This patent application is based on and claims priority to Japanese patent application No. JPAP2004-344872 filed on Nov. 29, 2004, in the Japanese Patent Office, the entire contents of which are incorporated herein by reference.
1. Field of the Invention
The following disclosure relates generally to an apparatus, method, computer program and product for generating a protected document image having a visible verification image.
2. Description of the Related Art
Various methods have been empolyed to protect a document image from undesired alteration, such as tampering. For example, a verification image, which is extracted from the document image, may be embedded into the document image to generate a protected document image. By checking the verification image of the protected document image, a user can check the integrity of the print document image.
However, the above-described and other existing methods for detecting undesired alteration of a document image often require machine intervention. As a result, the integrity of the protected document image can be checked only when an appropriate detecting apparatus is available, which makes the existing methods less practical for use in some applications.
An exemplary embodiment of the present invention includes an apparatus, method, system, computer program and product, for generating a protected document image having a visible verification image. Using the visible verification image, the integrity of the protected document image can be visually checked without requiring machine intervention.
For example, the protected document image may be generated by performing an operation including the steps of: obtaining a document image to be processed; designating information in the document image to be protected; converting the designated information to protected information using a conversion rule; generating a visible verification image, including the protected information being expressed in a visible form and arranged in a position determined by an arrangement rule; and adding the visible verification image to the document image.
In order to detect whether the protected document image has been altered, characteristics of the visible verification image, determined by any one of the conversion rule, the visible form, or the arrangement rule, may be visually checked by the user. If any one of the characteristics of the visible verification image has been altered, the user may determine that the protected document image has been altered.
A more complete appreciation of the disclosure and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:
In describing the exemplary embodiments illustrated in the drawings, specific terminology is employed for clarity. However, the disclosure of this patent specification is not intended to be limited to the specific terminology selected and it is to be understood that each specific element includes all technical equivalents that operate in a similar manner. Referring now to the drawings, wherein like reference numerals designate identical or corresponding parts throughout the several views,
Step S1 includes obtaining a document image to be processed. The document image may be provided in various forms, for example, as electronic data, as a printed document, or any other medium. Further, the document image may include any kind of information including characters, numerals, signs, marks, lines, pictures, drawings, etc.
Step S2 includes designating information in the document image to be protected. In this example, the protected information includes any kind of information extracted by a user from the document image.
Step S3 includes converting the information to protected information using a conversion rule. The conversion rule defines how the designated information is converted to the protected information. For example, the conversion rule may define an encryption method for converting the designated information into the protected information using variable secret information. Further, the conversion rule may define an encryption method for converting the designated information into the converted protected information using variable secret information and invariable secret information. Furthermore, the conversion rule may define that the designated information is used as the converted protected information. The conversion rule may be previously set or it may be set according to the user's preferences.
Step S4 includes generating a visible verification image having the converted protected information. The converted protected information is expressed in a visible form, for example, as a symbol. The symbol may be expressed in various symbol types including numerals, characters, marks, patterns, etc. Further, the symbol may be expressed in various ways by changing one of its attribute, such as its color, font, size, etc. The visible form may be previously set or it may be set according to the user's preferences, as long as it can be distinguished from information originally contained in the document image.
Further, the converted protected information is arranged in a position determined by an arrangement rule. The arrangement rule helps the user to specify the position of the converted protected information in the visible verification image. For example, the arrangement rule defines an arrangement pattern indicating how the converted protected information is arranged in the visible verification image. In another example, the arrangement rule defines a valid cell indicating a specific position of the converted protected information in the document image. The arrangement rule may be previously set or it may be set according to the user's preferences.
Step S5 includes generating a protected document image by adding the visible verification image to the document image. For example, the visible verification image may be superimposed on the document image as a background image. In another example, the visible verification image may be added to a non-data section of the document image, such as a margin or a blank space of the document image. The protected document image may be provided in various ways, for example, as electronic data, as a printed document, or any other medium, as long as the user can visually check the integrity of the protected document image by using the visible verification image.
The steps illustrated in
In one example, the operation of
In another example, the Step S4 may generate a visible verification image having the converted protected information and dummy information. The dummy information is provided so as to prevent unauthenticated or unauthorized users from specifying the position of the converted protected information in the visual verification image. For example, the converted protected information and the dummy information may be expressed in the same visible form and arranged according to the same arrangement pattern. However, the dummy information would provide information different from information given by the converted protected information. Since the information given by the converted protected information is known only to the authenticated or authorized user, the converted protected information and the dummy information can be distinguished from each other only by the authenticated or authorized user.
Further, the operation illustrated in
As shown in
The storage 108 stores various data including an authentication table, a document image to be processed by the apparatus 100, or a protected document image generated by the apparatus 100, for example.
The input processor 101 is connected to an input device, such as a keyboard 10 and a pointing device 11. The input processor 101 receives information input by the user via the input device. Examples of such information include input of authentication information, selection of a document image to be processed by the apparatus 100, designation of protected information, selection of a conversion rule such as input of variable secret information, selection of a visible form expressing the converted protected information, selection of an arrangement rule, etc.
The user authenticator 110 authenticates a user by comparing the authentication information input by the user with information provided by the authentication table stored in the storage 108.
The document image obtainer 102 obtains a document image to be processed from various sources. As shown in
The protected information designator 103 designates protected information in the document image according to an instruction input by the user through the input device.
The display processor 109 is connected to a display 30. The display 30 includes any kind of display device such as a liquid crystal display, for example. The display processor 109 displays various data on the display 30, including the document image, the visible verification image, or the protected document image. Further, the display processor 109 displays various messages or menus on the display 30, which requests the user to input information.
The protected information converter 104 converts the designated information to protected information using a conversion rule.
The verification image generator 105 generates a visible verification image having the converted protected information. The converted protected information is expressed in a visible form, and is arranged in the position determined by an arrangement rule. In addition to the converted protected information, the visible verification image may include dummy information having information different from information of the converted protected information.
The protected image generator 106 generates a protected document image by adding the visible verification image to the document image.
The printer 107 is connected to a printer 20. The printer 107 may print the protected document image as a printed protected document image, according to a user's instruction.
Referring now to
Step S101 includes obtaining a document image to be processed. In one example, the display processor 109 may display a message on the display 30 which requests the user to select a document image to be processed. Through the input device, the user may instruct the apparatus 100 to obtain the document image from the scanner 40, for example. The input processor 101 receives the instruction to obtain the document and causes the document image obtainer 102 to obtain the document image through the scanner 40. In this example, an invoice having the total due amount of 300.00 dollars is obtained for further processing.
Step S102 includes designating information to be protected in the document image. In this example, the display processor 109 displays the invoice obtained in Step S101 on the display 30. The display processor 109 additionally displays a message requesting the user to select a portion of the invoice as the protected information. In this example, as shown in
Step S103 includes allowing the user to enter variable secret information which is used for converting the designated information. In this example, the display processor 109 displays a message shown in
Step S104 includes converting the designated information to protected information using a conversion rule. In this example, the conversion rule is defined such that the variable secret information is added to the protected information to obtain combined information, and the combined information is divided by invariable secret information to obtain remainder information, which is used as the converted protected information. In this example, the invariable secret information is previously set to a predetermined number “10”, which is relatively easy to remember.
More specifically, in this example, the protected information converter 104 adds the secret key number “5” to the protected information “3” to obtain the combined information “8”. The protected information converter 104 divides the combined information “8” by the number “10” to obtain the remainder information “8”. The remainder information “8” is then used as the converted protected information.
In this example, the invariable secret information may be previously set or it may be set according to the user's preferences, as long as it remains unchanged for a specific conversion rule. More specifically, the variable secret information, i.e., the secret key number, may vary for each page of the document image to be processed. However, the invariable secret information remains unchanged while processing the same document image.
Further, dummy information having information different from information given by the converted protected information may be generated. In this example, the dummy information includes any number that is obtainable as the remainder information but is different from the converted protected information “8”, such as 0, 1, 2, 3, 4, 5, 6, 7, and 9.
Step S105 includes selecting an arrangement rule. As described above with reference to
In this example, the display processor 109 displays the Arrangement window shown in
Further, in this example, the user may move the position of the dummy information in the “Preview” window. When the user selects the “Move position” button, the cursor is displayed on the “Preview” window. By moving the cursor with the input device, the user may change the position of the dummy information as long as it is arranged according to the selected arrangement pattern. For example, if the “Random pattern” is selected as illustrated in
Furthermore, in this example, the user may change the position of the converted protected information in the “Preview” window. When the user selects the “Select Valid Cell” button, the cursor is displayed on the “Preview” window. By moving the cursor with the input device, the user may select the valid cell C indicating the position of the converted protected information, for example, as illustrated in
Step S106 includes generating a visible verification image. The visible verification image has the converted protected information and the dummy information, each being arranged in the position determined by the arrangement rule set in Step S105. For example, if the user selects the “Square Grid Pattern”, the verification image generator 105 generates a visible verification image having the converted protected information “8” and the dummy information, which together forms the “Square Grid Pattern” as illustrated
Step S107 includes generating a protected document image by adding the visible verification image to the document image. For example, the protected image generator 106 may superimpose the visible verification image of
Step S108 includes displaying the protected document image on the display 30. For example, the display processor 109 may display the protected document image generated in the Step S107 in the Preview window of the menu shown in
Step S109 includes determining whether the displayed protected document image is acceptable. For example, the input processor 101 may determine whether the “OK” button displayed in the menu of
Step S110 includes printing the protected document image. After that step, the operation ends. For example, once the input processor 101 determines that the displayed protected document image is acceptable in the previous step, the input processor 101 may cause the printer 107 to print the protected document image. Before printing, the input processor 101 may store the displayed protected document image in the storage 108.
The operation illustrated in
In one example, the operation of
In another example, in the Step S106, the verification image generator 105 may adjust the position of the converted protected information or the dummy information according to the layout of the document image, as long as the position of the converted protected information can be specified. For example, the verification image generator 105 may extract a non-data section having no characters from the invoice shown in
In another example, in the Step S107, the protected image generator 106 may generate a protected document image having the protected information visibly distinguishable from other information, as illustrated in
In another example, in the Step S106, the verification image generator 105 may arrange the converted protected information in more than one position of a visible verification image. For example, the visible verification image of
If the converted protected information is to be displayed in more than one position in the visible verification image, the corresponding number of valid cells may be selected in the Step S105.
Further, if the converted-protected information is to be displayed in more than one position in the visible verification image, the protected information converter 104 may generate the corresponding number of converted protected information, each generation using a different conversion rule. For example, if converted protected information of the protected information “5” is to be displayed in three positions in the visible verification image, the protected information converter 104 may generate first converted protected information, second converted protected information, and third converted protected information. The first converted protected information may be made equal to the protected information. The second converted protected information may be obtained by applying a conversion rule of adding variable secret information to the protected information. The third converted protected information may be obtained by applying a conversion rule of subtracting variable secret information from the protected information.
To detect whether the protected document image has been altered, the user may perform the following four steps, for example.
First, the user specifies the protected information in the protected document image. For example, if the protected document image of
Second, the user obtains calculated converted protected information. The calculated converted protected information can be obtained by converting the protected information using a conversion rule. In this example, the user is assumed to remember the secret key number “5”, which is known only to the user. A conversion rule other than the secret key number “5” may be known to the public. Using the conversion rule known to the user, the user can obtain the number “8” as the calculated converted protected information.
Third, the user obtains displayed converted protected information. The displayed converted protected information can be obtained by specifying the position of the displayed converted protected information in the protected document image. For example, if the protected document image of
Fourth, the user determines whether the displayed converted protected information matches the calculated converted protected information. For example, if the protected document image of
Referring now to
The operation illustrated in
Step S203 includes selecting a visible form which is used to represent the converted protected information obtained in Step S104. In this example, the display processor 109 displays the menu shown in
Step S204 includes setting a symbol attribute of the symbol type selected in Step S203. For example, if the user selects the numeral type “0, 1, 2, 3 . . . ” or the character type having a series of Chinese characters, the display processor 109 may display a menu shown in
Step S205 includes selecting an arrangement rule in a substantially similar manner as described with reference to the Step S105 of
In this example, the display processor 109 displays a menu shown in
When the user presses the “Change Symbol” button of the menu shown in
Further, in this example, the symbol type or the symbol attribute may be set independently for each of the symbols displayed in the “Preview” window. For example, if the user selects the “Select Cell” button of the menu shown in
Step S206 includes generating a visible verification image having the converted protected information and the dummy information. The converted protected information and the dummy information are each arranged in the position determined by the arrangement rule set in the Step S205, in a substantially similar manner as described with reference to Step S106 of
For example, if the user selects the numeral type as the symbol type, and the “Triangle Grid Pattern” as the arrangement pattern, the verification image generator 105 generates a visible verification image as shown in
Further, the user may change the position or the symbol attribute of each numeral shown in
Referring now to
The operation illustrated in
For example, the preference data may be stored in the storage 108 as a user preference table as shown in
Referring back to
Step S304 includes converting the selected information to protected information. In this example, the protected information converter 104 obtains a secret key number from the user preference table for the selected user ID. Using the secret key number, the protected information converter 104 converts the selected information to the converted protected information in a substantially similar manner to that described with reference to the Step S104 of
Step S305 includes selecting an arrangement rule. In this example, the display processor 109 may display the menu shown in
Step S306 includes generating a visible verification image having the converted protected information and the dummy information, each being arranged in the position determined by the arrangement rule set in the Step S305. In this example, the verification image generator 105 obtains the valid cell, which corresponds to the user ID, from the user preference table. For example, referring to
In this manner, by storing the preference data, the operation of generating a protected document image may be simplified. Further, any user may be able to generate a protected document image for another user, as long as the user ID of the other user is known.
The operation shown in
Numerous additional modifications and variations are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the disclosure of this patent specification may be practiced in ways other than those specifically described herein.
For example, the protected document image shown in
To determine whether the protected document image of
Thus, the conversion rule, such as the secret information, may not be known to the user to generate or detect a protected document image. Further, the arrangement rule, such as the valid cell, may not be known to the user to generate or detect a protected document image.
Further, elements and/or features of the different illustrative embodiments may be combined with each other and/or substituted for each other within the scope of this disclosure and appended claims.
Furthermore, any one of the above-described methods of the present invention may be embodied in the form of a computer program stored in any kind of suitable storage device or medium. The computer program, i.e., the protected document generating program, may be incorporated into any kind of document system to create a protected document generating system. The protected document generating system may be implemented in various ways, such as with a personal computer (PC) 900 shown in
As shown in
The CPU 901 includes any kind of processor capable of controlling operation of the system 900. The ROM 902 includes any kind of involatile memory. The RAM 903 includes any kind of volatile memory. The storage device 904 includes any kind of device capable of storing data, such as a hard disk drive (HDD), for example. The display 907 includes any kind of device capable of displaying, such as a liquid crystal display (LCD), for example. The input device 906 includes any kind of device configured to allow a user to input data, such as a keyboard or a mouse. The communication I/F 905 allows the system 900 to communicate with other apparatuses via a communication line or a network.
In one example, the protected document generating program may be installed onto the storage device 904 from a storage medium storing the protected document generating program. For this purpose, the storage device 904 may include a storage medium drive, such as-an optical disc drive, which reads the program from the storage medium. Examples of storage mediums include, but are not limited to, optical discs such as CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-R, DVD+R, DVD-RW and DVD+RW, magneto optical discs, memory cards, and flexible disks. The protected document generating program may be further loaded onto the ROM 902 upon activation of the CPU 901.
In another example, the protected document generating program may be downloaded from any device or apparatus via the network, such as the Internet, through the communication I/F. Further, the protected document generating program may be uploaded to any device or apparatus via the network.
In this example, the protected document generating program includes a plurality of modules, each corresponding to the component of the protected document generating apparatus 100 shown in
Alternatively, any one of the above-described methods of the present invention may be implemented by ASIC, prepared by interconnecting an appropriate network of conventional component circuits or by a combination thereof with one or more conventional general purpose microprocessors and/or signal processors programmed accordingly.
Number | Date | Country | Kind |
---|---|---|---|
2004-344872 | Nov 2004 | JP | national |