Image encyption device, image decyption device, method, and program

An encryption device and encryption method technology, applied in image communication, encoding/decoding devices, instruments, etc., can solve the problems of increased processing capacity, increased cost of powder and ink, etc., and achieve the effect of safe handover

Inactive Publication Date: 2010-03-24
FUJITSU LTD
View PDF2 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there are practical problems such as an increase in ink costs due to the addition of barcodes, and an increase in the amount of processing for associating encrypted areas with barcodes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encyption device, image decyption device, method, and program
  • Image encyption device, image decyption device, method, and program
  • Image encyption device, image decyption device, method, and program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0160] Hereinafter, embodiments of the present invention will be described with reference to the drawings.

[0161] The present invention relates to an encryption device for encrypting images and a decryption device for decrypting encrypted images. However, these encryption devices and decryption devices may be used in copiers (including multifunction machines), FAXs, printers, scanners, The functions of the present invention can be incorporated into a set-top reader, a mobile phone, a portable terminal, a digital camera, a TV, and the like.

[0162] [Image encryption device]

[0163] The image encryption device of the present invention will be described.

[0164] {The first embodiment of the pixel encryption device of the present invention}

[0165] [structure]

[0166] Figure 5 It is a diagram showing the basics of the first embodiment of the image encryption device of the present invention.

[0167] The image encryption device 100 (first image encryption device), whic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Input data is converted into an image, and in the input image, an encryption region that is a region in which the image is to be encrypted. Meanwhile, on the basis of an encryption key, encryption key-related information that is information related to the encryption key is generated, and the encryption key-related information is embedded into the image in the encryption region, to generate a firstintermediate image. Next, the first intermediate image is converted on the basis of the encryption key, to generate a second intermediate image. Then, the pixel values of the second intermediate image are converted so that the position of the encryption region can be specified. As a result of the conversion, an encrypted image in which the part corresponding to the encryption region in the inputimage is generated.

Description

technical field [0001] The present invention relates to an image encryption and decryption technology for visually encrypting important information such as personal information in printed images or digital images to prevent the important information from being leaked to a third party. Background technique [0002] With the development of social informatization, the leakage of confidential information has become a profound problem, and the importance of technology to prevent information leakage has gradually increased. Regarding this information leakage prevention technology, for example, a technology for encrypting data has been developed such that even if a third party obtains digital data, the content thereof cannot be known. This encryption technology has been utilized as an effective means for preventing information leakage of digital data. [0003] On the other hand, technologies for preventing information leakage of printed matter printed on paper media or the like ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/387H04N1/44
CPCH04N1/32144H04N1/32272G09C5/00H04N1/4486H04N1/387H04N5/913
Inventor 石井英昭阿南泰三仓木健介中澙昌平
Owner FUJITSU LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products