Abstract:
PROBLEM TO BE SOLVED: To discriminate whether alteration is added to any part of a picture by embedding an electronic watermark to the picture. SOLUTION: Relating to an embedding part 30, DCT blocks of the luminance components Y of a picture are paired two by two, mutually corresponding DCT coefficients are randomly selected from respective DCT blocks included in each pair through the use of a random number, and data are embedded by operating so that a mutual relation between these DCT coefficients may express data in accordance with a prescribed rule. When this picture is altered, the DCT coefficients included in the pair of the altered part is no longer subjected to the rule but express a value different from original data. A sampling part 40 samples data from the picture, estimates data embedded first by majority, discriminates that a pair from which data different from the estimated data is altered, and displays it.
Abstract:
PROBLEM TO BE SOLVED: To provide a display device for displaying an optimum image corresponding to an external environment for a user.SOLUTION: A display device comprises: a reading unit that reads an image pattern on a physical medium; an acquisition unit that acquires a state parameter of an external environment acquired by an environment sensor for sensing an environment around the display device; a shooting unit that shoots the physical medium to generate a captured image; and a display unit that displays a display object which is to be presented to a user and is determined based on the read image pattern with the captured image in an overlapped manner. The display object displayed with the captured image in an overlapped manner changes according to the state parameter of the external environment.
Abstract:
PROBLEM TO BE SOLVED: To extract invisible information even when visible information is overlapped with the invisible information. SOLUTION: The present invention provides a method for extracting the invisible information from an object with the visible information overlapped with at least a part of the invisible information formed by stealth ink and the method includes steps: for irradiating the object with light which makes the stealth ink emit light: for receiving reflected light from the object; for extracting image information from the received reflected light; for dividing the image information into a plurality of pieces of color channel information; for calculating a correlation function among the pieces of color channel information about the respective pixel values constituting the image information about at least two pieces of color channel information selected from the pieces of color channel information; for reducing and interpolating visible information components about one of the selected color channel information using the correlation function and for extracting the invisible information from one piece of interpolated color channel information. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To embed electronic watermarks different for each access in digital contents without increasing the load of a content server as much as possible. SOLUTION: This content server is provided with an electronic watermark embedded content storing part 13 in which a plurality of digital contents embedded with different electronic watermarks are stored and a finger print executing part 14 for reading the plurality of digital contents from the electronic watermark embedded content storing part 13, and for switching and compounding the digital contents for each specific part to add the very beginning information to the digital contents by using a bit string formed by the electronic watermark embedded in every portion of the digital contents. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide an information-embedding device that provides immunity to data compression and conversion with respect to attached information-embedded in digital contents. SOLUTION: The information-embedding device sets a state of prescribed attached information after embedding, so that the distribution of feature quantities after embedding the attached information to digital contents obeys a prescribed function, with respect to the feature quantities used for embedding the attached information, in the case of embedding the prescribed attached information to the digital contents, and varies the feature quantities of the digital contents according to the setting contents. If the attached information, the embedded information detector reproduces the distribution of the feature quantities of the digital contents, before application of data conversion on the basis of the distribution of the prescribed feature quantities of the digital contents, when the data conversion is applied to the digital contents to which the attached information is embedded, and detects the attached information embedded in the digital contents, on the basis of the reproduced distribution of the feature quantities in the digital contents, before the application of the data conversion.
Abstract:
PROBLEM TO BE SOLVED: To apply imbedding processing to image data or the like by adaptively optimizing imbedding data, denoting attached information such as copyright information depending on contents of the data which is an imbedding object. SOLUTION: An image division section 200 divides image data Vi into image blocks Iij and corresponds them to selection basic patterns Phij. Orthogonal conversion sections 24, 202 generate DFT coefficients I'ij, P'hij, and power component calculation section 208, 264 generate power components I"ij, P"ij. A basic pattern adjustment section 26 adjusts the coefficients P'hij to generate P'hij1-P'hijn. An imbedding pattern generating section 28 calculates a change before and after the P'hij1-P'hijn are imbedded to the I"ij, selects P'''hij1-P'''hij1 which give a change of a threshold εor bower from the P'hij1-P'hijn and selects one imbedding pattern P'ij which is detected most easily. A pattern imbedding section 204 adds the P'ij to the I'ij and imbeds the sum.
Abstract:
PROBLEM TO BE SOLVED: To prevent embedded authentication information from being lost, even if quantizing processing is performed after the authentication information is embedded. SOLUTION: A pre-embedding part 32 converts the value of image data, so that the value after quantizing processing can not be changed by an error added by embedding processing of embedded data. A hash value calculating part 300 calculates a hash value from image data and key information and a hash value embedding part 302 embeds the hash value in the image data. An output format converting part 304 generates JPEG data, by applying quantizing processing or the like to the image data embedded with the hash value.
Abstract:
PROBLEM TO BE SOLVED: To provide a digital data authentication system which can prevent data, although having no secrecy themselves, from being altered or passed off owing to improvement or replacement and give security to the data. SOLUTION: Equipment authentication between an input device and a memory device and between the memory device and a receiver is carried out when digital data is written from the input device 100 to the memory device 200 and transferred from the memory device 200 to the receiver 300. At the same time, when the digital data is written to the memory device 200, the digital data is given an electric signature by an unidirectional hash function and when the digital data read out of the memory device 200 and transferred, the given electric signature is decoded and then transferred after it is confirmed that the digital data is not modified after being recorded. Consequently, the data are prevented from being altered or passed off owing to improvement or replacement although the data themselves have no secrecy, so that the data can be given security.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for distributing data in a trackable manner while suppressing an increase in the size of data to be distributed as much as possible and minimizing interruption of usage of the data.SOLUTION: A method for distributing data to multiple clients 515-1 to 515-n from a server 510 includes the steps of: generating a common noise by using noises unique to the multiple clients, respectively; embedding the common noise in the data to be distributed to make the data unusable; and distributing the data containing the embedded common noise, so that the data containing the embedded common noise is made usable by each of the multiple clients using a unique noise provided in the client.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for controlling accesses to other documents by a link inserted in a document without the need for communication between the owners of each content.SOLUTION: A user A as the start point of a link, a user B as an end point of the link, and a user C as a viewer are involved. Each user has a secret key and a public key, the public key being shared among the users. The user B chooses the user C who is a viewer. The user B distributes a proxy type signed code key generated on the basis of the public key of the user C and the secret key of his own to the user A after encrypting it with the public key of the user A. The user A decrypts it with his secret key, so that a function based on the proxy type signed code becomes usable. The user A uses this function to convert link information and signs it with his secret key before sending it to the user C. The user C authenticates the signature by using the public key of the user A and the public key of the user B, retrieves the link information generated by the user A, and decrypts it with his secret key to get the link information.