Abstract:
PROBLEM TO BE SOLVED: To discriminate whether alteration is added to any part of a picture by embedding an electronic watermark to the picture. SOLUTION: Relating to an embedding part 30, DCT blocks of the luminance components Y of a picture are paired two by two, mutually corresponding DCT coefficients are randomly selected from respective DCT blocks included in each pair through the use of a random number, and data are embedded by operating so that a mutual relation between these DCT coefficients may express data in accordance with a prescribed rule. When this picture is altered, the DCT coefficients included in the pair of the altered part is no longer subjected to the rule but express a value different from original data. A sampling part 40 samples data from the picture, estimates data embedded first by majority, discriminates that a pair from which data different from the estimated data is altered, and displays it.
Abstract:
PROBLEM TO BE SOLVED: To provide a service timing adjustment system for timely providing a service to a user. SOLUTION: When the user passes a ticket barrier 71 of a station, a record of passing is sent from a passage information distribution device 70 and stored in a notification service server 40, and a record of the user reaching home is stored in the notification service server 40 also. When an order for a service is sent by using a user terminal 20, it reaches a delivery service server 60 of a delivery company via the notification service sever 40. Thereafter, when the user passes the ticket barrier 71 of the station, the time the user reaches home is calculated on the basis of the records stored by the notification service server 40, and timing of the service can be adjusted.
Abstract:
PROBLEM TO BE SOLVED: To provide technology capable of effectively limiting the viewing of contents. SOLUTION: Contents ID is ciphered and added to contents to be disclosed on a contents writer's terminal 10D, a contents judge's terminal 30D sends a certification including a disclose key for decoding the contents ID to a user's terminal 50D and the user is allowed to decode the contents ID added to the contents and to view the contents only when obtaining the effective certification. The digest value of the contents prepared by the contents writer is included in the contents ID and the user's terminal 50D checks whether the digest value of the received contents is matched with the digest value included in the contents ID or not and the user is allowed to view only the contents having the coincident digest value. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To accurately judge which part of contents data are altered since the time of preparing them by providing a means for sampling data for specifying contents and a means for judging the presence/absence of the alteration of the contents data based on this sampling result. SOLUTION: A picture alteration judging device compress-encodes a picture photographed by a digital camera 140 by a JPEG system, e.g. to accept via a camera IF 104. Otherwise, the device accepts compressed picture data recorded in a memory card 142 by the camera 140 through a memory card IF106. At the time of accepting the compressed picture data, an electronic watermark (embedded data) is embedded to the compressed picture data. Then, through the use of using the character of JPEG data obtained by embedding the embedded data, a sampling part judges and displays whether the JPEG data are altered or not and when it is altered, the part decides and displays which part of the picture data are altered.
Abstract:
PROBLEM TO BE SOLVED: To discriminate to which part of an image is falsified by imbedding an electronic watermark to the image. SOLUTION: An imbedding section 30 selects DCT coefficients corresponding to each other from respective DCT blocks of a luminance component Y of an image two each of them formed in pairs and included in each pair by using a random number and processes the DCT coefficients so that the correlation between them represents data according to prescribed rules and imbeds the data to the image. When this image is falsified, the DCT coefficients included in the pairs of the falsified part bend the rules so as to represent a different value from that of the original data. An extract section 40 extracts the data from the image, estimates the data imbedded at first through majority decision and discriminates that the pairs with the data different from the estimated data extracted from them receive falsification and displays the discriminated result.
Abstract:
The present invention prevents embedded verification information (eg a watermark) from being lost even when a quantization process is performed after verification information has been embedded. A pre-embedding portion 32 converts a image data value so that quantized values not changing by error introduced through the embedding process. A hash value calculator 300 calculates a hash value using image data and key information, and a hash value embedding portion 302 embeds the hash value in the image data. An output format converter 304 quantizes the image data in which the hash value is embedded, and generates JPEG data.
Abstract:
PROBLEM TO BE SOLVED: To provide a technology for rejecting or permitting access from an application program to a resource on the basis of the use environment or situation of an information processing apparatus. SOLUTION: This information processing apparatus is provided with: a detecting part for detecting the change of connecting state or use state of a device connected to the information processing apparatus; a selecting part for selecting resource access conditions to be applied to the information processing apparatus on the basis of the detected connecting state in response to the detection of the change of the connecting state; and a condition storage part for storing the selected resource access conditions. Furthermore, this information processing apparatus is provided with a capturing part for capturing a plurality of function call for resource access issued to an operating system by an application program; a deciding part for deciding the permission of the captured function call; and a control part for rejecting the function call. When the function call is captured, the permission is decided on the basis of the resource access conditions read from the condition storage part, and the function call is rejected in response to the decision of non-permission. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To accurately transmit information to a target person having a plurality of mail addresses or contact destinations. SOLUTION: An electronic mail transmission system is provided with a delivery server 10 for selectively transmitting electronic mail to a transmission target person possessing a plurality of mail addresses. The delivery server 10 predicts the situation of the transmission target person when the electronic mail is transmitted, and ranks the plurality of mail addresses in the order of the high possibility of the reception of the electronic mail by the transmission target person, and transmits the electronic mail according to the ranking. Also, the delivery server 10 reflects which mail address has been used for receiving the message by the transmission target person as the result of the transmission of the electronic mail on the next ranking. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To prevent embedded authentication information from being lost, even if quantizing processing is performed after the authentication information is embedded. SOLUTION: A pre-embedding part 32 converts the value of image data, so that the value after quantizing processing can not be changed by an error added by embedding processing of embedded data. A hash value calculating part 300 calculates a hash value from image data and key information and a hash value embedding part 302 embeds the hash value in the image data. An output format converting part 304 generates JPEG data, by applying quantizing processing or the like to the image data embedded with the hash value.
Abstract:
It is one object of the present invention to prevent embedded verification information from being lost even when a quantization process is performed after verification information has been embedded. A pre-embedding portion 32 converts a image data value so that quantized values not changing by error introduced through the embedding process. A hash value calculator 300 calculates a hash value using image data and key information, and a hash value embedding portion 302 embeds the hash value in the image data. An output format converter 304 quantizes the image data in which the hash value is embedded, and generates JPEG data.