This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2008-093716, filed on Mar. 31, 2008, the entire contents of which are incorporated herein by reference.
The embodiments discussed herein are related to an image encryption and decryption technique for encrypting visually a part of an image printed in a printed matter or of a digital image and decrypting the part.
Leakage of important information is a serious problem as information society advances. Techniques for preventing information leakage are preferable. For example, encryption techniques for digital data to prevent the content thereof from being leaked to a third party have already been developed, and are used as an effective means to prevent information leakage.
In contrast, development of techniques for preventing information leakage from printed matters printed on paper media, for example, is not sufficient. A technique for preventing information leakage from printed matters is preferable.
In another respect, a technique for controlling authority over encrypted data is also preferable. For example, if only a password is used in encryption/decryption, a third party may easily decrypt the encrypted data if the password information is known to the third party. To avoid such a malicious decryption, a mechanism is preferable to allow only a particular person, among persons who know the password, having authority to decrypt the encrypted data.
According to an aspect of the present invention, provides is an image decryption apparatus for decrypting an encrypted image having a plurality of encrypted regions with decryption keys input by a user. The image decryption apparatus includes an image data acceptor, an encrypted region acquirer, a target region selector, a decryption order determiner, a display processor, a decryption key acceptor, and an image decryptor. The image data acceptor accepts image data of the encrypted image. The encrypted region acquirer acquires position data of the encrypted regions. The target region selector selects all the encrypted regions as decryption target regions, or acquires encrypted regions selected by the user as decryption target regions. The decryption order determiner determines decryption order for the decryption target regions. The display processor displays the encrypted image on a display screen, and displays images representing positions of the decryption target regions on the encrypted image sequentially in accordance with the decryption order. The decryption key acceptor accepts a decryption key corresponding to the decryption target region, the image representing the position of the decryption target region being displayed. The image decryptor decrypts, with an accepted decryption key, the encrypted image in the decryption target region corresponding to the accepted decryption key.
The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
Specific examples of printed matters requiring information leakage control include bills for purchased goods, personal identification numbers such as credit card numbers and social assurance numbers, medical charts, school grade reports, customer lists, etc. The techniques discussed in the embodiments may be used, for example, to control information leakage by encrypting an important part of printed matters.
We have proposed an encryption technique for printed matters (for example, Japanese Laid-open Patent Publication No. 2008-301044). In accordance with the technique, an image region for encryption is divided into a plurality of blocks, image data in the image region is scrambled by the blocks in accordance with a parameter obtained from an input password, and pixel values in the image region are converted regularly to generate an encrypted image. A particular pattern derived by the regular conversion of the pixel values serves as an indicator for determining a detailed position within the encrypted image during decryption. Even when a printed encrypted image is distorted in printing or scanning, position correction may allow highly accurate decryption.
We have also proposed an encryption technique with authority control (for example, U.S. Patent Publication No. 2008-0298596). In accordance with the technique, a key control server controls encryption keys to control authority for encrypted images.
In Japanese Laid-open Patent Publication No. 2008-301044, we have discussed no means for specifying an encrypted region for decryption when a plurality of encrypted regions are contained on an encrypted image to be decrypted. A screen for prompting a user (referred to as a decryption user) operating for decryption to input a decryption key is presented, but the decryption user has difficulty in learning which encrypted region is waiting for the decryption key. When a plurality of encrypted regions encrypted with different encryption keys are contained in the encrypted image, the decryption user needs to correctly select the encrypted region before inputting the decryption key. This inconveniences the decryption user.
In both Japanese Laid-open Patent Publication No. 2008-301044 and U.S. Patent Publication No. 2008-0298596, we have discussed no means for flexibly selecting an encrypted region on an encrypted image, on which a decryption user applies a decryption process. For example, we have discussed in Japanese Laid-open Patent Publication No. 2008-301044 that a part of the encrypted image may be extracted as a decryption target. However, when regions not to be decrypted and regions to be decrypted are mixed, the decryption user may have difficulty in selecting only the regions to be decrypted. As we have discussed in U.S. Patent Publication No. 2008-0298596, decryption information for each encrypted region, such as a position, a decryption key, and decryption authority, may be obtained from an external storage for an entire encrypted image input to an image decryption apparatus. Once the position of the encrypted region on the image is obtained, the entire encrypted image may be decrypted. But it may be difficult to flexibly select some of the encrypted regions to be decrypted.
As we have discussed in U.S. Patent Publication No. 2008-0298596, authority for decryption is assigned and then an encryption process is performed in an image encryption apparatus. An image decryption apparatus acquires decryption information for the encrypted image, and decrypts image data in an encrypted region over which the decryption user has authority for decryption with reference to information of decryption authority contained in the decryption information. No means is discussed for the decryption user to learn the decryption authority assigned to each encrypted region. The decryption user may have difficulty in performing smoothly a decryption process while learning which encrypted region the decryption user is authorized to decrypt.
When data in a plurality of encrypted regions on an encrypted image is encrypted with the same encryption key, a known image decryption apparatus lists the encrypted regions in the image, and prompts the decryption user to enter the decryption key for each encrypted region. This repeatedly requests the decryption user to input the same decryption key. Such an arrangement not only inconveniences the decryption user but also may cause the decryption user to enter an erroneous input.
Embodiments of the present invention are discussed below with reference to the drawings.
The image data acceptor 4211 accepts image data, input by a decryption user, of an encrypted image to be decrypted. The data storage 4212 stores data including input image data. The display processor 4213 displays data on a display screen. The encrypted region acquirer 4214 acquires position data of an encrypted region. The target region selector 4215 selects a decryption target region from among encrypted regions. The decryption order determiner 4216 determines decryption order for decrypting encrypted images in decryption target regions. The decryption key acceptor 4217 accepts a decryption key input by the decryption user. The image decryptor 4218 decrypts the image data with the decryption key. The decryption information acquirer 4219 acquires the decryption information. The decryption controller 4220 controls whole the image decryption apparatus 4201.
The image decryption apparatus 4301 in
An encryption process performed by the image encryption apparatus 4101 or a decryption process performed by the image decryption apparatuses 4201 or 4301 may also be performed by a common computer provided with a pertinent program.
The encryption process will be discussed with reference to
In Operation S101, the image data acceptor 4111 accepts image data, input by an encryption user, of an original image to be encrypted and stores the image data in the data storage 4112. The display processor 4113 displays the original image on a display screen which the encryption user observes while operating for encryption.
In Operation S102, the encryption region acceptor 4114 accepts a region, specified by the encryption user, on the original image as an encryption region.
In Operation S103, the decryption authority acceptor 4115 accepts information of decryption authority, assigned by the encryption user, which serves as a condition for limiting decryption of the original image in the encryption region. The information of decryption authority may include information of a division or a title of a decryption user, for example. Furthermore, the condition for limiting decryption may include limitation by time and date, limitation by period, and limitation by the number of decryption operations.
In Operation S104, the encryption key acceptor 4116 accepts an encryption key, input by the encryption user, used for encryption of the original image in the encryption region. The encryption key may be a hash value of a password input by the encryption user.
In Operation S105, the image encryptor 4117 performs an image encryption process on the original image in the encryption region with the encryption key. The original image in the encryption region is encrypted and superimposed on the original image to get an encrypted image, that is, a document in which an image in the encryption region is encrypted.
In Operation S106, if there are a plurality of encryption regions, the encryption controller 4119 checks whether the image encryption process has been performed for all the encryption regions. When the image encryption process has not been performed for all the encryption regions (“No” in Operation S106), the encryption process returns to Operation S102. This allows image encryption for overlapped encryption regions.
In Operation S107, when the image encryption process has been performed for all the encryption regions (“Yes” in Operation S106), an encrypted image which is the original image having a plurality of encryption regions in which the original image therein has been encrypted is output. The encrypted image may be displayed on the display screen by the display processor 4113, stored in the data storage 4112 or an external storage, or output to a printer a facsimile machine, etc.
In Operation S108, the decryption information organizer 4118 organizes and outputs decryption information including information of positions of the encryption regions, decryption authorities, and decryption key for verification. The decryption information may be stored in the data storage 4112 or an external storage, or combined to an image file, for example. The decryption information may further include an expiration date or the maximum number of decryption operations for each encryption region.
An encrypted image 202 is derived by repeating the image encryption process for each encryption region with a password or an encryption key generated from the password.
In Operation S108a, when image encryption for all the specified regions has been completed (“Yes” in Operation S106), in parallel with Operation S107, the decryption information organizer 4118 stores, on an external storage of a file server or the like, the decryption information together with document identification information identifiable of a document.
As illustrated in
According to
According to
In the first embodiment, the password and the authority level are not associated with each other. By storing the decryption information on an external management server of the image encryption apparatus 4101, the management server may manage the association between the password and the authority level for each region.
The password associated with the authority level on a one-to-one correspondence may be used in the encryption process. For example, if the encryption region 211 and the encryption region 212 are assigned with the same authority level, the two encryption regions may be encrypted with the same password. The image decryption apparatuses 4201 or 4301 may decrypt an encrypted image in the encryption region 211 and the encryption region 212 with the same password at the same time.
The decryption process of an encrypted image performed by the image decryption apparatuses 4201 or 4301 will be discussed below.
In Operation S601, the image data acceptor 4211 accepts image data, input by a decryption user, of an encrypted image to be decrypted and stores the image data in the data storage 4212.
In Operation S602, the display processor 4213 displays the encrypted image on a display screen which the decryption user observes while operating for decryption.
In Operation S603, the encrypted region acquirer 4214 extracts, by image recognition, encrypted regions contained on the input encrypted image. And the target region selector 4215 selects all extracted encrypted regions as encrypted regions to be decrypted (referred to as decryption target regions).
In Operation S604, the decryption order determiner 4216 determines a decryption order for all the decryption target regions.
In Operation S605, the display processor 4213 displays, on the display screen, a prompt for inputting a decryption key (or a password) used for decryption of the encrypted image in each of the decryption target regions in accordance with the decryption order.
In Operation S606, the decryption key acceptor 4217 accepts the decryption key input by the decryption user.
In Operation S607, the decryption controller 4220 checks whether decryption keys for all the decryption target regions have been accepted. When the decryption keys for all the decryption target regions have not been accepted (“No” in Operation S607), the process returns to Operation S605.
In Operation S608, when the decryption keys for all the decryption target regions have been accepted (“Yes” in Operation S607), the image decryptor 4218 performs successively the first decryption process on the encrypted image in all the decryption target regions in accordance with the decryption order. Encrypted images in all the decryption target regions are thus decrypted.
In Operation S609, a decrypted image in each decryption target region is output. Alternatively, the input encrypted image in which the encrypted image in each encrypted region has been decrypted is output.
In contrast with the first decryption process illustrated in
In Operation S603, the encrypted region acquirer 4214 extracts, by image recognition, encrypted regions contained on the input encrypted image.
In Operation S701, the decryption user specifies an encrypted region from among all extracted encrypted regions displayed on the display screen. For example, the user specifies an area containing the encrypted region with a mouse by dragging or clicks the inside of the region with a mouse. The target region selector 4215 selects the encrypted region specified by the decryption user, as a decryption target region.
In Operation S604, the decryption order determiner 4216 determines a decryption order for the decryption target regions specified by the user. Thus, the same decryption process as the first decryption process is performed on the encrypted regions specified by the decryption user.
In Operation S601, the image data acceptor 4211 accepts image data, input by a decryption user, of an encrypted image to be decrypted and stores the image data in the data storage 4212 in the same manner as in the first decryption process illustrated in
In Operation S602, the display processor 4213 displays the encrypted image on a display screen which the decryption user observes while operating for decryption.
In Operation S801, at the same time, the decryption information acquirer 4218 acquires decryption information such as illustrated in
In Operation S802, the encrypted region acquirer 4214 extracts encrypted regions contained on the input encrypted image, by image recognition or from the decryption information or by a combination of both. And, the target region selector 4215 selects all extracted encrypted regions as decryption target regions.
In Operation S604, the decryption order determiner 4216 determines a decryption order for all the decryption target regions with reference to the decryption information.
In Operation S605, the display processor 4213 displays, on the display screen, a prompt for inputting a decryption key (or a password) used for decryption of the encrypted image in each of the decryption target regions in accordance with the decryption order.
In Operation S606, the decryption key acceptor 4217 accepts the decryption key input by the decryption user.
In Operation S607, the decryption controller 4220 checks whether decryption keys for all the decryption target regions have been accepted. When the decryption keys for all the decryption target regions have not been accepted (“No” in Operation S607), the process returns to Operation S605.
In Operation S608, when the decryption keys for all the decryption target regions have been accepted (“Yes” in Operation S607), the image decryptor 4218 performs successively the decryption process on the encrypted image in all the decryption target regions in accordance with the decryption order. Encrypted images in all the decryption target regions are thus decrypted.
In Operation S609, a decrypted image of each decryption target region is output. Alternatively, the input encrypted image in which the encrypted image in each encrypted region has been decrypted is output.
The forth decryption process is different from the third decryption process illustrated in
In Operation S802, the encrypted region acquirer 4214 extracts encrypted regions contained on the input encrypted image, by image recognition or from the decryption information or by a combination of both.
In Operation S701, the target region selector 4215 selects decryption target regions specified by the user, from among all extracted encrypted regions.
The fifth decryption process is different from the third decryption process illustrated in
In Operation S802, the encrypted region acquirer 4214 extracts encrypted regions contained on the input encrypted image, by image recognition or from the decryption information or by a combination of both. And the target region selector 4215 selects all extracted encrypted regions as decryption target regions.
In Operation S1001, the display processor 4213 visually displays extracted encrypted regions and the decryption authorities thereof on the display screen. And the authorized target region selector 4311 automatically reduces the decryption target regions to include only regions on which the decryption user has decryption authority
The sixth decryption process is different from the third decryption process illustrated in
In Operation S802, the encrypted region acquirer 4214 extracts encrypted regions contained on the input encrypted image, by image recognition or from the decryption information or by a combination of both.
In Operation S701, the target region selector 4215 selects decryption target regions specified by the user, from among all extracted encrypted regions.
In Operation S1001, the display processor 4213 visually displays the decryption target regions specified by the user, and the decryption authorities thereof on the display screen. And the authorized target region selector 4311 automatically reduces the decryption target regions to include only regions on which the decryption user has decryption authority.
The seventh decryption process is different from the third decryption process illustrated in
In Operation S802, the encrypted region acquirer 4214 extracts encrypted regions contained on the input encrypted image, by image recognition or from the decryption information or by a combination of both. And the target region selector 4215 selects all extracted encrypted regions as decryption target regions.
In Operation S1001, the display processor 4213 visually displays extracted encrypted regions and the decryption authorities thereof on the display screen.
In Operation S1201, the decryption user specifies an encrypted region on which the decryption user has decryption authority from among all decryption target regions displayed on the display screen. For example, the user specifies an area containing the encrypted region with a mouse by dragging or clicks the inside of the region with a mouse. The authorized target region selector 4311 reduces the decryption target regions to include only the encrypted region specified by the decryption user, on which the decryption user has decryption authority.
The eighth decryption process is different from the third decryption process illustrated in
In Operation S802, the encrypted region acquirer 4214 extracts encrypted regions contained on the input encrypted image, by image recognition or from the decryption information or by a combination of both.
In Operation S701, the target region selector 4215 selects decryption target regions specified by the user, from among all extracted encrypted regions.
In Operation S1001, the display processor 4213 visually displays extracted encrypted regions specified by the user, and the decryption authorities thereof on the display screen.
In Operation S1201, the decryption user specifies an encrypted region on which the decryption user has decryption authority from among all decryption target regions displayed on the display screen. For example, the user specifies an area containing the encrypted region with a mouse by dragging or clicks the inside of the region with a mouse. The authorized target region selector 4311 reduces the decryption target regions to include only the encrypted region specified by the decryption user, on which the decryption user has decryption authority.
The image decryption apparatus 4201 acquires, as an input image, an encrypted image 1401 output through an encryption process of the image encryption apparatus 4101 as illustrated in
In the first embodiment, the decryption order determiner 4216 determines a decryption order of the decryption target regions as an inverse of an order in which the decryption target regions has been encrypted. Thus, the decryption key acceptor 4217 first acquires position data of encrypted region 1413 with reference to the decryption information 1441. More specifically, the top left coordinates (295, 360), and the bottom right coordinates (495, 460) are acquired as the position data of the encrypted region 1413. In accordance with the position data, the display processor 4213 identifies an image region corresponding to the encrypted region 1413 on the encrypted image 1401 acquired as the input image.
Similarly, the decryption key acceptor 4217 acquires from the decryption information 1441 the top left coordinates (75, 205) and the bottom right coordinates (275, 305) of the encrypted region 1412, and the display processor 4213 identifies an image region corresponding to the encrypted region 1412 on the encrypted image 1401. Furthermore, the decryption key acceptor 4217 acquires the top left coordinates (290, 40) and the bottom right coordinates (490, 140) of the encrypted region 1411, and the display processor 4213 identifies an image region corresponding to the encrypted region 1411 on the encrypted image 1401.
The display processor 4213 displays, on the display screen, a prompt for inputting a decryption key used for decryption of the encrypted image in each of the encrypted regions. The decryption key acceptor 4217 thus acquires, from the decryption user, the decryption keys for the encrypted regions in accordance with the decryption order, namely the encrypted region 1413, the encrypted region 1412, and the encrypted region 1411.
The decryption key acceptor 4217 verifies input decryption keys with reference to the decryption information 1441. When the decryption keys have been correctly input, i.e., a decryption key—3 has been input for the encrypted region 1413, a decryption key—2 has been input for the encrypted region 1412, and a decryption key—1 has been input for the encrypted region 1411, then verification of the input decryption keys with reference to the decryption information 1441 becomes successful. The image decryptor 4218 then performs the decryption process on the input image in the encrypted regions successively with input decryption keys and results a decrypted image 1423 for the encrypted region 1413, a decrypted image 1422 for the encrypted region 1412, a decrypted image 1421 for the encrypted region 1411.
Finally, the decrypted image of each encrypted region is superimposed on the encrypted image 1401 to obtain a decrypted image 1402.
It is assumed that a series of decryption information 1502 for each encrypted image is stored together with information (image ID) 1501 identifying the encrypted image in an external storage. The image ID 1501 may be embedded in the encrypted image by information embedding method such as digital watermark, bar code, two-dimensional bar code, or steganography.
The process illustrated in
In Operation S1501, the decryption information acquirer 4219 acquires, from the input encrypted image accepted in Operation S601, an image ID 1501 embedded in the encrypted image, in accordance with an information extraction method corresponding to the information embedding method. The decryption information acquirer 4219 may acquire decryption information 1502 from the external storage by using the image ID 1501 as a search key.
In Operation S1601, the decryption information acquirer 4219 extracts the decryption information 1602 contained in the header portion of the image file 1601 of the encrypted image accepted in Operation S601, by analyzing data in the header portion.
When the decryption information 1602 is contained in the header portion of the image file 1601, correspondence relation of the decryption information 1602 and the encrypted image 1601 is evident, and there is no need for embedding in the encrypted image the image ID for associating the decryption information 1602 and the image file 1601. When image decryption of a scanned image from a printed matter is expected, the image ID or the decryption information 1602 is preferably embedded into the encrypted image by information embedding method such as digital watermark, bar code, two-dimensional bar code, or steganography, because information contained in the header portion of the image file 1601 may not be printed when the encrypted image is simply printed.
The target region selector 4215 selects the decryption target region from among the encrypted regions within a target area 1711, specified by the decryption user, on the input encrypted image 1701 displayed on the display screen. Thus, the target region selector 4215 may select the decryption target region by requesting the user to specify some of encrypted regions by mouse dragging or clicking on the input encrypted image 1701 and accepting the data of the specified regions.
A process of determining a position of an encrypted region on the encrypted image will be discussed below.
Alternatively, position data of an encrypted region on the encrypted image may be acquired with reference to the decryption information.
The decryption information is read in accordance with the encryption order when the encrypted region 1911 is virtually drawn on the memory. With reference to a model of the encrypted regions 1911 drawn on the memory, the position 1921 of the encrypted regions 1911 may be correctly determined in view of the overlapping relationship of the encrypted regions 1911 even if the encrypted image 1903 is scale contracted or scale expanded.
Position data of an encrypted region on the encrypted image may be acquired by image recognition while referencing to the decryption information.
Alternatively, a slant of an image may be detected by comparing the markers attached to the four corners of an encrypted region.
In an encrypted image suffering from a rotational distortion, a correction operation for correcting the rotational distortion is needed to acquire the encrypted regions through the image recognition process, and to perform the decryption process.
If the encrypted image 2001 is distorted, a mismatch takes place between the relative position of the encrypted regions 2011 determined by image recognition and relative position of the encrypted regions 2022 on the model 2004 drawn on the memory with reference to the decryption information 2003. For example, when relative position 2013 of centers of a plurality of encrypted regions determined by image recognition is calculated, and then compared with relative position 2023 on the model 2004, an approximate angle of rotation may be estimated. In accordance with the estimated angle of rotation, a rotated model 2005 may be acquired, and then positions of regions on the rotated model 2005 are compared with positions of encrypted regions on the encrypted image. An irregular distortion may be thus extracted.
High-quality decryption is performed by correcting distortion in each encrypted region. By transforming and superimposing decryption results in accordance with the rotated model 2005, images in encrypted regions on a distorted image may be restored.
A process of visually displaying positions of encrypted regions on the display screen of the image decryption apparatus will be discussed.
The encrypted regions are visually displayed so that an encrypted region assigned an authority level equal to or below the level authorized to the decryption user is distinguishable as “authorized” and an encrypted region assigned an authority level above the level authorized to the decryption user is distinguishable as “unauthorized.” For example, in the case of the decryption user having Level—3 (having no authority Level—5), the encrypted region 2211 and the encrypted region 2212, each assigned with an authority Level—3, are indicated as “authorized,” and the encrypted region 2213 assigned with an authority Level—5 is indicated as “unauthorized.”
In
As discussed above, encrypted regions are distinctively displayed in accordance with assigned authority levels. Thus, the decryption user may easily learn which encrypted region which the decryption user is authorized to decrypt.
In the center of the pop-up dialog box 2401, a text field 2411 for typing a decryption key (or a password) is arranged. Arranged below the text field 2411 are an “OK” button 2412 and a “Cancel” button 2413.
The above-mentioned dialog box is widely used for a password input on a graphical user interface (GUI) based computer.
In
As illustrated in
By displaying the dialog box for password input in association with the position of the encrypted region, the decryption user may seldom enter a decryption key for a wrong encrypted region. For example, even if different decryption keys are set in different encrypted regions, the decryption user may learn the right encrypted region when entering the decryption key. The decryption user may therefore be free from being puzzled about inputting the decryption key. Thus, the arrangement may increase the efficiency of the decryption operation.
When a dialog box for password input is presented to the decryption user, an encrypted region waiting for a decryption key is presented visually or audibly. Thus, the decryption user may easily learn which encrypted region needs a decryption key to be input.
In the second embodiment of the present invention, the dialog box for password input as illustrated in
By reading the decryption information 2701 in the reverse order, the decryption process may be performed in accordance with the decryption order. Furthermore, generation of a decryption order list based on the decryption information reduces workload on the decryption user using the image decryption apparatus 4201 or 4301. By managing a plurality of encrypted regions having the same decryption key and the same authority level as one group, operations for inputting the decryption key may be reduced.
In the example illustrated in
The management number indicating the encrypted region, which is included in the decryption information generated in the encryption process, may not be necessarily included in the decryption order list. Even if the decryption key itself is contained in the decryption information stored on an external storage, the decryption key may preferably be converted into a hash value when the decryption information acquirer 4219 acquires the decryption information.
The list of decryption information allows the decryption user to confirm the position and the authority level of each encrypted region prior to or subsequent to input the password. This method supplements the visual display method using outline drawing or transmissive image drawing. When the decryption user manually selects an encrypted region and inputs a password, this method provides the decryption user with an effective guidance in the identification of each encrypted region.
In addition to a visual display, an alert sound may preferably be produced to draw the decryption user's attention.
In the second flowcharts, the decryption process is performed in Operations S3301-S3304 in accordance with the decryption order determined in Operation S604.
In Operation S3301, the display processor 4213 visually displays, on the display screen, the decryption target regions, where the encrypted images therein may be decrypted with the same decryption key, among all the selected decryption target regions. The display processor 4213 then displays a prompt for inputting a decryption key (or a password) used for decryption of the encrypted images in the decryption target regions in accordance with the decryption order.
In Operation S3302, the decryption key acceptor 4217 accepts the decryption key input by the decryption user.
In Operation S3303, the image decryptor 4218 performs the decryption process on the decryption target regions for which the decryption key has been accepted and the display processor 4213 displays decryption results on the display screen.
In Operation S3304, the decryption controller 4220 checks whether all of the decryption target regions have been applied with the decryption process in accordance with the decryption order. When all of the decryption target regions have not been applied with the decryption process (“No” in Operation SS304), the process returns to Operation S3301. When all of the decryption target regions have been applied with the decryption process (“Yes” in Operation S3304), the process proceeds to Operation S609.
With the image decryption apparatuses 4201 or 4301 working in the process of the second flowcharts, the decryption user may input a decryption key for decryption target regions having the same decryption key displayed in accordance with the decryption order, and may recognize on the display screen results of the decryption with the input decryption key. In summary, the decryption user may interactively proceed with the decryption process while recognizing the interim results of the decryption process.
As discussed above, encrypted regions having the same decryption key and the same decryption authority are grouped in a decryption order list. Thus, the decryption user may simply input the same decryption key only once in response to a prompt generated in accordance with the grouped decryption order list.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiment(s) of the present inventions have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2008-093716 | Mar 2008 | JP | national |