摘要:
It is an object of an identification apparatus of the present invention to realize a face identification in such a way that a system user does not worry that other people take a glance at a user's own face image when the user gets the face image for use in face identification. An identification apparatus of the present invention includes a capturing device 22 for capturing an image, a face template database 254 for storing various images, an alternative image generation controlling portion 251 for specifying a first area, which contains at least a part of a face, out of the image captured by the capturing portion and then replacing the first area of the image captured by the capturing portion with an image stored in the face template database 254, and a displaying device 23 for displaying an image generated by the alternative image generation controlling portion 251.
摘要:
A method for delivering encoded content comprises extracting a holdback from the encoded content, thereby damaging the encoded content. The damaged encoded content is distributed. The holdback is transmitted to enable reintegration of the holdback with the damaged encoded content thereby to restore the encoded content.
摘要:
Image processing apparatus receives an original document on which confidential information is written, and outputs an image upon converting it in a form which allows only a specific person or terminal to read the contents. The original image data read by a reading unit is stored in a memory. Area definition information defining an entry area in the original and encryption key specifying information specifying an encryption key are extracted from a copy-forgery-inhibited pattern from the original image data stored in the memory. The image data in the entry area is encrypted by using the specified encryption key. The image data in the RAM is updated and output by storing the information obtained by encryption as image data in the corresponding entry area in the image data.
摘要:
Methods of encryption and decryption are described which use a key associated with an event to encrypt / decrypt data associated with the event. The method of encryption comprises identifying a key associated with an event and encrypting data using the identified key. The encrypted data is then published along with details of the event.
摘要:
Image processing apparatus receives an original document on which confidential information is written, and outputs an image upon converting it in a form which allows only a specific person or terminal to read the contents. The original image data read by a reading unit is stored in a memory. Area definition information defining an entry area in the original and encryption key specifying information specifying an encryption key are extracted from a copy-forgery-inhibited pattern from the original image data stored in the memory. The image data in the entry area is encrypted by using the specified encryption key. The image data in the RAM is updated and output by storing the information obtained by encryption as image data in the corresponding entry area in the image data.
摘要:
An image protection apparatus includes (a) a set-state determining unit (3) that determines a set state regarding a protection function for an image, and (b) a protection process unit (5) that, when the protection function is determined by the set-state determining unit to be in a valid state, selectively performs lossless coding of a specified image region of an input image, thereby to perform a conversion to a state making it difficult to verify an image in a portion corresponding to the specified image region. Thereby, the conversion can be performed to the state making it difficult the image verification by a third person. In addition, when posterior verification of an image is necessary, the image can be played back to an original image.
摘要:
Even when encoded (compressed) image data appended with an error-detecting code is encrypted, the apparatus which receives and reproduces that image data can execute a normal process without any insignificant re-send request and the like. To this end, encoded image data is input, and first error-detecting encoding information contained in its header is checked to determine whether or not an error-detecting code is appended. If it is determined that the error-detecting code is appended, the first error-detecting encoding information is changed to indicate the absence of an error-detecting code, and is saved as second error-detecting encoding information. Then, the encoded image data is encrypted.
摘要:
Ein Verfahren zur Verschlüsselung von digitalen Bildern (BIL), die aus einzelnen Pixel (PIX, PI1, PI2) aufgebaut sind, wobei auf zumindest ein Pixel (PIX, PI1, PI2) zumindest zwei nicht miteinander kommutierende Operationen (XOR, BDV) angewendet werden, die eine Veränderung von Bitwerten (BIT) des zumindest einen Pixels (PIX, PI1, PI2) zwecks Verschlüsselung bewirken, wobei zu einer Kombination der beiden Operationen (XOR, BDV) eine inverse Operation (INV) existiert, welche die Bitwerte (BIT) eines verschlüsselten Pixels (PV1') in die Bitwerte des ursprünglichen Pixels (PIX, PI1, PI2) überführt.
摘要:
This invention relates generally to a method and apparatus, as implemented by a software program on a computer system, for digitally producing counterfeit-deterring scrambled or coded indicia images, typically in a printed form. This method and system are capable of combining a source image with a latent image so the scrambled latent image is visible only when viewed through a special decoder lens. The digital processing allows different latent images to be encoded according to different parameters. Additionally, latent images might be encoded into single component colors of an original visible image, at various angles from each other.
摘要:
Ein Chiffriergerät (1) verschlüsselt die ursprünglichen Daten und wandelt sie in Signale für ein Ausgabegerät (5), das daraus ein Dokument (6,10) erstellt. Dieses wird einem Sendegerät (12) zugeführt, das die Daten (7) zeilenweise abtastet und das Resultat in Signale wandelt, die über eine Uebertragungsstrecke (14) zu einem Empfangsgerät (13) übertragen werden. Das Empfangsgerät (13) erstellt aus den übertragenen Signalen eine Kopie (15) des Dokuments (6,10), die einem Lesegerät (17) zugeführt wird. Diese wandelt die Daten in Signale für ein Dechiffriergerät (18), das die Daten entschlüsselt und in Signale für ein Ausgabegerät (20) wandelt. Das Ausgabegerät (20) bildet daraus die ursprünglichen Daten nach und stellt sie zur weiteren Verarbeitung bereit. Das Sendegerät (12), das Empfangsgerät (13) und die Uebertragungsstrecke (14) bilden ein Telekopiersystem. Die Verschlüsselung der Daten (7) erfolgt nach einem Code, der gegenüber Uebertragungsfehlern des Telekopiersystems und insbesondere Verzerrungen in Richtung des Zeilenvorschubs unempfindlich ist. Der Code ist vorzugsweise binär mit logischen Werten, die in Helligkeit und/oder Farbe kontrastieren, zum Beispiel ist er ein Balkencode ("bar code") mit parallel zum Zeilenvorschub (8) orientierten Balken (9), und er kann von einer Lesevorrichtung (17) gelesen werden. Vorzugsweise sind Teile des Systems in einer sender- bzw. empfängerseitigen Vorrichtung integriert.