1. Field of the Invention
The present invention relates to an image forming apparatus capable of restricting copying of a document.
2. Description of the Related Art
In offices and the like, a document printed by a printer is often copied by a copying machine. This may, however, cause serious security problems. For example, if copies of a confidential document distributed at a meeting or the like are made, it is likely that these copies will fall into the hands of third parties.
However, even if a copy-protection warning is added to a document as illustrated in
The technique illustrated in
Additionally, there is a need for a copy restriction method which permits copying of a document a limited number of times, instead of totally inhibiting copying.
In response to such a need, there has been proposed a technique in which a “first-generation-copying inhibiting mark” for inhibiting copying of a document or a “second-generation-copying inhibiting mark” for inhibiting copying of a copy of a document is added in advance as image information to the document, which is then output. If the first-generation-copying inhibiting mark is detected when the output document is scanned, the scanned image of the document is removed. On the other hand, if the second-generation-copying inhibiting mark is detected when the output document is scanned, the second-generation-copying inhibiting mark is removed and a first-generation-copying inhibiting mark is newly added to the scanned image, which is then output (e.g., see, Japanese Patent Laid-Open No. 2000-184178).
The invention disclosed in Japanese Patent Laid-Open No. 2000-184178 is effective, as illustrated in FIG. 17, in permitting up to predetermined-generation copying and inhibiting further-generation copying.
The invention disclosed in Japanese Patent Laid-Open No. 2000-184178 is effective when applied to an operating environment, such as an office, where only copying machines with the above-described configuration are used. However, in an operating environment where copying machines which do not have the above-described configuration are also used, it is difficult to ensure information security, since such copying machines do not support the copy restriction function described above.
In other words, the invention disclosed in Japanese Patent Laid-Open No. 2000-184178 is effective in preventing information leaking where only copying machines with the copy restriction function are used, but reduces its practical effects by half in an operating environment where copying machines which do not support the copy restriction function are also used.
The present invention provides an image forming apparatus and method to address the issues described above.
The present invention also provides an image forming apparatus and method that enable effective use of a copy restriction function even in an environment where copying machines with and without the copy restriction function are both used.
The present invention further provides an image forming apparatus and method that enable copy restrictions in an environment where copying machines which support the copy restriction function are present while maintaining a copy-protection effect in an environment where typical copying machines which do not support the copy restriction function are present.
According to an aspect of the present invention, a method for controlling an image forming apparatus includes: reading an original image to which a copy-forgery-inhibited pattern and copy restriction information for restricting a number of times of copying are added, the copy-forgery-inhibited pattern including a latent-image part and background-image part, when the copy-forgery-inhibited pattern is copied, the latent-image part in the copy-forgery-inhibited pattern appears in the copied image; determining the copy restriction information read from the original image; removing the copy-forgery-inhibited pattern from the original image; updating the copy restriction information; and forming, on a sheet, the copy restriction information with the image from which the copy-forgery-inhibited pattern has been removed from the original image.
Further features of the present invention will become apparent from the following description of exemplary embodiments with reference to the attached drawings.
Exemplary embodiments of the present invention will now be described with reference to the drawings.
A scanner (scanning device) 111 scans an image of a document G. A printer (image forming device) 112 forms an image on a recording sheet. The document G is placed on an original plate 113. An optical system 109 for scanning the document G includes a lamp for illuminating the document G, a short focus lens array, and a charge-coupled device (CCD) sensor or contact image sensor (CIS) serving as a scanning element. By scanning while illuminating the document G with the lamp, a light beam reflected off the surface of the document G is focused by the short focus lens array and is incident on the CCD sensor.
The CCD sensor includes a CCD photo detector (not shown), a transmitting unit (not shown), and an output unit (not shown). A light signal is converted by the CCD photo detector into a charge signal and sequentially transmitted by the transmitting unit to the output unit in synchronization with clock pulses. The output unit converts the charge signal into a voltage signal, amplifies the voltage signal, reduces its impedance, and outputs the signal. The resulting analog signal is subjected to known image processing, converted into a digital signal, and transmitted to the printer 112.
When a start key (not shown) of an operation unit is pressed, a photosensitive drum 104 is charged by a charger 108 to a predetermined potential. In a laser exposure unit 110 of the printer 112, a solid laser element emits light L on the basis of the digital signal described above. The emitted light L scans the surface of the photosensitive drum 104 through a rotatable polygon mirror rotating at a high speed. This allows an electrostatic latent image corresponding to the document image to be formed on the surface of the photosensitive drum 104. This electrostatic latent image is developed by a developing unit 103 into a toner image on the surface of the photosensitive drum 104. The developing unit 103 stores a so-called two-component toner composed of toner particles and carrier particles. The toner image formed on the surface of the photosensitive drum 104 is transferred by a transfer unit 105 onto a transfer member 106, which is then separated from the photosensitive drum 104 and conveyed to a fixing unit 107. The transfer member 106 is subjected to thermal fixing in the fixing unit 107 and discharged.
A control unit 201 controls the overall operation of the image forming apparatus. An operation unit 202 is used for making various settings and displaying information. An interface (I/F) 203 communicates with other devices connected to a network. A printer driver 211 performs processing for printing on a personal computer (PC) connected to the network. A decoding unit 204 decodes a code mark (described below) added to a document (or original). An image memory 205 stores images received by the interface 203 and images scanned by the scanner 111. A filtering unit 206 performs various types of image processing, including copy-forgery-inhibited-pattern removal processing (described below), on image data. A copy-forgery-inhibited-pattern generating unit 207 generates an image of a copy-forgery-inhibited pattern to be added to a print image. A copy-forgery-inhibited-pattern synthesizing unit 208 synthesizes a generated copy-forgery-inhibited pattern as a pattern to be added with an image to be printed. An encoding unit 209 encodes copy restriction information (described below) into a code mark, such as a barcode. A code synthesizing unit 210 synthesizes a code mark with an image to be printed.
Next, a method for adding a typical copy-forgery-inhibited pattern to an image formed on the transfer member 106 will be described.
Data of a document created on the PC is transmitted through the printer driver 211 and stored in the image memory 205. If the user specifies that a copy-forgery-inhibited pattern be added, the printer driver 211 transmits copy-forgery-inhibited-pattern addition information to the copy-forgery-inhibited-pattern generating unit 207. Then, the copy-forgery-inhibited-pattern synthesizing unit 208 adds an image of a generated copy-forgery-inhibited pattern to an image read from the image memory 205 and transmits the resulting image data to the printer 112.
Next, a process of copying a document image will be described.
A document image scanned by the scanner 111 is stored in the image memory 205, subjected to image processing, such as edge enhancement, masking, or the like by the filtering unit 206, and transmitted to the printer 112.
A composition of a copy-forgery-inhibited pattern will be described with reference to
The size and arrangement of pixels in the background and latent image in the copy-forgery-inhibited pattern described above are determined according to the image reproduction capability of the scanner 111 or printer 112.
In the present exemplary embodiment, patterns in the copy-forgery-inhibited pattern are different from a pattern for halftone representation (e.g., dithering) of an image formed before addition of the copy-forgery-inhibited pattern. That is, the patterns of the background and latent image are designed specifically for the copy-forgery-inhibited pattern.
Next, a process of printing a copy-forgery-inhibited pattern will be described with reference to the flowchart of
A document created on the PC or the like is converted through the printer driver 211 into data for printing and is stored in the image memory 205.
Referring to
The encoding unit 209 will now be described in detail. In the encoding unit 209, the information as to whether to place copy restrictions and the permissible number of times of copying “n” are encoded and converted into a mark (i.e., code mark) (step S1002). Examples of this code mark include a one-dimensional barcode widely used for general purposes and a two-dimensional barcode having been widespread in recent years. Information to be encoded may include not only the setting of copy restrictions and the permissible number of times of copying, but also the name and affiliate of a person (preparer) who prepared a document to be output, a device number of a printer from which the document is to be output, and the date and time of output (or printing). As the number of items of information to be encoded increases, protection against leakage of confidential information is enhanced.
Referring back to
Next, a copy-forgery-inhibited pattern generated by the copy-forgery-inhibited-pattern generating unit 207 is added by the copy-forgery-inhibited-pattern synthesizing unit 208 to the image output from the code synthesizing unit 210 (step S1004). Then, the image having the copy-forgery-inhibited pattern is transmitted to the printer 112 and recorded on the sheet (step S1005).
The above-described processing performed by the printer driver 211 is performed by a computer-executable program. This program can be installed on a computer from a storage medium, such as a compact disk read only memory (CD-ROM), or can be downloaded from the Internet and installed on a computer.
The code mark and copy-forgery-inhibited pattern may be added to a document scanned by the scanner 111, instead of being added to a document created on the PC. In this case, before scanning the document, a mode for adding copy restriction information to the document is set through the operation unit 202. At the same time, settings similar to those specified on the above-described screen of the printer driver 211 are made.
Next, there will be described a process of making a copy of a document created according to the above-described configuration and provided with copy restriction information.
A document image scanned by the scanner 111 is transmitted to the decoding unit 204 while being stored in the image memory 205. The decoding unit 204 detects whether the scanned document image includes a code mark. If a code mark is detected, the decoding unit 204 reads the copy restriction information contained in the code mark and outputs the read copy restriction information to the control unit 201. According to the read information about the permissible number of times of copying, the control unit 201 modifies a digital filter to be used in the filtering unit 206 and updates the permissible number of times of copying. Next, the document image data is subjected to digital filtering in the filtering unit 206, synthesized with the code mark in the code synthesizing unit 210, given a copy-forgery-inhibited pattern in the copy-forgery-inhibited-pattern synthesizing unit 208, and transmitted to the printer 112. Then, an image containing the code mark and copy-forgery-inhibited pattern is recorded on a sheet.
Next, this copy operation will be described in detail with reference to the flowchart of
When the user makes a copy of a document on which a code mark formed by encoding information about the permissible number of times of copying is printed, the control unit 201 causes in step S1401 the scanner 111 to scan the document to be copied. In step S1402, the control unit 201 determines whether the code mark has been detected. If the code mark has not been detected (NO in step S1402), the process proceeds to step S1410, where the document is copied as a normal document. If it is determined that the code mark has been detected (YES in step S1402), the process proceeds to step S1403, where the control unit 201 causes the decoding unit 204 to decode the code mark printed on the document and obtains the permissible number of times of copying “n” included in the decoded information. The process proceeds to step S1404, where the control unit 201 determines whether the permissible number of times of copying “n” is greater than 0. If n>0 (YES in step S1404), it is determined that the copy operation to be performed is within the maximum number of times of copying permitted for the document. The process then proceeds to step S1405, where the control unit 201 causes the filtering unit 206 to remove the copy-forgery-inhibited pattern using a digital filter.
A digital filter will be described in detail here. A digital filter is typically capable of removing or extracting specific frequency components from image signals, thus sharpening or smoothing images. For application to a copy-forgery-inhibited pattern, a digital filter is configured typically such that when digital filtering is applied to a copy-forgery-inhibited pattern so as to create a large difference between the amplification factor of a background and that of a latent image, the background disappears and only the latent image remains. In the present exemplary embodiment, as described above, the background and latent image of the copy-forgery-inhibited pattern printed on the original document have patterns having predetermined coefficients and designed specifically for use in the copy-forgery-inhibited pattern. Based on this characteristic, the digital filter is configured such that when the permissible number of times of copying is greater than zero (n>0), a frequency and amplification factor are set to values that allow both the background and latent image to be smoothed out. Thus, the copy-forgery-inhibited pattern in which there is no difference between the background and latent image is made less noticeable by performing downstream image adjustment, such as density adjustment or ground dispersion. In other words, the copy-forgery-inhibited pattern is removed. Therefore, when copying is permitted, a copy-forgery-inhibited pattern is not highlighted in the resulting copy.
Referring back to
If it is determined in step S1404 that the permissible number of times of copying read from the code mark is zero (n=0, i.e., No in step S1404), the control unit 201 determines that further copying is not permitted. In step S1411, the control unit 201 inhibits copying (i.e., copying is not performed) and displays a warning screen to inform the operator that copying is not allowed.
When it is determined in step S1404 that the permissible number of times of copying is zero (n=0), the control unit 201 may allow copying instead of inhibiting it. That is, if NO in step S1404, the process may proceed to step S1409. In this case, the copy-forgery-inhibited pattern stands out in the copied image, which reveals that a copy-protected document has been copied.
Next, there will be described a case in which a document with a code mark is to be copied by a copying machine which does not support the above-described copy restriction function (e.g., by an old-type machine or a copying machine from a different manufacturer). Since such a copying machine is not capable of detecting a code mark, even if the permissible number of times of copying is greater than zero (n>0), the document is copied as usual. Therefore, a latent image of a copy-forgery-inhibited pattern contained in the document is made visible, which reveals that the resulting copy is a copy of a copy-protected document. This can warn the operator that the document is copy restricted.
As described above, when a document created on a PC or the like is to be output, the setting of copy restrictions and the permissible number of times of copying are specified and added to the document. A function (such as a copy-forgery-inhibited pattern or watermark function) having a copy-protection effect is also added to the document, which is then output. When the output document is to be copied, it is possible to determine whether copying is permitted and to restrict copying, according to the added information about the permissible number of times of copying. Even when a copying machine which does not support the copy restriction function is used, it is possible to achieve copy protection with a copy-forgery-inhibited pattern or watermark having a copy-protection effect. Thus, not only in a limited operating environment but also in various operating environments, it is possible to provide flexible copy protection and thus to prevent the spread of confidential information.
In the exemplary embodiment described above, the setting of copy restrictions and the permissible number of times of copying that are specified when a created document is to be output cannot be changed later, even by a person who prepared the document. Therefore, if it becomes necessary to distribute copies to additional people or the original is lost later, it may not be easy to deal with the situation.
Another exemplary embodiment is configured such that if it is recognized that the user is the preparer of a document or an authorized user, the specified setting of copy restrictions or the permissible number of times of copying can be changed when the document is to be copied.
A configuration of the exemplary embodiment will now be described in detail.
As in the case of the above-described exemplary embodiment, when a document is to be output, the preparer of the document can place copy restrictions, specify the permissible number of times of copying, and set a password through the printer driver 211 on the PC.
Processes in steps S1601 to S1603 of the present exemplary embodiment are the same as those in steps S1401 to S1403 of
In step S1603, a code mark printed on a document is detected. The control unit 201 causes the decoding unit 204 to decode the detected code mark to obtain information about the permissible number of times of copying “n” and the password set when the document was created, and stores the obtained information in a random-access memory (RAM) of the control unit 201.
Next, in step S1604, the control unit 201 determines whether the setting of copy restrictions and the permissible number of times of copying are to be changed. If they are not to be changed (NO in step S1604), processing proceeds to step S1605. On the other hand, if they are to be changed (YES in step S1604), processes in steps S1612 to S1614 are performed.
Specifically, as illustrated in
Processes in step S1605 and its subsequent steps of
If it is determined in step S1605 of
In the foregoing description, a preparer of a document sets a password when creating a document. Then, when a copy of the created document is to be made, copy restriction information can be changed by entering the password. However, a key for permitting the change of copy restriction information may not necessarily be a password. For example, the key may be a user ID or affiliation code for the preparer of the document. If a plurality of users are to be given authority to change the copy restriction information, it is desirable that a key which is common to a plurality of users be used. An example of such a key is an affiliation code.
With the configuration of the present exemplary embodiment described above, by including a key (such as a password) for changing the settings of copy restrictions in a code mark when a document is created, an authorized user can change the settings of copy restrictions when making a copy of the document. Thus, it is possible to provide flexible copy protection in various operating environments and to prevent the spread of confidential information.
While the present invention has been described with reference to exemplary embodiments, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. The scope of the following claims is to be accorded the broadest interpretation so as to encompass all modifications, equivalent structures and functions.
This application claims the benefit of Japanese Application No. 2006-174141 filed Jun. 23, 2006, which is hereby incorporated by reference herein in its entirety.
Number | Date | Country | Kind |
---|---|---|---|
2006-174141 | Jun 2006 | JP | national |
Number | Name | Date | Kind |
---|---|---|---|
20030179399 | Matsunoshita | Sep 2003 | A1 |
20050135856 | Uchida et al. | Jun 2005 | A1 |
20060279785 | Onishi et al. | Dec 2006 | A1 |
Number | Date | Country |
---|---|---|
2000-184178 | Jun 2000 | JP |
Entry |
---|
English translation, JP2000-184178, Jun. 30, 2000. |
Number | Date | Country | |
---|---|---|---|
20080018942 A1 | Jan 2008 | US |