Verification / authentification of images with pixels derived from capturing and later interpolation processes
    143.
    发明公开
    Verification / authentification of images with pixels derived from capturing and later interpolation processes 审中-公开
    图像,同时包含来自摄像以及稍后插值来获得图像元素的验证/认证

    公开(公告)号:EP2139221A1

    公开(公告)日:2009-12-30

    申请号:EP09163944.3

    申请日:2009-06-26

    Inventor: Hayashi, Junichi

    Abstract: An information processing apparatus (13) inputs image data including a first pixel group, a second pixel group generated by interpolating the first pixel group and verification data of the first pixel group, verifies whether the first pixel group has been altered using the first pixel group and the verification data, verifies whether the second pixel group has been altered by determining whether the second pixel group and the first pixel group are in a predetermined relationship, and determines whether the image data has been altered based on results of the verification as to whether the first pixel group has been altered and the verification as to whether the second pixel group has been altered.

    Abstract translation: 一种信息处理设备(13)输入的图像数据,其包括第一像素组,通过内插第一像素组的第一像素组和验证数据生成的第二像素组,检验是否所述第一像素组已经使用所述第一像素组改变 和验证数据,确认是否所述第二像素组已经由确定性采矿无论所述第二像素组与所述第一像素组是在规定的关系,并且确定性地雷改变是否图像数据已被改变的基础上,验证的结果是否 第一像素组已经被改变和验证关于是否所述第二像素组已经被改变。

    SECURE DISTRIBUTION OF DIGITAL REPRESENTATIONS
    149.
    发明授权
    SECURE DISTRIBUTION OF DIGITAL REPRESENTATIONS 有权
    数字显示安全分发

    公开(公告)号:EP1055321B1

    公开(公告)日:2005-08-03

    申请号:EP99905133.7

    申请日:1999-02-09

    Abstract: Techniques for secure distribution of digital representations that combine encryption and watermarking. When a user at a client desires to download a digital representation, the user makes a request to a server for the digital representation, which encrypts the digital representation using a first key and downloads the encrypted digital representation to the user. Before the user performs any operation on the decrypted digital representation, a secret fingerprint watermark identifying the user is added to the digital representation. The fingerprint watermark is added either at the server or at the client and a copy of the fingerprinted digital representation is kept at the server. If the user makes an impermissible use of the digital representation, the secret fingerprint watermark can be used to identify the user. The request made by the user indicates the type of use that the user whished to make of the digital representation. If the use involves storage of the digital representation at the client, the server provides a second key that the client employs to encrypt the digital representation. If the user has permission to do so, the user may modify the digital representation and return the modified digital representation to the server for further distribution. In this case, the second key is used to encrypt the digital representation when it is sent to the server. The second key also serves as the user identification in the fingerprint watermark. If the user loses the second key, it can be recovered from the copy of the fingerprinted digital representation kept at the server. The first and second keys and any decrypted copy of the digital representation are kept in secure storage in the client.

    Verfahren zum Einbringen manipulationssicherer digitaler Fingerabdrücke in elektronische Dokumente
    150.
    发明公开
    Verfahren zum Einbringen manipulationssicherer digitaler Fingerabdrücke in elektronische Dokumente 有权
    引入防操纵的数字指纹成电子文档的方法

    公开(公告)号:EP0993176A3

    公开(公告)日:2002-07-17

    申请号:EP99114304.1

    申请日:1999-07-21

    Abstract: Die Erfindung bezieht sich auf die möglichst zuverlässige Ermittlung von Käufern oder Gruppen von Käufern, die unerkannt Dokumente weitergeben, also Angreifern, die ihre Fingerabdrücke in elektronischen Dokumenten durch Vergleich der Unterschiede ermitteln und löschen. Um einer größeren Anzahl von Kopien und Zahl von kooperierenden Angreifern Rechnung zu tragen, werden im geometrischen Ordnungssystem die an der Manipulation beteiligten Angreifer eindeutig ermittelt, indem jeder Markierungsstelle im Dokument eindeutig ein Punkt des projektiven Raumes PG(d,q) von Hyperebenen mittels geheimer Funktion zugeordnet wird, jedem Fingerabdruck mindestens zwei Hyperebenen von PG(d,q) zugeordnet werden, von denen jede nur einem Fingerabdruck exklusiv zugeordnet wird, und zu jedem Fingerabdruck genau die Markierungsstellen markiert werden, die den Punkten der ausgewählten Hyperebenen entsprechen. Das erfindungsgemäße Verfahren eignet sich insbesondere für die Kennzeichnung von Kopien von Dokumenten, die dem Copyrightschutz unterliegen.

Patent Agency Ranking