This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2008-76129, filed on Mar. 24, 2008, the entire contents of which are incorporated herein by reference.
The embodiments discussed herein are related to a technique for indicating, with markers, a specific area where encrypted or encoded data is placed on a printed matter or an image.
Techniques for indicating a specific area on a printed matter with markers have been devised.
For example, Japanese Patent No. 2938338 discusses a two dimension code which is encoded from some data and stuck to a printed matter. A URL (Uniform Resource Locator), for example, is encoded into a two dimension code, and a reader for reading and processing two dimension codes restores original data from the two dimension code. In this case, the reader may find the position of the two dimension code by reading markers arranged at corners of the two dimension code.
According to an aspect of the present invention, provided is an image encryption apparatus for encrypting image data. The image encryption apparatus includes an input processor, an encryptor, a marker generator, an image saver, a marker sticker, and an output processor. The input processor accepts data of an input image to be encrypted. The encryptor encrypts data in a predefined encryption area of the input image to generate data of a first encrypted image. The first encrypted image is the input image whose data in the predefined encryption area has been replaced with encrypted data. The marker generator generates data of a marker to be stuck on the first encrypted image. The marker is capable of indicating the predefined encryption area of the first encrypted image. The image saver saves data of a part of the first encrypted image where the marker is to be stuck. The marker sticker generates data of a second encrypted image. The second encrypted image is the first encrypted image whose data in the part has been replaced with the data of the marker. The output processor outputs the data of the second encrypted image.
According to another aspect of the present invention, provided is an image decryption apparatus for decrypting image data. The image decryption apparatus includes an input processor, a marker detector, a decryptor, an image restorer, and an output processor. The input processor accepts data of an input image to be decrypted. The marker detector detects a marker stuck on the input image and identifies an encrypted area of the input image on the basis of a detected marker. The decryptor decrypts data in the encrypted area of the input image to generate data of a first decrypted image. The first decrypted image is the input image whose data in the encrypted area has been replaced with decrypted data. The image restorer generates data of a second decrypted image. The second decrypted image is the first decrypted image whose data in an area covered with the marker has been restored. The output processor outputs the data of the second decrypted image.
The object and advantages of the present invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the present invention, as claimed.
Japanese Laid-open Patent Publication No. 2008-301044 applied by the applicant of the present invention discusses a technique for encrypting data on a printed matter and sticking markers indicating an encrypted area at four corners thereof. Similarly to the two dimension code, a reader acquires coordinates of the encrypted area by detecting the markers arranged around the encrypted area, which makes it possible to perform a decryption process.
Hereinafter, embodiments of the present invention will be discussed in detail with reference to the accompanying drawings. Like reference number denotes like element in the drawings.
As an encryption system, for example, the technique discussed in Japanese Laid-open Patent Publication No. 2008-301044 may be employed. Alternatively, a known common key encryption system such as AES (Advanced Encryption Standard), DES (Data Encryption Standard), or the like may be employed.
The embodiments of the present invention relates to a marker for indicating an encrypted area, which makes it possible that an original image before encryption is perfectly or approximately restored by decrypting the encrypted image, eliminating the markers from the decrypted image (for example,
Image Encryption Apparatus in View of Marker Sticking
The input processor 101 takes image data as input data. The image data may be converted from data of an electronic document or from data in an encryption area within an electronic document. Alternatively, the image data may be obtained by scanning a printed matter with an apparatus such as a scanner and an MFP (multifunction printer), or may be image data itself imaged by a digital camera or the like.
The encryptor 102 encrypts image data input by the input processor 101. The encryption method may be, for example, the encryption method discussed in Japanese Laid-open Patent Publication No. 2008-301044 or a known encryption method such as AES and DES.
The marker generator 103 generates markers for indicating the position of the encrypted area 402 encrypted by the encryptor 102.
Before generated markers are stuck to the encrypted image 401, the image saver 104 saves, to a file or a header of an image file, data of marker-covered images, that is, the original image 301 within areas where the generated markers to be stuck. At this time, the coordinates indicating the positions of the marker-covered images (that is, coordinates indicating positions where the markers are stuck) may also be saved to a file or a header of an image file in order to be used in decryption, as illustrated in
Then, the marker sticker 105 sticks the markers 503 to the encrypted image 401.
The marked encrypted image 701 is, for example, electrically stored in a file or printed on a paper by the output processor 106.
Image Decryption Apparatus Having Function for Restoring Image Covered by Marker
The input processor 201 takes encrypted image data as input data. Similar to the case of the first image encryption apparatus 100, the encrypted image data may be converted from data of an electronic document or only a part thereof. Alternately, the image data may be obtained by reading a printed encrypted image with a scanner. For example, the marked encrypted image 701 illustrated in
Next, the marker detector 202 detects the markers and identifies the position of the encrypted area 402.
After the position of the encrypted area is identified, the decryptor 203 performs a decryption process to resolve the encryption.
The image restorer 204 performs a process for restoring the marker-covered images 605. Image data of the marker-covered images 605, which is saved by the image saver 104 of the first image encryption apparatus 100, is stuck to the decrypted image 901 to cover the markers 503 and the original image 301 is restored.
Finally, the output processor 205 outputs the restored original image 301 by, for example, electrically storing in a file or printing.
Image Decryption apparatus for Restoring Approximate Image
As an apparatus for decrypting the marked encrypted image 701 illustrated in
As is apparent from
Image Decryption Apparatus that Switches Image Restoration Method
A third image decryption apparatus has a characteristic in that the restoration method of image is switched, which is different from the first image decryption apparatus 200 and the second image decryption apparatus 1000. The data of the marked encrypted image 701 encrypted by the first image encryption apparatus 100 is saved with the data of the marker-covered images 605. However, when the marked encrypted image 701 is printed or edited, there is a possibility that the marker-covered images 605 are disappeared. Consequently, it is preferable to switch the restoration method as discussed bellow. That is, when the marker-covered images 605 is available, the original image 301 before encryption is obtained by utilizing the marker-covered images 605, and when the marker-covered images 605 is unavailable, the original image 301 is approximately restored.
Marker_1 Capable of Approximate Restoration
In the second image decryption apparatus 1000 and the third image decryption apparatus 1100, the marker-covered images 605 are approximately restored. Accordingly, when there is a possibility of restoring an approximate image, it is preferable for the marker generator 103 of the first image encryption apparatus 100 to generate markers convenient for approximate restoration.
The approximate restoration is performed on the basis of image interpolation.
Marker_2 Capable of Approximate Restoration
A marker generated by the marker generator 103 is preferably a thin line or a small graphic so as to be convenient for approximate restoration. Consequently, there is a case that the marker is not printed with a sufficient accuracy due to severe deterioration of the printed marker. When the marker is disappeared, it becomes difficult to identify the position of the encrypted area, so that image decryption becomes extremely difficult.
Marker_3 Capable of Approximate Restoration
A marker that is further strong against deterioration due to printing or the like may be generated.
Marker-covered images 1605 are cut out from the image 1501 and an image 1601 is resulted as illustrated in
Then, two markers 1703 are stuck to the image 1601 to generate an image 1701, as illustrated in
The marker generator 103 in this example generates a thicker and bigger marker 1803 by shifting and combining pixels and an image 1801 is resulted as illustrated in
As illustrated in
Embodiments for Providing First Image Encryption Apparatus with Personal Computer
The CPU 2001 performs the process of the first image encryption apparatus 100 illustrated in
When a user activates the encryption software, the programs are loaded into the work memory 2002, and the program corresponding to each element of the first image encryption apparatus 100 illustrated in
The user may load data of a printed matter into the work memory 2002 with a scanner/printer 2008 connected via the general-purpose interface 2004, or may load document data stored in the HDD 2006 into the work memory 2002 and perform an encryption process.
While looking a display 2007 connected via a display device interface 2003, the user may select an area for encryption and input a password with a mouse/keyboard 2009 connected via the input device interface 2005.
The encryption result may be printed by the scanner/printer 2008 connected via the general-purpose interface 2004 or may be stored in the HDD 2006.
Embodiment for Providing First, Second, and Third Image Decryption Apparatus with Personal Computer
Contrary to the HDD 2006 of the personal computer 2000, decryption software, in stead of the encryption software, is stored in the HDD 2106.
The CPU 2101 loads the decryption software stored in the HDD 2106 into the work memory 2102 to perform a decryption process.
A user may load data of a printed matter into the work memory 2102 with a scanner/printer 2108 connected via the general-purpose interface 2104, or may load document data stored in the HDD 2106 into the work memory 2102 and perform the decryption process.
When image data to be decrypted is loaded into the work memory 2102, the user may select an area for decryption and input a password with a mouse/keyboard 2109 connected via the input device interface 2105 while looking at a display 2107 connected via the display device interface 2103 to decrypt the data in the encrypted area.
The decrypted image may be printed by the scanner/printer 2108 connected via the general-purpose interface 2104, or may be stored in the HDD 2106.
Operational Flowchart of Personal Computer for Performing as First Image Encryption Apparatus
In operation 2201, image data of an original image 301 is input.
In operation 2202, coordinates of an encryption area specified by a user and an encryption key are loaded, and encryption process is applied on image data of the original image 301 in the encryption area with the encryption key.
In operation 2203, markers 503 are generated.
In operation 2204, data of the marker-covered images 605 are extracted and saved in advance.
In operation 2205, the markers 503 are stuck on the encrypted image 401.
In operation 2206, marked encrypted image 701 is output. The marker-covered images 605 may be stored in an area such as a header or a footer of the output image file.
Operational Flowchart of Personal Computer for Performing as First Image Decryption Apparatus
In operation 2301, image data of a marked encrypted image 701 is input.
In operation 2302, markers are detected and the position of the encrypted area 402 is identified.
In operation 2303, a decryption key is input and a decryption process is applied on image data of the marked encrypted image 701 in the encrypted area 402 with the decryption key.
In operation 2304, the original image 301 is restored by sticking, to marker areas, the marker-covered images 605 stored in a header or a footer of the input image file or a discrete file.
In operation 2305, the restored original image 301 is output.
Operational Flowchart of Personal Computer for Performing as Second Image Decryption Apparatus
In operation 2401, image data of a marked encrypted image 701 is input.
In operation 2402, markers are detected and the position of the encrypted area 402 is identified.
In operation 2403, a decryption key is input and a decryption process is applied on image data of the marked encrypted image 701 in the encrypted area 402 with the decryption key.
In operation 2404, the marker-covered images 605 are approximately restored by erasing markers and interpolating images or performing pixel shift, pixel combination, and image interpolation.
In operation 2405, the approximately restored original image 301 is output.
Operational Flowchart of Personal Computer for Performing as Third Image Decryption Apparatus
In operation 2501, image data of a marked encrypted image 701 is input.
In operation 2502, markers are detected and the position of the encrypted area 402 is identified.
In operation 2503, a decryption key is input and a decryption process is applied on image data of the marked encrypted image 701 in the encrypted area 402 with the decryption key.
In operation 2504, it is checked whether data of the marker-covered images 605 has been saved.
In operation 2505, when the data of the marker-covered images 605 has been saved (“Yes” in operation 2504), the original image 301 is restored by sticking, to marker areas, the marker-covered images 605 stored in a header or a footer of the input image file or a discrete file.
In operation 2506, when the data of the marker-covered images 605 has not been saved (“No” in operation 2504), the marker-covered images 605 are approximately restored by erasing markers and interpolating images or performing pixel shift, pixel combination, and image interpolation.
In operation 2507, the restored or approximately restored original image 301 is output.
Example of Storing Marker-Covered images in Digital Image File
Next, an example of storing marker-covered images in a digital image file will be discussed.
As illustrated in
In order to embed the data of marker-covered images, the bfSize 2912 is focused.
As illustrated in
As illustrated in
At this time, the bfSize 3001 is rewritten to bfSize 3003 with original bfSize 3001+extended size 3004=0x017449AC. Although the manner of embedding varies depending on a data format, embedding the data of marker-covered images into image file in other data format such as JPEG (Joint Photographic Experts Group) or TIFF (Tag Image File Format) is also possible by skillfully operating the header data.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the present invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the present invention. Although the embodiment(s) of the present inventions have been discussed in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the present invention.
Number | Date | Country | Kind |
---|---|---|---|
2008-076129 | Mar 2008 | JP | national |
Number | Name | Date | Kind |
---|---|---|---|
5321749 | Virga | Jun 1994 | A |
5491563 | Pomerantz | Feb 1996 | A |
6118872 | Kashima et al. | Sep 2000 | A |
6839844 | Okano | Jan 2005 | B1 |
20030198403 | Ottesen | Oct 2003 | A1 |
20040135906 | Okada | Jul 2004 | A1 |
20060013479 | Trimeche et al. | Jan 2006 | A1 |
Number | Date | Country |
---|---|---|
2938338 | Jun 1999 | JP |
2004-007100 | Jan 2004 | JP |
2004-222253 | Aug 2004 | JP |
2007-194962 | Aug 2007 | JP |
2008-301044 | Dec 2008 | JP |
WO 2006028103 | Mar 2006 | WO |
Entry |
---|
Liu, “Efficient selective encryption for JPEG 2000 images using private initial table,” Pattern Recognition vol. 39, Issue 8, Aug. 2006, pp. 1509-1517. |
U.S. Appl. No. 12/129,266, filed May 29, 2008, Shohei Nakagata, et al., Fujitsu Limited. |
Japanese Office Action for corresponding Japanese Application 2008-076129; mailed Jan. 10, 2012. |
European Search Report for corresponding European Application 09003030.5-2415; dated Oct. 29, 2009. |
Number | Date | Country | |
---|---|---|---|
20090238361 A1 | Sep 2009 | US |