19 | 삼성전자주식회사 | 이미지 처리장치 및 방법 |
-
2018
- 2018-06-01 CN CN201880038092.9A patent/CN110771090B/zh active Active
- 2018-06-01 US US16/620,086 patent/US11361085B2/en active Active
- 2018-06-01 WO PCT/JP2018/021143 patent/WO2018230366A1/ja active Application Filing
- 2018-06-01 EP EP22205522.0A patent/EP4149054A1/en active Pending
- 2018-06-01 CN CN202311246747.0A patent/CN117221473A/zh active Pending
- 2018-06-01 JP JP2019525311A patent/JP7229647B2/ja active Active
- 2018-06-01 EP EP18816808.2A patent/EP3641214A1/en active Pending
- 2018-06-01 CN CN202211293533.4A patent/CN115766989A/zh active Pending
-
2022
- 2022-04-12 US US17/718,628 patent/US11868487B2/en active Active
- 2022-11-14 US US17/986,114 patent/US20230071178A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005029765A1 (ja) * | 2003-09-19 | 2005-03-31 | Sony Corporation | 送信装置および方法、受信装置および方法、ならびに、データ伝送システム |
JP2008035234A (ja) * | 2006-07-28 | 2008-02-14 | Nec Infrontia Corp | クライアント・サーバ型分散システム、クライアント装置、サーバ装置及びそれらに用いるメッセージ暗号方法 |
WO2009058914A1 (en) * | 2007-10-30 | 2009-05-07 | Webster Allen E | Vehicle safety camera system |
JP2017041841A (ja) | 2015-08-21 | 2017-02-23 | パナソニックIpマネジメント株式会社 | 署名生成システム、署名生成装置及び署名生成方法 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113474792A (zh) * | 2019-03-28 | 2021-10-01 | 康蒂-特米克微电子有限公司 | 对抗攻击的自动识别和分类 |
JP2022519868A (ja) * | 2019-03-28 | 2022-03-25 | コンティ テミック マイクロエレクトロニック ゲゼルシャフト ミット ベシュレンクテル ハフツング | 敵対的攻撃の自動認識及び分類 |
JP7248807B2 (ja) | 2019-03-28 | 2023-03-29 | コンティ テミック マイクロエレクトロニック ゲゼルシャフト ミット ベシュレンクテル ハフツング | 敵対的攻撃の自動認識及び分類 |
WO2023171623A1 (ja) * | 2022-03-07 | 2023-09-14 | ソニーセミコンダクタソリューションズ株式会社 | 信号処理装置及び信号処理方法 |
WO2023223821A1 (ja) * | 2022-05-18 | 2023-11-23 | ソニーセミコンダクタソリューションズ株式会社 | 送信装置、受信装置、情報処理方法、プログラム、および通信システム |
Also Published As
Publication number | Publication date |
---|---|
CN110771090A (zh) | 2020-02-07 |
US20210150036A1 (en) | 2021-05-20 |
CN117221473A (zh) | 2023-12-12 |
US11868487B2 (en) | 2024-01-09 |
EP3641214A4 (en) | 2020-04-22 |
JPWO2018230366A1 (ja) | 2020-04-16 |
EP3641214A1 (en) | 2020-04-22 |
JP7229647B2 (ja) | 2023-02-28 |
US11361085B2 (en) | 2022-06-14 |
US20220237305A1 (en) | 2022-07-28 |
US20230071178A1 (en) | 2023-03-09 |
CN115766989A (zh) | 2023-03-07 |
EP4149054A1 (en) | 2023-03-15 |
CN110771090B (zh) | 2023-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7229647B2 (ja) | 信号処理装置および方法、並びにプログラム | |
US11228438B2 (en) | Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device | |
US11064115B2 (en) | Image sensor, image pickup apparatus, image sensor-identifying method, image forgery-preventing method, and image alternation-limiting method | |
KR101665199B1 (ko) | 차량용 블랙박스의 영상 위ㆍ변조 탐지 시스템 및 방법 | |
US20100259644A1 (en) | Apparatus and method for processing image information | |
US10389536B2 (en) | Imaging systems with data encryption and embedding capabalities | |
CN108712400B (zh) | 数据传输方法、装置、计算机可读存储介质和电子设备 | |
JP5408693B2 (ja) | 画像記憶装置 | |
EP3393123A1 (en) | Digital forensic image verification system | |
KR101687989B1 (ko) | 디지털 포렌식 영상 검증 시스템 및 이에 사용되는 촬영장치와 영상저장장치 | |
CN115348024A (zh) | 车辆图像传感器、包括其的图像处理系统和其操作方法 | |
TWI767064B (zh) | 圖像傳輸裝置、操作圖像傳輸裝置的方法以及片上系統 | |
JP2017098672A (ja) | 通信システム、通信方法及びカメラ装置 | |
JP2005286823A (ja) | 画像入力装置、通信システム、制御方法、コンピュータプログラム及び記憶媒体 | |
US12008379B2 (en) | Automotive image sensor, image processing system including the same and operating method thereof | |
US11514547B2 (en) | Vision sensor dynamic watermarking via noise characterization | |
KR20170070832A (ko) | 디지털 포렌식 영상 검증 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18816808 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019525311 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2018816808 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2018816808 Country of ref document: EP Effective date: 20200116 |