ALTERATION DISCRIMINATING DEVICE AND ITS METHOD

    公开(公告)号:JP2001069343A

    公开(公告)日:2001-03-16

    申请号:JP2000204853

    申请日:2000-07-06

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To discriminate whether alteration is added to any part of a picture by embedding an electronic watermark to the picture. SOLUTION: Relating to an embedding part 30, DCT blocks of the luminance components Y of a picture are paired two by two, mutually corresponding DCT coefficients are randomly selected from respective DCT blocks included in each pair through the use of a random number, and data are embedded by operating so that a mutual relation between these DCT coefficients may express data in accordance with a prescribed rule. When this picture is altered, the DCT coefficients included in the pair of the altered part is no longer subjected to the rule but express a value different from original data. A sampling part 40 samples data from the picture, estimates data embedded first by majority, discriminates that a pair from which data different from the estimated data is altered, and displays it.

    Device, method and program for extracting invisible information
    13.
    发明专利
    Device, method and program for extracting invisible information 有权
    用于提取不可见信息的设备,方法和程序

    公开(公告)号:JP2007164715A

    公开(公告)日:2007-06-28

    申请号:JP2005363767

    申请日:2005-12-16

    CPC classification number: G06K19/06037 G06K7/14 G06K2019/06225

    Abstract: PROBLEM TO BE SOLVED: To extract invisible information even when visible information is overlapped with the invisible information. SOLUTION: The present invention provides a method for extracting the invisible information from an object with the visible information overlapped with at least a part of the invisible information formed by stealth ink and the method includes steps: for irradiating the object with light which makes the stealth ink emit light: for receiving reflected light from the object; for extracting image information from the received reflected light; for dividing the image information into a plurality of pieces of color channel information; for calculating a correlation function among the pieces of color channel information about the respective pixel values constituting the image information about at least two pieces of color channel information selected from the pieces of color channel information; for reducing and interpolating visible information components about one of the selected color channel information using the correlation function and for extracting the invisible information from one piece of interpolated color channel information. COPYRIGHT: (C)2007,JPO&INPIT

    Abstract translation: 要解决的问题:即使可见信息与不可见信息重叠,也可以提取隐形信息。 解决方案:本发明提供一种用于从具有与隐形墨水形成的隐形信息的至少一部分重叠的可见信息的对象提取不可见信息的方法,该方法包括以下步骤:用光照射物体 使隐形墨水发光:用于接收来自物体的反射光; 用于从所接收的反射光中提取图像信息; 用于将图像信息划分成多条彩色通道信息; 用于计算关于构成关于从所述彩色通道信息中选择的至少两条彩色通道信息的图像信息的各个像素值的色彩​​通道信息之间的相关函数; 用于使用相关函数来减少和内插关于所选颜色通道信息之一的可见信息分量,并从一条内插色彩信道信息中提取不可见信息。 版权所有(C)2007,JPO&INPIT

    INFORMATION-EMBEDDING DEVICE, DETECTOR, DATA PROCESSING METHOD, PROGRAM AND STORAGE MEDIUM

    公开(公告)号:JP2002314785A

    公开(公告)日:2002-10-25

    申请号:JP2001109108

    申请日:2001-04-06

    Applicant: IBM

    Inventor: KAMIJO KOICHI

    Abstract: PROBLEM TO BE SOLVED: To provide an information-embedding device that provides immunity to data compression and conversion with respect to attached information-embedded in digital contents. SOLUTION: The information-embedding device sets a state of prescribed attached information after embedding, so that the distribution of feature quantities after embedding the attached information to digital contents obeys a prescribed function, with respect to the feature quantities used for embedding the attached information, in the case of embedding the prescribed attached information to the digital contents, and varies the feature quantities of the digital contents according to the setting contents. If the attached information, the embedded information detector reproduces the distribution of the feature quantities of the digital contents, before application of data conversion on the basis of the distribution of the prescribed feature quantities of the digital contents, when the data conversion is applied to the digital contents to which the attached information is embedded, and detects the attached information embedded in the digital contents, on the basis of the reproduced distribution of the feature quantities in the digital contents, before the application of the data conversion.

    DATA PROCESSING UNIT, IMAGE PROCESSOR AND THEIR METHODS

    公开(公告)号:JP2001313810A

    公开(公告)日:2001-11-09

    申请号:JP2000111674

    申请日:2000-04-13

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To apply imbedding processing to image data or the like by adaptively optimizing imbedding data, denoting attached information such as copyright information depending on contents of the data which is an imbedding object. SOLUTION: An image division section 200 divides image data Vi into image blocks Iij and corresponds them to selection basic patterns Phij. Orthogonal conversion sections 24, 202 generate DFT coefficients I'ij, P'hij, and power component calculation section 208, 264 generate power components I"ij, P"ij. A basic pattern adjustment section 26 adjusts the coefficients P'hij to generate P'hij1-P'hijn. An imbedding pattern generating section 28 calculates a change before and after the P'hij1-P'hijn are imbedded to the I"ij, selects P'''hij1-P'''hij1 which give a change of a threshold εor bower from the P'hij1-P'hijn and selects one imbedding pattern P'ij which is detected most easily. A pattern imbedding section 204 adds the P'ij to the I'ij and imbeds the sum.

    DIGITAL DATA AUTHENTICATION SYSTEM
    18.
    发明专利

    公开(公告)号:JP2000196589A

    公开(公告)日:2000-07-14

    申请号:JP37235598

    申请日:1998-12-28

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To provide a digital data authentication system which can prevent data, although having no secrecy themselves, from being altered or passed off owing to improvement or replacement and give security to the data. SOLUTION: Equipment authentication between an input device and a memory device and between the memory device and a receiver is carried out when digital data is written from the input device 100 to the memory device 200 and transferred from the memory device 200 to the receiver 300. At the same time, when the digital data is written to the memory device 200, the digital data is given an electric signature by an unidirectional hash function and when the digital data read out of the memory device 200 and transferred, the given electric signature is decoded and then transferred after it is confirmed that the digital data is not modified after being recorded. Consequently, the data are prevented from being altered or passed off owing to improvement or replacement although the data themselves have no secrecy, so that the data can be given security.

    Link access control method, program, and system
    20.
    发明专利
    Link access control method, program, and system 审中-公开
    链接访问控制方法,程序和系统

    公开(公告)号:JP2013115522A

    公开(公告)日:2013-06-10

    申请号:JP2011258300

    申请日:2011-11-25

    Abstract: PROBLEM TO BE SOLVED: To provide a method for controlling accesses to other documents by a link inserted in a document without the need for communication between the owners of each content.SOLUTION: A user A as the start point of a link, a user B as an end point of the link, and a user C as a viewer are involved. Each user has a secret key and a public key, the public key being shared among the users. The user B chooses the user C who is a viewer. The user B distributes a proxy type signed code key generated on the basis of the public key of the user C and the secret key of his own to the user A after encrypting it with the public key of the user A. The user A decrypts it with his secret key, so that a function based on the proxy type signed code becomes usable. The user A uses this function to convert link information and signs it with his secret key before sending it to the user C. The user C authenticates the signature by using the public key of the user A and the public key of the user B, retrieves the link information generated by the user A, and decrypts it with his secret key to get the link information.

    Abstract translation: 要解决的问题:提供一种通过插入到文档中的链接来控制对其他文档的访问的方法,而不需要每个内容的所有者之间的通信。 解决方案:涉及作为链接的起点的用户A,作为链接的终点的用户B和作为观众的用户C. 每个用户都有一个秘密密钥和一个公共密钥,公钥在用户之间共享。 用户B选择用户C谁是观众。 在用用户A的公开密钥加密后,用户B将基于用户C的公开密钥生成的代理类型签名代码密钥分发给用户A.用户A将其解密 使用他的密钥,使得基于代理类型签名代码的功能变得可用。 用户A使用该功能在将其发送给用户C之前用其密钥转换链接信息并对其进行签名。用户C通过使用用户A的公开密钥和用户B的公开密钥对签名进行认证, 由用户A生成的链接信息,并用其密钥对其进行解密以获得链接信息。 版权所有(C)2013,JPO&INPIT

Patent Agency Ranking