WO2021200092A1 - 撮像装置、情報処理装置、情報処理方法、およびプログラム - Google Patents
撮像装置、情報処理装置、情報処理方法、およびプログラム Download PDFInfo
- Publication number
- WO2021200092A1 WO2021200092A1 PCT/JP2021/010490 JP2021010490W WO2021200092A1 WO 2021200092 A1 WO2021200092 A1 WO 2021200092A1 JP 2021010490 W JP2021010490 W JP 2021010490W WO 2021200092 A1 WO2021200092 A1 WO 2021200092A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- captured image
- hash value
- unit
- image
- partial
- Prior art date
Links
- 238000003384 imaging method Methods 0.000 title claims abstract description 112
- 230000010365 information processing Effects 0.000 title claims abstract description 29
- 238000003672 processing method Methods 0.000 title claims abstract description 15
- 238000000605 extraction Methods 0.000 claims description 26
- 230000006870 function Effects 0.000 claims description 22
- 238000010191 image analysis Methods 0.000 claims description 17
- 239000000284 extract Substances 0.000 claims description 13
- 238000012545 processing Methods 0.000 abstract description 44
- 238000000034 method Methods 0.000 description 105
- 238000012795 verification Methods 0.000 description 61
- 238000005516 engineering process Methods 0.000 description 26
- 238000010586 diagram Methods 0.000 description 14
- 238000004891 communication Methods 0.000 description 11
- 238000013075 data extraction Methods 0.000 description 10
- 238000001514 detection method Methods 0.000 description 10
- 230000005540 biological transmission Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008707 rearrangement Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000003796 beauty Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 244000144972 livestock Species 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000002194 synthesizing effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/92—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
- H04N5/9201—Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving the multiplexing of an additional signal and the video signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T3/00—Geometric image transformations in the plane of the image
- G06T3/40—Scaling of whole images or parts thereof, e.g. expanding or contracting
- G06T3/4023—Scaling of whole images or parts thereof, e.g. expanding or contracting based on decimating pixels or lines of pixels; based on inserting pixels or lines of pixels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/20—Image preprocessing
- G06V10/25—Determination of region of interest [ROI] or a volume of interest [VOI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/765—Interface circuits between an apparatus for recording and another apparatus
- H04N5/77—Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
Definitions
- the present disclosure relates to an image pickup device, an information processing device, an information processing method, and a program, and more particularly to an image pickup device, an information processing device, an information processing method, and a program capable of suppressing an increase in load.
- This disclosure makes it possible to suppress an increase in load due to such association of electronic signatures.
- the image pickup device on one aspect of the present technology is an image pickup device provided with a linking portion for associating a hash value of a part of the captured image and the partial identification information for specifying the part with the captured image.
- the information processing method of one aspect of the present technology is an information processing method in which a hash value of a part of a captured image and partial identification information for specifying the part is linked to the captured image.
- the program of one aspect of the present technology is a program that functions as a linking portion that associates a hash value of a part of the captured image and the partial identification information for specifying the part with the captured image.
- the information processing device of another aspect of the present technology is based on the partial identification information associated with the captured image together with a hash value of a part of the captured image and the partial identification information for specifying the partial.
- An extraction unit that extracts the part from the captured image, a hash value generation unit that generates a hash value of the part extracted by the extraction unit, and the part specific information, and the hash value generation unit that generates the hash value.
- the information processing method of another aspect of the present technology is based on the partial identification information associated with the captured image together with a hash value of a part of the captured image and the partial identification information for specifying the partial.
- the part is extracted from the captured image, a hash value of the extracted part and the part specific information is generated, and the generated hash value is compared with the hash value associated with the captured image. It is an information processing method.
- a program of another aspect of the present technology makes a computer based on the partial identification information associated with the captured image together with a hash value of a portion of the captured image and the partial identification information for identifying the partial. It was generated by an extraction unit that extracts the part from the captured image, a hash value generation unit that generates a hash value of the part extracted by the extraction unit, and the part specific information, and a hash value generation unit.
- This is a program that functions as a comparison unit that compares the hash value with the hash value associated with the captured image.
- a hash value of a part of the captured image and the partial identification information for specifying the part is associated with the captured image.
- the hash value of a part of the captured image and the partial identification information for specifying the part thereof is associated with the captured image. Based on the partial identification information, a part thereof is extracted from the captured image, a hash value of the extracted part and the partial identification information is generated, and the generated hash value is associated with the captured image. The hash value is compared.
- Hash generation of partial image> ⁇ Hash generation>
- Patent Document 1 describes a method of generating a hash of the entire captured image in a digital camera or the like and associating an electronic signature using the hash with the captured image to detect falsification.
- information on the imaging device can also be included in this electronic signature.
- the amount of captured image data has tended to increase with the improvement of information processing technology.
- the load of the process of generating the hash of the entire captured image tends to increase. Therefore, the processing time for generating the electronic signature increases, and especially when a plurality of captured images are generated in a short period of time such as in the continuous shooting imaging mode and the moving image imaging mode, the electronic signature generation processing may not be in time. was there.
- a hash of a part of the captured image is generated and used for tampering detection. By doing so, it is possible to suppress an increase in the amount of data of the target (image) for which the hash is generated, so that it is possible to suppress an increase in the load related to the generation of the electronic signature.
- a hash value of a part of the captured image and the partial identification information for specifying the part is linked to the captured image.
- the part that generates this hash may be any part of the captured image.
- a more important part of the captured image may be a part thereof. That is, by identifying an important part of the captured image, extracting the specified part from the captured image, generating a hash of the extracted image, and using the hash for generating an electronic signature, an increase in load is suppressed. However, the authenticity of an important part of the captured image can be guaranteed.
- the criteria for making this captured image an important part are arbitrary.
- a portion of the captured image that is in focus on the subject (also referred to as an in-focus portion) may be an important part of this.
- the in-focus part is specified using the focus information (for example, depth data consisting of a depth map, distance measurement information, etc.) indicating the focal position of the captured image, and the specified in-focus part is extracted to generate a hash. You may try to do it. By doing so, it is possible to guarantee the authenticity of the focused portion of the captured image while suppressing the increase in load.
- a partial region at a predetermined position of the captured image may be an important part of this.
- a partial region at a position where an important subject is likely to be present may be an important part of this.
- a partial region near the center of the captured image may be an important part of this.
- the partial regions near the four corners of the captured image may be an important part thereof.
- a partial region randomly selected from a plurality of partial regions at different positions such as the vicinity of the center of the captured image and the vicinity of the four corners may be used as an important part thereof.
- a portion of the captured image in which some pixels are thinned out may be used as this important part.
- an image obtained by thinning out arbitrary pixels at a predetermined ratio from the captured image may be an important part thereof.
- an image obtained by thinning out the pixels of a captured image having a 4K resolution to obtain an HD resolution may be an important part thereof.
- an image obtained by thinning out an arbitrary pixel string (or pixel row) of the captured image at a predetermined ratio may be used as an important part thereof.
- the captured image may be image-analyzed to identify an important part.
- the captured image may be image-analyzed to identify a portion where an important subject exists, and the identified portion may be extracted as an important portion to generate a hash.
- a subject person
- a region of the captured image in which the person exists may be an important part.
- the subject to be detected is arbitrary and is not limited to a person.
- the subject to be detected may be the face of a person or a part other than the face. It may also be an animal or a plant. Further, it may be an inorganic substance such as a building. By doing so, it is possible to guarantee the authenticity of the portion of the captured image in which an important subject is captured, while suppressing the increase in load.
- the hash value of a part of the captured image and the partial identification information for specifying the part of the captured image may be associated with the captured image only for the I frame of the moving image.
- the captured image is a moving image
- the captured image is only for a frame in which the moving image moves rapidly (for example, a frame in which the movement between frames (from the previous frame) is larger than a predetermined threshold value (higher than the threshold value)).
- the hash value of a part of the image and the partial identification information for specifying the part may be associated with the captured image.
- the imaging mode is the continuous shooting mode
- the hash value of a part of the captured image and the partial identification information for specifying the part is associated with the captured image
- the imaging mode is not the continuous shooting mode
- the hash value of the entire captured image is captured. It may be associated with an image.
- a hash value may be generated by using a part of the captured image and the partial identification information for specifying the part. Further, the generated hash value may be associated with the captured image. Further, an electronic signature including a hash value may be generated, and the generated electronic signature may be associated with the captured image.
- the metadata of the captured image may be updated by using the partial identification information for specifying a part, and the updated metadata may be associated with the captured image.
- the public key used for generating the electronic signature and the certificate of the public key may be associated with the captured image.
- a part thereof is extracted from the captured image and extracted.
- a hash value of the generated part and the part-specific information may be generated, and the generated hash value may be compared with the hash value associated with the captured image.
- FIG. 1 is a diagram showing a main configuration example of a falsification detection system, which is an embodiment of an information processing system to which the present technology is applied.
- the falsification detection system 100 shown in FIG. 1 is a system that detects falsification of a captured image or the like.
- the falsification detection system 100 includes, for example, an image pickup device 101, a verification device 102, and a certificate authority 103.
- the image pickup device 101, the verification device 102, and the certificate authority 103 constituting the falsification detection system 100 are shown.
- the number of is arbitrary. For example, there may be a plurality of image pickup devices 101, verification devices 102, and certificate authority 103.
- the image pickup device 101, the verification device 102, and the certificate authority 103 are connected to each other so as to be able to communicate with each other via, for example, a network (not shown).
- the imaging device 101 performs processing related to imaging of a subject (generation of captured image), generation of a hash of the captured image, generation of a signature associated with the captured image, and the like. Further, the imaging device 101 applies to the certificate authority 103 for issuance of a certificate, causes the certificate authority 103 to issue the certificate, and obtains the certificate. Further, the image pickup device 101 can send the captured image (photograph), its metadata, and the like to the verification device 102.
- the verification device 102 performs processing related to detection of falsification of the captured image generated by the image pickup device 101. For example, the verification device 102 can acquire a captured image (photograph) supplied from the imaging device 101 and its metadata. Further, the verification device 102 can verify the electronic signature.
- the certificate authority 103 can issue a certificate for the captured image.
- the certificate authority 103 can distribute the certificate of the certificate authority and the certificate revocation list to the verification device 102.
- the verification device 102 can verify the certificate used by the imaging device 101 based on the certificate of the certificate authority and the certificate revocation list.
- association of data means “association” between data.
- the term “associate” means, for example, to make the other data available (linkable) when processing one data. That is, the data associated with each other may be combined as one data or may be individual data. For example, a plurality of information associated with each other may be transmitted on different transmission lines.
- a plurality of information associated with each other may be recorded on different recording media (or different recording areas of the same recording medium).
- this "association" may be a part of the data, not the entire data.
- an image and information corresponding to the image may be associated with each other in an arbitrary unit such as a plurality of frames, one frame, or a part within the frame.
- linking for example, “synthesizing”, “multiplexing”, “adding”, “unifying”, “include”, “store”, etc.
- Terms such as “insert”, “insert”, and “insert” mean to combine a plurality of objects into one, and mean one method of "associating" described above.
- FIG. 2 is a diagram showing an example of data supplied from the imaging device 101 to the verification device 102.
- the captured image 111 is associated with information such as metadata 112, a digital signature 113, and a certificate / public key 114.
- the metadata 112 includes information such as a camera serial number, a photographer, a shooting time, a focal length, an aperture value, a shutter speed, and a shooting location. Further, the metadata 112 also includes extraction area information.
- FIG. 3 is a diagram showing a main configuration example of an image pickup apparatus 101, which is an embodiment of an information processing apparatus to which the present technology is applied.
- the imaging device 101 shown in FIG. 3 is a computer that installs and executes an application program (software) that performs processing related to imaging (generation of captured images), generation of electronic signatures, and the like.
- the computer includes a computer embedded in dedicated hardware, a general-purpose personal computer capable of executing various functions by installing various programs, and the like. That is, the image pickup apparatus 101 executes a process related to imaging (generation of a captured image), generation of an electronic signature, and the like by executing an application program.
- the CPU Central Processing Unit
- the ROM Read Only Memory
- the RAM Random Access Memory
- the input / output interface 210 is also connected to the bus 204.
- An input unit 211, an output unit 212, a storage unit 213, a communication unit 214, and a drive 215 are connected to the input / output interface 210.
- the input unit 211 includes, for example, a keyboard, a mouse, a microphone, a touch panel, an input terminal, and the like.
- the output unit 212 includes, for example, a display, a speaker, an output terminal, and the like.
- the storage unit 213 is composed of, for example, a hard disk, a RAM disk, a non-volatile memory, or the like.
- the communication unit 214 includes, for example, a network interface.
- the drive 215 drives a removable recording medium 221 such as a magnetic disk, an optical disk, a magneto-optical disk, or a semiconductor memory.
- an image pickup unit 231 and a sensor 232 are further connected to the input / output interface 210.
- the imaging unit 231 has, for example, an optical system such as a lens and an aperture and an image sensor, images a subject, and generates an captured image.
- the image pickup unit 231 may further have a configuration other than the above, such as an image processing unit that performs image processing on the generated captured image and a memory that stores the data of the captured image.
- the sensor 232 has, for example, a distance measuring sensor or the like, and measures the distance to the subject.
- the sensor 232 may generate a depth map or the like.
- the CPU 201 loads, for example, the application program stored in the storage unit 213 into the RAM 203 via the input / output interface 210 and the bus 204, and executes the application program.
- the series of processes described above is performed.
- the RAM 203 also appropriately stores data and the like necessary for the CPU 201 to execute various processes.
- the application program executed by the image pickup apparatus 101 can be recorded and applied to, for example, a removable recording medium 221 as a package medium or the like.
- the application program can be installed in the storage unit 213 via the input / output interface 210 by mounting the removable recording medium 221 in the drive 215.
- This application program can also be provided via a wired or wireless transmission medium such as a local area network, the Internet, or digital satellite broadcasting. In that case, this application program can be received by the communication unit 214 and installed in the storage unit 213.
- this application program can be installed in advance in ROM 202 or storage unit 213.
- FIG. 4 shows a function realized by executing an application program in the image pickup apparatus 101 as a functional block.
- the imaging device 101 executes an application program to execute an imaging control unit 251, a partial data extraction unit 252, a metadata update unit 253, a hash generation unit 254, an electronic signature generation unit 255, and a string. It can have an attachment unit 256 and an output control unit 257.
- the imaging control unit 251 controls the imaging unit 231 to execute processing related to imaging.
- the partial data extraction unit 252 performs processing related to extraction of partial data of the captured image (data of the partial image of the captured image).
- the metadata update unit 253 performs processing related to updating information of metadata associated with the captured image.
- the hash generation unit 254 performs a process related to hash generation.
- the electronic signature generation unit 255 performs a process related to the generation of the electronic signature.
- the linking unit 256 performs processing related to linking the captured image and other data.
- the output control unit 257 performs processing related to data output control.
- the imaging control unit 251 controls the imaging unit 231 to image the subject in step S101 and generate the captured image. Further, the image pickup control unit 251 controls the sensor 232 to measure the distance to the subject and generate focus information (depth data). Then, the image pickup control unit 251 acquires the generated captured image and focus information.
- step S102 the partial data extraction unit 252 extracts the focused portion of the captured image also acquired based on the focus information acquired in step S101.
- the metadata update unit 253 includes the extraction area information indicating the area extracted in step S102 (that is, partial identification for specifying a part of the captured image) in the metadata. That is, as shown in B of FIG. 2, "extraction area information" is added to the metadata 112. Then, the metadata updated in this way is added to the partial image (focused portion) of the captured image. That is, the metadata and the partial image are associated (associated).
- step S104 the hash generation unit 254 generates a hash of data in which the partial image extracted in step S102 and the metadata updated in step S103 are combined. That is, a hash of the partial images associated with each other and the metadata is generated.
- step S105 the electronic signature generation unit 255 encrypts the hash (hash of the partial image associated with each other and the metadata) generated in step S104 with the private key to generate the electronic signature.
- step S106 the linking unit 256 is used for the captured image acquired in step S101, the metadata updated in step S103, the electronic signature generated in step S105, the certificate, and the private key used in step S105. Associate (associate) the corresponding public keys with each other.
- step S107 the output control unit 257 outputs the captured image, metadata, electronic signature, certificate, and public key associated with each other by the process of step S106.
- step S107 When the process of step S107 is completed, the imaging process is completed.
- the imaging process By performing the imaging process as described above, it is possible to generate an electronic signature using a part of the captured image. That is, a hash value of a part of the captured image and the partial identification information for specifying the part can be associated with the captured image. Therefore, an increase in load can be suppressed.
- a part of the captured image is specified based on the focus information and a hash thereof is generated, but the method of specifying this part is arbitrary and is not limited to the example of the focus information.
- a partial image at a predetermined position of the captured image may be regarded as this "part”.
- the image obtained by thinning out a part of the pixels of the captured image may be regarded as this "part”.
- FIG. 6 is a diagram showing a main configuration example of the verification device 102, which is an embodiment of the information processing device to which the present technology is applied.
- the verification device shown in FIG. 6 is a computer that installs and executes an application program (software) that performs processing related to verification of a digital signature.
- the computer includes a computer embedded in dedicated hardware, a general-purpose personal computer capable of executing various functions by installing various programs, and the like.
- the verification device 102 performs a process related to the verification of the electronic signature by executing the application program.
- the CPU 301, ROM 302, and RAM 303 are connected to each other via the bus 304.
- the input / output interface 310 is also connected to the bus 304.
- An input unit 311, an output unit 312, a storage unit 313, a communication unit 314, and a drive 315 are connected to the input / output interface 310.
- the input unit 311 includes, for example, a keyboard, a mouse, a microphone, a touch panel, an input terminal, and the like.
- the output unit 312 includes, for example, a display, a speaker, an output terminal, and the like.
- the storage unit 313 is composed of, for example, a hard disk, a RAM disk, a non-volatile memory, or the like.
- the communication unit 314 is composed of, for example, a network interface.
- the drive 315 drives a removable recording medium 321 such as a magnetic disk, an optical disk, a magneto-optical disk, or a semiconductor memory.
- the CPU 301 loads and executes the application program stored in the storage unit 313 into the RAM 303 via the input / output interface 310 and the bus 304, for example.
- the series of processes described above is performed.
- the RAM 303 also appropriately stores data and the like necessary for the CPU 301 to execute various processes.
- the application program executed by the verification device 102 can be recorded and applied to, for example, a removable recording medium 321 as a package medium or the like.
- the application program can be installed in the storage unit 313 via the input / output interface 310 by mounting the removable recording medium 321 in the drive 315.
- This application program can also be provided via a wired or wireless transmission medium such as a local area network, the Internet, or digital satellite broadcasting. In that case, this application program can be received by the communication unit 314 and installed in the storage unit 313.
- this application program can be installed in advance in ROM 302 or storage unit 313.
- the certificate authority 103 also has the same configuration as the verification device 102 shown in FIG. That is, the block diagram shown in FIG. 3 can also be used for the explanation of the certificate authority 103.
- FIG. 7 shows a function realized by executing the application program in the verification device 102 as a functional block.
- the verification device 102 executes the application program to obtain the acquisition control unit 351 and the certificate verification unit 352, the electronic signature decryption unit 353, the partial data extraction unit 354, and the hash generation unit 355. It can have a unit 356 and an output control unit 357.
- the acquisition control unit 351 performs processing related to acquisition of data such as a captured image and an electronic signature by controlling, for example, the communication unit 314.
- the certificate verification unit 352 performs processing related to certificate verification.
- the electronic signature decoding unit 353 performs a process related to the decoding of the electronic signature.
- the partial data extraction unit 354 performs processing related to extraction of partial data.
- the hash generation unit 355 performs a process related to hash generation.
- the comparison unit 356 performs processing related to the comparison of electronic signatures.
- the output control unit 357 performs processing related to data output.
- the acquisition control unit 351 of the verification device 102 controls the communication unit 314 in step S201 to supply the image and metadata linked to each other from the image pickup device 101.
- Get digital signatures, certificates, and public keys That is, the electronic signature generated by using a part of the captured image (a part of the captured image (partial image) corresponding to the extraction area information of the metadata and the partial identification information (that is, metadata) for specifying the partial image).
- An electronic signature containing the hash value of) is acquired.
- step S202 the certificate verification unit 352 requests the certificate revocation list from the certificate authority 103 via the communication unit 314.
- the certificate authority 103 receives the request from the verification device 102 in step S221. Then, the certificate authority 103 supplies the certificate revocation list to the verification device 102 based on the request.
- step S203 the acquisition control unit 351 of the verification device 102 acquires the certificate revocation list via the communication unit 314.
- step S204 the certificate verification unit 352 confirms the validity of the certificate using the certificate revocation list acquired in step S203.
- step S205 the electronic signature decryption unit 353 decrypts the electronic signature acquired in step S201 with the public key. That is, a hash value of a partial image of the captured image corresponding to the extraction area information of the metadata and the metadata (partial identification information) can be obtained.
- step S206 the partial data extraction unit 354 extracts a partial image from the captured image based on the metadata extraction area information.
- step S207 the hash generation unit 355 generates a hash of the extracted partial image and metadata.
- step S208 the comparison unit 356 compares the hash obtained by the process of step S205 with the hash generated by the process of step S207, and determines whether or not tampering has been performed based on the comparison result. ..
- step S209 the output control unit 357 outputs the verification result obtained in step S208.
- the verification process is completed.
- the verification device 102 can verify the electronic signature using the hash of the partial image of the captured image. Therefore, an increase in load can be suppressed.
- Second Embodiment> ⁇ Specification of partial area based on image analysis results> An image analysis may be performed on the captured image, and a "part" of the captured image for which a hash is generated may be specified based on the analysis result. For example, by performing image analysis, a region of a person (or face) in a captured image may be specified, that region may be designated as the above-mentioned "part", and a hash of that region may be generated.
- FIG. 9 The function realized by executing the application program in the image pickup apparatus 101 in that case is shown in FIG. 9 as a functional block.
- the image pickup apparatus 101 has an image analysis unit 401 in addition to the functional block in the case of FIG.
- the image analysis unit 401 performs processing related to image analysis for the captured image and the like.
- the imaging control unit 251 controls the imaging unit 231 to image the subject and generate the captured image in step S301. Further, the image pickup control unit 251 controls the sensor 232 to measure the distance to the subject and generate focus information (depth data). Then, the image pickup control unit 251 acquires the generated captured image and focus information.
- step S302 the image analysis unit 401 analyzes the captured image and identifies the area (person area) in which the person is captured.
- step S303 the partial data extraction unit 252 extracts the specified person area of the captured image.
- the imaging device 101 can generate an electronic signature using a part of the captured image according to the image analysis result. That is, a hash of a more important portion of the captured image can be generated and associated with the captured image. Therefore, an increase in load can be suppressed.
- the person area is specified by the image analysis, but the area specified by the image analysis is arbitrary and may be other than the person area.
- the captured image associated with the electronic signature may be a moving image.
- the hash of the partial image may be associated with the captured image only for a part of the frames as described above.
- the hash of the partial image may be associated with the captured image only in the I frame.
- FIG. 11 shows an example of a functional block showing a function realized by executing an application program in the image pickup apparatus 101 in that case.
- the imaging device 101 has a sorting buffer 411 and a coding unit 412 in addition to the functional blocks in the case of FIG.
- the rearrangement buffer 411 holds a plurality of frames of the encoded moving image, and rearranges the order of the frames from the reproduction order to the decoding order.
- the coding unit 412 performs processing related to coding of an captured image (moving image) by using, for example, a coding method for two-dimensional moving images such as AVC (Advanced Video Coding) and HEVC (High Efficiency Video Coding).
- AVC Advanced Video Coding
- HEVC High Efficiency Video Coding
- the imaging control unit 251 controls the imaging unit 231 to image the subject in step S341 and generate the captured image. Further, the image pickup control unit 251 controls the sensor 232 to measure the distance to the subject and generate focus information (depth data). Then, the image pickup control unit 251 acquires the generated captured image and focus information.
- step S342 the sorting buffer 411 holds a plurality of frame images and sorts the frame order from the playback order to the coding order.
- step S343 the partial data extraction unit 252 determines whether or not the processing target frame is an I frame. If it is determined that it is an I frame, the process proceeds to step S344.
- step S348 the coding unit 412 encodes the captured image to be processed and generates the coded data.
- step S349 the linking unit 256 links the encoded data, the metadata, the electronic signature, the certificate, and the public key of the captured image to each other.
- step S350 the output control unit 257 outputs those data.
- step S350 When the process of step S350 is completed, the process proceeds to step S353. If it is determined in step S343 that the frame to be processed is not an I frame, the process proceeds to step S351.
- step S351 the coding unit 412 encodes the captured image and generates the coded data.
- step S352 the output control unit 257 outputs the coded data.
- step S353 the imaging control unit 251 determines whether or not all frames have been processed. If it is determined that an unprocessed frame exists, the process returns to step S341, and subsequent processes are performed. If it is determined in step S353 that all frames have been processed, the imaging process ends.
- FIG. 13 shows an example of a functional block showing a function realized by executing an application program in the verification device 102 in this case.
- the verification device 102 has a decoding unit 421 in addition to the functional block in the case of FIG. 7.
- the decoding unit 421 performs a process related to decoding the encoded data of the moving image.
- the rearrangement buffer 411 holds a plurality of frames of the encoded moving image, and rearranges the order of the frames from the reproduction order to the decoding order.
- the coding unit 412 performs processing related to coding of an captured image (moving image) by using, for example, a coding method for two-dimensional moving images such as AVC (Advanced Video Coding) and HEVC (High Efficiency Video Coding).
- AVC Advanced Video Coding
- HEVC High Efficiency Video Coding
- the acquisition control unit 351 of the verification device 102 controls the communication unit 314 or the like in step S371 to encode the encoded data, the metadata, the electronic signature, and the like, which are associated with each other. Obtain a certificate and public key.
- step S372 the decoding unit 421 decodes the coded data and generates a frame image.
- step S373 the decoding unit 421 determines whether or not the processing target frame is an I frame. If it is determined that it is an I frame, the process proceeds to step S374.
- each process of steps S374 to S381 is executed in the same manner as each process of steps S202 to S209 of FIG. Further, each process of step S391 and step S392 by the certificate authority 103 is executed in the same manner as each process of step S221 and step S222 of FIG.
- step S381 When the process of step S381 is completed, the process proceeds to step S382. If it is determined in step S373 that the frame to be processed is not an I frame, the process proceeds to step S382.
- step S382 the output control unit 357 determines whether or not all frames have been processed. If it is determined that an unprocessed frame exists, the process returns to step S371, and the subsequent processes are repeated. If it is determined in step S382 that all frames have been processed, the verification process ends.
- the verification device 102 can verify the electronic signature using the hash of the partial image of the captured image only for the I frame of the moving image. Therefore, an increase in load can be suppressed.
- the method of generating the electronic signature may be controlled according to the imaging mode. For example, in the case of an imaging mode for capturing a moving image or an imaging mode for so-called continuous shooting, an electronic signature is generated using a hash of a partial image as described above, and in the case of a normal still image imaging mode, the entire captured image is captured. The digital signature may be generated using the hash of.
- FIG. 15 An example of a functional block showing a function realized by executing an application program in the image pickup apparatus 101 in that case is shown in FIG.
- the image pickup apparatus 101 has an image pickup mode control unit 431 in addition to the functional block in the case of FIG.
- the image pickup mode control unit 431 controls the generation of electronic signatures according to the image pickup mode.
- the imaging mode control unit 431 sets the imaging mode in step S401.
- the imaging mode control unit 431 determines whether or not the imaging mode is a moving image imaging mode for capturing a moving image. If it is determined that the moving image imaging mode is set, the process proceeds to step S403.
- step S403 the imaging device 101 performs imaging processing in the moving image imaging mode. That is, the image pickup apparatus 101 performs the same image pickup process as described with reference to the flowchart of FIG. When the process of step S403 is completed, the imaging process is completed.
- step S402 If it is determined in step S402 that the mode is not the moving image imaging mode, the process proceeds to step S404.
- step S404 the imaging mode control unit 431 determines whether or not the continuous shooting imaging mode is such that the captured image of the still image is captured a plurality of times in a short period of time (so-called continuous shooting). If it is determined that the continuous shooting imaging mode is used, the process proceeds to step S405.
- step S405 the imaging device 101 performs imaging processing in the continuous shooting imaging mode. That is, the image pickup apparatus 101 performs the same image pickup process as described with reference to the flowcharts of FIGS. 5 and 10, and generates an electronic signature using the hash of the partial image.
- the imaging process is completed.
- step S404 If it is determined in step S404 that the mode is not the continuous shooting imaging mode, the process proceeds to step S406. In this case, the electronic signature is generated using the hash of the entire captured image.
- step S406 the image pickup control unit 251 controls the image pickup unit 231 to image the subject and generate the captured image. Then, the image pickup control unit 251 acquires the generated captured image.
- step S407 the hash generation unit 254 generates a hash of the entire captured image.
- step S408 the electronic signature generation unit 255 encrypts the hash generated in step S407 with the private key to generate the electronic signature.
- step S409 the linking unit 256 links the acquired image, the electronic signature generated in step S408, the certificate, and the public key to each other.
- step S410 the output control unit 257 outputs the captured image, the electronic signature, the certificate, and the public key associated with each other by the process of step S409.
- the imaging process is completed.
- the present technology can be applied to any configuration.
- the present technology is a device such as a processor as a system LSI (Large Scale Integration), a module using a plurality of processors, a unit using a plurality of modules, or a set in which other functions are added to the unit. It can also be implemented as a partial configuration.
- this technology can be applied to a network system composed of a plurality of devices.
- the present technology may be implemented as cloud computing that is shared and jointly processed by a plurality of devices via a network.
- the present technology may be implemented in a cloud service that provides services to arbitrary terminals such as computers, portable information processing terminals, and IoT (Internet of Things) devices.
- the system means a set of a plurality of components (devices, modules (parts), etc.), and it does not matter whether all the components are in the same housing. Therefore, a plurality of devices housed in separate housings and connected via a network, and a device in which a plurality of modules are housed in one housing are both systems. ..
- Systems, devices, processing departments, etc. to which this technology is applied can be used in any field such as transportation, medical care, crime prevention, agriculture, livestock industry, mining, beauty, factories, home appliances, weather, nature monitoring, etc. .. Moreover, the use is arbitrary.
- the configuration described as one device (or processing unit) may be divided and configured as a plurality of devices (or processing units).
- the configurations described above as a plurality of devices (or processing units) may be collectively configured as one device (or processing unit).
- a configuration other than the above may be added to the configuration of each device (or each processing unit).
- a part of the configuration of one device (or processing unit) may be included in the configuration of another device (or other processing unit). ..
- the above-mentioned program may be executed in any device.
- the device may have necessary functions (functional blocks, etc.) so that necessary information can be obtained.
- each step of one flowchart may be executed by one device, or may be shared and executed by a plurality of devices.
- the plurality of processes may be executed by one device, or may be shared and executed by a plurality of devices.
- a plurality of processes included in one step can be executed as processes of a plurality of steps.
- the processes described as a plurality of steps can be collectively executed as one step.
- the processing of the steps for writing the program may be executed in chronological order in the order described in the present specification, and the calls may be made in parallel or in parallel. It may be executed individually at the required timing such as when it is broken. That is, as long as there is no contradiction, the processing of each step may be executed in an order different from the above-mentioned order. Further, the processing of the step for writing this program may be executed in parallel with the processing of another program, or may be executed in combination with the processing of another program.
- a plurality of technologies related to this technology can be independently implemented independently as long as there is no contradiction.
- any plurality of the present technologies can be used in combination.
- some or all of the techniques described in any of the embodiments may be combined with some or all of the techniques described in other embodiments. It is also possible to carry out a part or all of any of the above-mentioned techniques in combination with other techniques not described above.
- the present technology can also have the following configurations.
- An imaging device including a linking portion that links a hash value of a part of an captured image and partial identification information for specifying the portion to the captured image.
- the image pickup apparatus according to (1) wherein the part is a focused part of the captured image.
- the image pickup apparatus according to (1) wherein the part is a partial area at a predetermined position of the captured image.
- the image pickup apparatus according to (1) wherein the part is a part obtained by thinning out a part of pixels of the captured image.
- the image pickup apparatus according to any one of (1) to (5), further comprising an extraction unit for extracting the part from the captured image.
- the image pickup apparatus according to (6), wherein the extraction unit extracts a focused portion of the captured image based on focus information.
- the imaging device according to (6), wherein the extraction unit extracts a part of the captured image from the captured image based on the image analysis result of the captured image.
- a hash value generation unit that generates the hash value by using a part of the captured image and the partial identification information is further provided.
- the linking unit associates the hash value generated by the hash value generating unit with the captured image.
- An electronic signature generator for generating an electronic signature including the hash value is further provided.
- the linking unit links the public key used for generating the electronic signature and the certificate of the public key to the captured image.
- the captured image is a moving image and is The imaging according to any one of (1) to (12), wherein the linking portion links a hash value of a part of the captured image and the partial identification information to the captured image only for the I frame of the moving image.
- Device. (14)
- the captured image is a moving image and is The linking portion links a hash value of a part of the captured image and the partial identification information to the captured image only for a frame in which the movement of the moving image is higher than the threshold value (1) to (12).
- the imaging apparatus according to. (15)
- the tying part is In the continuous shooting mode, the hash value of the part of the captured image and the partial identification information is associated with the captured image.
- the imaging device according to any one of (1) to (12), wherein the hash value of the entire captured image is associated with the captured image when the continuous shooting mode is not used.
- Computer A program that functions as a linking unit that links a part of a captured image and a hash value of partial identification information for specifying the part to the captured image.
- a hash value of the extracted part and the part-specific information is generated, and the hash value is generated.
- (20) Computer An extraction unit that extracts the part from the captured image based on the partial identification information associated with the captured image together with a hash value of a part of the captured image and the partial identification information for specifying the part.
- a hash value generation unit that generates a hash value of the part extracted by the extraction unit and the part-specific information, and a hash value generation unit.
- 100 tampering detection system 101 imaging device, 102 verification device, 103 certificate authority, 231 imaging unit, 232 sensor, 251 imaging control unit, 252 partial data extraction unit, 253 metadata update unit, 254 hash generation unit, 255 electronic signature generation Unit, 256 linking unit, 257 output control unit, 351 acquisition control unit, 352 certificate verification unit, 353 digital signature decryption unit, 354 partial data extraction unit, 355 hash generation unit, 356 comparison unit, 357 output control unit, 401 Image analysis unit, 411 sorting buffer, 412 encoding unit, 421 decoding unit, 431 imaging mode control unit
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Power Engineering (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Studio Devices (AREA)
Abstract
Description
1.部分画像のハッシュ生成
2.第1の実施の形態(フォーカス情報に基づく部分領域特定)
3.第2の実施の形態(画像解析結果に基づく部分領域特定)
4.第3の実施の形態(動画像の場合)
5.第4の実施の形態(撮像モードに応じた制御)
6.付記
<ハッシュの生成>
例えば、特許文献1には、デジタルカメラ等において撮像画像全体のハッシュを生成し、そのハッシュを用いた電子署名を撮像画像に関連付けることにより、改ざんの検知に利用する方法が記載されている。例えば撮像装置の情報もこの電子署名に含めることができる。
<改ざん検知システム>
図1は、本技術を適用した情報処理システムの一実施の形態である改ざん検知システムの主な構成例を示す図である。図1に示される改ざん検知システム100は、撮像画像等の改ざんを検知するシステムである。図1に示されるように、この改ざん検知システム100は、例えば、撮像装置101、検証装置102、および認証局103を有する。なお、図1においては、撮像装置101、検証装置102、および認証局103がそれぞれ1台ずつ示されているが、改ざん検知システム100を構成する、撮像装置101、検証装置102、および認証局103の数は、それぞれ任意である。例えば撮像装置101、検証装置102、および認証局103が複数であってもよい。
図2は、撮像装置101から検証装置102に供給されるデータの例を示す図である。図2のAに示されるように、撮像画像111には、メタデータ112、電子署名113、および証明書/公開鍵114等の情報が関連付けられる。
図3は、本技術を適用した情報処理装置の一実施の形態である撮像装置101の主な構成例を示す図である。図3に示される撮像装置101は、撮像(撮像画像の生成)や電子署名の生成等に関する処理を行うアプリケーションプログラム(ソフトウエア)をインストールし、実行するコンピュータである。ここでコンピュータには、専用のハードウエアに組み込まれているコンピュータや、各種のプログラムをインストールすることで、各種の機能を実行することが可能な、例えば汎用のパーソナルコンピュータ等が含まれる。つまり、撮像装置101は、アプリケーションプログラムを実行することにより、撮像(撮像画像の生成)や電子署名の生成等に関する処理を行う。
この撮像装置101により実行される撮像処理の流れの例を、図5のフローチャートを参照して説明する。
図6は、本技術を適用した情報処理装置の一実施の形態である検証装置102の主な構成例を示す図である。図6に示される検証装置は、電子署名の検証に関する処理を行うアプリケーションプログラム(ソフトウエア)をインストールし、実行するコンピュータである。ここでコンピュータには、専用のハードウエアに組み込まれているコンピュータや、各種のプログラムをインストールすることで、各種の機能を実行することが可能な、例えば汎用のパーソナルコンピュータ等が含まれる。検証装置102は、アプリケーションプログラムを実行することにより、電子署名の検証に関する処理を行う。
次に、図8のフローチャートを参照して、検証装置102および認証局103により実行される検証処理の流れの例を説明する。
<画像解析結果に基づく部分領域特定>
なお、撮像画像に対して画像解析を行い、その解析結果に基づいてハッシュを生成する撮像画像の「一部分」を特定してもよい。例えば、画像解析を行うことにより、撮像画像の人物(や顔)の領域を特定し、その領域を上述の「一部分」とし、その領域のハッシュを生成するようにしてもよい。
その場合の撮像装置101においてアプリケーションプログラムを実行することにより実現される機能を機能ブロックとして図9に示す。図9に示されるように、この場合、撮像装置101は、図4の場合の機能ブロックに加え、画像解析部401を有する。画像解析部401は、撮像画像等に対する画像解析に関する処理を行う。
この場合の撮像処理の流れの例を、図10のフローチャートを参照して説明する。撮像処理が開始されると、撮像制御部251は、ステップS301において、撮像部231を制御して被写体を撮像させ、その撮像画像を生成させる。また、撮像制御部251は、センサ232を制御して被写体までの距離を測距させ、フォーカス情報(デプスデータ)を生成させる。そして撮像制御部251は、生成させた撮像画像およびフォーカス情報を取得する。
<動画像>
なお、電子署名を関連付ける撮像画像は動画像であってもよい。この場合、一部のフレームについてのみ、上述のように部分画像のハッシュを撮像画像に紐付けるようにしてもよい。例えば、Iフレームのみ、部分画像のハッシュを撮像画像に紐付けるようにしてもよい。
その場合の撮像装置101においてアプリケーションプログラムを実行することにより実現される機能を機能ブロックの例を図11に示す。図11に示されるように、この場合、撮像装置101は、図4の場合の機能ブロックに加え、並べ替えバッファ411および符号化部412を有する。並べ替えバッファ411は、符号化される動画像の複数のフレームを保持し、そのフレームの順を再生順から復号順に並べ替える。符号化部412は、例えば、AVC(Advanced Video Coding)やHEVC(High Efficiency Video Coding)等の2次元動画像用の符号化方式を用いて撮像画像(動画像)の符号化に関する処理を行う。
この場合の撮像処理の流れの例を、図12のフローチャートを参照して説明する。なお、ここでは、一例として、ハッシュを生成する部分領域を、フォーカス情報を用いて設定する場合を例に説明する。
また、この場合の検証装置102においてアプリケーションプログラムを実行することにより実現される機能を機能ブロックの例を図13に示す。図13に示されるように、この場合、検証装置102は、図7の場合の機能ブロックに加え、復号部421を有する。復号部421は、動画像の符号化データの復号に関する処理を行う。並べ替えバッファ411は、符号化される動画像の複数のフレームを保持し、そのフレームの順を再生順から復号順に並べ替える。符号化部412は、例えば、AVC(Advanced Video Coding)やHEVC(High Efficiency Video Coding)等の2次元動画像用の符号化方式を用いて撮像画像(動画像)の符号化に関する処理を行う。
次に、図14のフローチャートを参照して、この場合の検証装置102および認証局103により実行される検証処理の流れの例を説明する。
<撮像モードに応じた制御>
なお、撮像モードに応じて、電子署名の生成方法を制御するようにしてもよい。例えば、動画像を撮像する撮像モードや、所謂連写を行う撮像モードの場合、上述のように部分画像のハッシュを用いて電子署名を生成し、通常の静止画撮像モードの場合、撮像画像全体のハッシュを用いて電子署名を生成するようにしてもよい。
その場合の撮像装置101においてアプリケーションプログラムを実行することにより実現される機能を機能ブロックの例を図15に示す。図15に示されるように、この場合、撮像装置101は、図11の場合の機能ブロックに加え、撮像モード制御部431を有する。撮像モード制御部431は、撮像モードに応じた電子署名生成に関する制御を行う。
この場合の撮像処理の流れの例を、図16のフローチャートを参照して説明する。撮像処理が開始されると、撮像モード制御部431は、ステップS401において、撮像モードを設定する。ステップS402において、撮像モード制御部431は、撮像モードが動画像を撮像する動画撮像モードであるか否かを判定する。動画撮像モードであると判定された場合、処理はステップS403に進む。
<ハードウエア>
上述した一連の処理は、ソフトウエア(アプリケーションプログラム)により実行させることもできるし、ハードウエアにより実行させることもできる。
本技術は、任意の構成に適用することができる。例えば、本技術は、システムLSI(Large Scale Integration)等としてのプロセッサ、複数のプロセッサ等を用いるモジュール、複数のモジュール等を用いるユニット、または、ユニットにさらにその他の機能を付加したセット等、装置の一部の構成として実施することもできる。
本技術を適用したシステム、装置、処理部等は、例えば、交通、医療、防犯、農業、畜産業、鉱業、美容、工場、家電、気象、自然監視等、任意の分野に利用することができる。また、その用途も任意である。
本技術の実施の形態は、上述した実施の形態に限定されるものではなく、本技術の要旨を逸脱しない範囲において種々の変更が可能である。
(1) 撮像画像の一部分と前記一部分を特定するための部分特定情報とのハッシュ値を前記撮像画像に紐付ける紐付け部
を備える撮像装置。
(2) 前記一部分は、前記撮像画像の合焦部分である
(1)に記載の撮像装置。
(3) 前記一部分は、前記撮像画像の所定の位置の部分領域である
(1)に記載の撮像装置。
(4) 前記一部分は、前記撮像画像の一部の画素を間引いた部分である
(1)に記載の撮像装置。
(5) 前記一部分は、前記撮像画像の画像解析結果に基づいて特定される部分である
(1)に記載の撮像装置。
(6) 前記撮像画像から前記一部分を抽出する抽出部をさらに備える
(1)乃至(5)のいずれかに記載の撮像装置。
(7) 前記抽出部は、フォーカス情報に基づいて、前記撮像画像の合焦部分を抽出する
(6)に記載の撮像装置。
(8) 前記抽出部は、前記撮像画像の画像解析結果に基づいて、前記撮像画像から前記一部分を抽出する
(6)に記載の撮像装置。
(9) 前記撮像画像の一部分と前記部分特定情報とを用いて、前記ハッシュ値を生成するハッシュ値生成部をさらに備え、
前記紐付け部は、前記ハッシュ値生成部により生成された前記ハッシュ値を前記撮像画像に紐付ける
(1)乃至(8)のいずれかに記載の撮像装置。
(10) 前記ハッシュ値を含む電子署名を生成する電子署名生成部をさらに備え、
前記紐付け部は、前記電子署名生成部により生成された前記電子署名を前記撮像画像に紐付ける
(1)乃至(9)のいずれかに記載の撮像装置。
(11) 前記部分情報を用いて、前記撮像画像のメタデータを更新する更新部をさらに備え、
前記紐付け部は、前記更新部により更新された前記メタデータを、前記撮像画像に付与することで、前記撮像画像に前記メタデータを紐付ける
(10)に記載の撮像装置。
(12) 前記紐付け部は、電子署名の生成に用いられた公開鍵および前記公開鍵の証明書を、前記撮像画像に紐付ける
(1)乃至(11)のいずれかに記載の撮像装置。
(13) 前記撮像画像は動画像であり、
前記紐付け部は、前記動画像のIフレームについてのみ、前記撮像画像の一部分と前記部分特定情報とのハッシュ値を前記撮像画像に紐付ける
(1)乃至(12)のいずれかに記載の撮像装置。
(14) 前記撮像画像は動画像であり、
前記紐付け部は、前記動画像の動きが閾値より高いフレームについてのみ、前記撮像画像の一部分と前記部分特定情報とのハッシュ値を前記撮像画像に紐付ける
(1)乃至(12)のいずれかに記載の撮像装置。
(15) 前記紐付け部は、
連写モードの場合、前記撮像画像の前記一部分と前記部分特定情報とのハッシュ値を前記撮像画像に紐付け、
前記連写モードでない場合、前記撮像画像全体のハッシュ値を前記撮像画像に紐付ける
(1)乃至(12)のいずれかに記載の撮像装置。
(16) 撮像画像の一部分と前記一部分を特定するための部分特定情報とのハッシュ値を前記撮像画像に紐付ける
情報処理方法。
(17) コンピュータを、
撮像画像の一部分と前記一部分を特定するための部分特定情報とのハッシュ値を前記撮像画像に紐付ける紐付け部
として機能させるプログラム。
前記抽出部により抽出された前記一部分と、前記部分特定情報とのハッシュ値を生成するハッシュ値生成部と、
前記ハッシュ値生成部により生成された前記ハッシュ値と、前記撮像画像に紐付けられた前記ハッシュ値とを比較する比較部と
を備える情報処理装置。
(19) 撮像画像の一部分と前記一部分を特定するための部分特定情報とのハッシュ値とともに前記撮像画像に紐付けられた、前記部分特定情報に基づいて、前記撮像画像から前記一部分を抽出し、
抽出された前記一部分と、前記部分特定情報とのハッシュ値を生成し、
生成された前記ハッシュ値と、前記撮像画像に紐付けられた前記ハッシュ値とを比較する
情報処理方法。
(20) コンピュータを、
撮像画像の一部分と前記一部分を特定するための部分特定情報とのハッシュ値とともに前記撮像画像に紐付けられた、前記部分特定情報に基づいて、前記撮像画像から前記一部分を抽出する抽出部と、
前記抽出部により抽出された前記一部分と、前記部分特定情報とのハッシュ値を生成するハッシュ値生成部と、
前記ハッシュ値生成部により生成された前記ハッシュ値と、前記撮像画像に紐付けられた前記ハッシュ値とを比較する比較部
として機能させるプログラム。
Claims (20)
- 撮像画像の一部分と前記一部分を特定するための部分特定情報とのハッシュ値を前記撮像画像に紐付ける紐付け部
を備える撮像装置。 - 前記一部分は、前記撮像画像の合焦部分である
請求項1に記載の撮像装置。 - 前記一部分は、前記撮像画像の所定の位置の部分領域である
請求項1に記載の撮像装置。 - 前記一部分は、前記撮像画像の一部の画素を間引いた部分である
請求項1に記載の撮像装置。 - 前記一部分は、前記撮像画像の画像解析結果に基づいて特定される部分である
請求項1に記載の撮像装置。 - 前記撮像画像から前記一部分を抽出する抽出部をさらに備える
請求項1に記載の撮像装置。 - 前記抽出部は、フォーカス情報に基づいて、前記撮像画像の合焦部分を抽出する
請求項6に記載の撮像装置。 - 前記抽出部は、前記撮像画像の画像解析結果に基づいて、前記撮像画像から前記一部分を抽出する
請求項6に記載の撮像装置。 - 前記撮像画像の一部分と前記部分特定情報とを用いて、前記ハッシュ値を生成するハッシュ値生成部をさらに備え、
前記紐付け部は、前記ハッシュ値生成部により生成された前記ハッシュ値を前記撮像画像に紐付ける
請求項1に記載の撮像装置。 - 前記ハッシュ値を含む電子署名を生成する電子署名生成部をさらに備え、
前記紐付け部は、前記電子署名生成部により生成された前記電子署名を前記撮像画像に紐付ける
請求項1に記載の撮像装置。 - 前記部分特定情報を用いて、前記撮像画像のメタデータを更新する更新部をさらに備え、
前記紐付け部は、前記更新部により更新された前記メタデータを、前記撮像画像に付与することで、前記撮像画像に前記メタデータを紐付ける
請求項1に記載の撮像装置。 - 前記紐付け部は、電子署名の生成に用いられた公開鍵および前記公開鍵の証明書を、前記撮像画像に紐付ける
請求項1に記載の撮像装置。 - 前記撮像画像は動画像であり、
前記紐付け部は、前記動画像のIフレームについてのみ、前記撮像画像の一部分と前記部分特定情報とのハッシュ値を前記撮像画像に紐付ける
請求項1に記載の撮像装置。 - 前記撮像画像は動画像であり、
前記紐付け部は、前記動画像の動きが閾値より高いフレームについてのみ、前記撮像画像の一部分と前記部分特定情報とのハッシュ値を前記撮像画像に紐付ける
請求項1に記載の撮像装置。 - 前記紐付け部は、
連写モードの場合、前記撮像画像の前記一部分と前記部分特定情報とのハッシュ値を前記撮像画像に紐付け、
前記連写モードでない場合、前記撮像画像全体のハッシュ値を前記撮像画像に紐付ける
請求項1に記載の撮像装置。 - 撮像画像の一部分と前記一部分を特定するための部分特定情報とのハッシュ値を前記撮像画像に紐付ける
情報処理方法。 - コンピュータを、
撮像画像の一部分と前記一部分を特定するための部分特定情報とのハッシュ値を前記撮像画像に紐付ける紐付け部
として機能させるプログラム。 - 撮像画像の一部分と前記一部分を特定するための部分特定情報とのハッシュ値とともに前記撮像画像に紐付けられた、前記部分特定情報に基づいて、前記撮像画像から前記一部分を抽出する抽出部と、
前記抽出部により抽出された前記一部分と、前記部分特定情報とのハッシュ値を生成するハッシュ値生成部と、
前記ハッシュ値生成部により生成された前記ハッシュ値と、前記撮像画像に紐付けられた前記ハッシュ値とを比較する比較部と
を備える情報処理装置。 - 撮像画像の一部分と前記一部分を特定するための部分特定情報とのハッシュ値とともに前記撮像画像に紐付けられた、前記部分特定情報に基づいて、前記撮像画像から前記一部分を抽出し、
抽出された前記一部分と、前記部分特定情報とのハッシュ値を生成し、
生成された前記ハッシュ値と、前記撮像画像に紐付けられた前記ハッシュ値とを比較する
情報処理方法。 - コンピュータを、
撮像画像の一部分と前記一部分を特定するための部分特定情報とのハッシュ値とともに前記撮像画像に紐付けられた、前記部分特定情報に基づいて、前記撮像画像から前記一部分を抽出する抽出部と、
前記抽出部により抽出された前記一部分と、前記部分特定情報とのハッシュ値を生成するハッシュ値生成部と、
前記ハッシュ値生成部により生成された前記ハッシュ値と、前記撮像画像に紐付けられた前記ハッシュ値とを比較する比較部
として機能させるプログラム。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/914,103 US20240214209A1 (en) | 2020-03-30 | 2021-03-16 | Imaging apparatus, information processing apparatus, information processing method, and program |
KR1020227033135A KR20220160583A (ko) | 2020-03-30 | 2021-03-16 | 촬상 장치, 정보 처리 장치, 정보 처리 방법, 및 프로그램 |
CN202180024255.XA CN115336228A (zh) | 2020-03-30 | 2021-03-16 | 成像装置、信息处理装置、信息处理方法和程序 |
JP2022511806A JP7582300B2 (ja) | 2020-03-30 | 2021-03-16 | 撮像装置、情報処理装置、情報処理方法、およびプログラム |
EP21780210.7A EP4109437A4 (en) | 2020-03-30 | 2021-03-16 | IMAGE DEVICE, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND PROGRAM |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2020060928 | 2020-03-30 | ||
JP2020-060928 | 2020-03-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021200092A1 true WO2021200092A1 (ja) | 2021-10-07 |
Family
ID=77927624
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2021/010490 WO2021200092A1 (ja) | 2020-03-30 | 2021-03-16 | 撮像装置、情報処理装置、情報処理方法、およびプログラム |
Country Status (5)
Country | Link |
---|---|
US (1) | US20240214209A1 (ja) |
EP (1) | EP4109437A4 (ja) |
KR (1) | KR20220160583A (ja) |
CN (1) | CN115336228A (ja) |
WO (1) | WO2021200092A1 (ja) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2024154900A (ja) * | 2023-04-20 | 2024-10-31 | キヤノン株式会社 | 撮像装置、撮像装置の制御方法及びプログラム |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008022372A (ja) | 2006-07-13 | 2008-01-31 | Canon Inc | 改竄検知情報生成装置、撮像装置、改竄検知情報生成方法、プログラムおよび記憶媒体 |
WO2015115074A1 (ja) * | 2014-01-30 | 2015-08-06 | 株式会社モフィリア | 撮像システム及び撮像装置 |
WO2017022121A1 (ja) * | 2015-08-06 | 2017-02-09 | 三菱電機株式会社 | 認証装置、認証システム、及び認証方法 |
JP2020022150A (ja) * | 2018-11-14 | 2020-02-06 | 株式会社Artrigger | 情報処理システム及び情報処理方法 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8392975B1 (en) * | 2008-05-29 | 2013-03-05 | Google Inc. | Method and system for image-based user authentication |
JP5621675B2 (ja) * | 2011-03-18 | 2014-11-12 | 富士通株式会社 | 署名装置、署名方法、および署名プログラム |
US11494761B2 (en) * | 2015-11-06 | 2022-11-08 | Cable Television Laboratories, Inc. | Systems and methods for digital asset security ecosystems |
US10375050B2 (en) * | 2017-10-10 | 2019-08-06 | Truepic Inc. | Methods for authenticating photographic image data |
US11244316B2 (en) * | 2018-06-07 | 2022-02-08 | International Business Machines Corporation | Biometric token for blockchain |
-
2021
- 2021-03-16 US US17/914,103 patent/US20240214209A1/en active Pending
- 2021-03-16 CN CN202180024255.XA patent/CN115336228A/zh active Pending
- 2021-03-16 EP EP21780210.7A patent/EP4109437A4/en not_active Withdrawn
- 2021-03-16 WO PCT/JP2021/010490 patent/WO2021200092A1/ja active Application Filing
- 2021-03-16 KR KR1020227033135A patent/KR20220160583A/ko unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008022372A (ja) | 2006-07-13 | 2008-01-31 | Canon Inc | 改竄検知情報生成装置、撮像装置、改竄検知情報生成方法、プログラムおよび記憶媒体 |
WO2015115074A1 (ja) * | 2014-01-30 | 2015-08-06 | 株式会社モフィリア | 撮像システム及び撮像装置 |
WO2017022121A1 (ja) * | 2015-08-06 | 2017-02-09 | 三菱電機株式会社 | 認証装置、認証システム、及び認証方法 |
JP2020022150A (ja) * | 2018-11-14 | 2020-02-06 | 株式会社Artrigger | 情報処理システム及び情報処理方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4109437A4 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2021200092A1 (ja) | 2021-10-07 |
EP4109437A1 (en) | 2022-12-28 |
US20240214209A1 (en) | 2024-06-27 |
KR20220160583A (ko) | 2022-12-06 |
EP4109437A4 (en) | 2023-07-26 |
CN115336228A (zh) | 2022-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109145563B (zh) | 一种身份验证方法及装置 | |
EP3989206A1 (en) | Cryptography key generation device and cryptography key generation method | |
KR20210114323A (ko) | 강력한 선택적 이미지, 비디오, 및 오디오 콘텐츠 인증 | |
EP4179702B1 (en) | Privacy-preserving image distribution | |
CN112949545B (zh) | 识别人脸图像的方法、装置、计算设备和介质 | |
Hamza et al. | An efficient cryptosystem for video surveillance in the internet of things environment | |
KR19990082729A (ko) | 워터마크를이용한인간이인식가능한데이터세트의배포와인증방법및그장치 | |
KR102469380B1 (ko) | 영상 데이터의 개인정보 비식별화 및 복원 방법 및 장치 | |
US20130156263A1 (en) | Verification method, verification device, and computer product | |
EP4024372A1 (en) | Information processing device, information processing method, and program | |
WO2020158540A1 (ja) | センサ装置、暗号化方法 | |
WO2021200092A1 (ja) | 撮像装置、情報処理装置、情報処理方法、およびプログラム | |
US12135807B2 (en) | Information processing system, information processing method, terminal apparatus, and information processing apparatus | |
JP7491317B2 (ja) | 情報処理システム、情報処理方法、撮像装置 | |
JP7582300B2 (ja) | 撮像装置、情報処理装置、情報処理方法、およびプログラム | |
WO2020158541A1 (ja) | センサ装置、暗号化方法 | |
CN118923081A (zh) | 信息处理装置和方法、以及信息处理系统 | |
JPWO2020116177A1 (ja) | 撮像素子、撮像装置および方法 | |
KR102371391B1 (ko) | Ai 활용 차량 번호판 인식 시스템 및 이를 위한 동작 방법 | |
JP2013197889A (ja) | 画像処理装置、画像処理方法 | |
WO2024122601A1 (ja) | 画像処理装置および方法 | |
US20060104474A1 (en) | Method, apparatus and system for authenticating images by digitally signing hidden messages near the time of image capture | |
WO2024122602A1 (ja) | 画像処理装置および方法 | |
CN115086730B (zh) | 签约视频生成方法、系统、计算机设备及介质 | |
US20240169087A1 (en) | Secure search method, system thereof, apparatus thereof, encryption apparatus, searcher terminal, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21780210 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022511806 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2021780210 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2021780210 Country of ref document: EP Effective date: 20220922 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 17914103 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |