Image pickup apparatus and image data use system

ABSTRACT

An image pickup apparatus certifies unchanged image data by photographing a person using the image pickup apparatus. Two steps are carried out with the image pickup apparatus, coding image data and enciphering the coded image data, which includes changing the original data to encryption data. The enciphering also includes adding a watermark to the coded data. The coding of the image data and enciphering of the coded data are performed before the coded data is stored in a medium or is transferred to another device.

BACK GROUND OF THE INVENTION

[0001] The present invention relates to image pickup and encipheringimage data. In the past an image pickup apparatus was a camera thatmakes an image on film at the time of shutter pressing by chemistry.

[0002] Therefore, the image that was picked up was fixed on the film. Aalteration was only added on the photographic printing paper to which animage is transcribed from the film and it was done to judge the additionof a alteration to the image by looking at a film.

SUMMARY OF THE INVENTION

[0003] The digital camera that accumulates in a medium, such as a harddisc, an image that was picked up has in recent years appeared insteadof a film camera. A digital data does not need to be developed, and itis done to send digital data immediately by using data communication.Digital camera is fast spreading from the easiness ease of use. There isa problem of a difficulty of a judgment whether there has beenalteration to an image.

[0004] Protection can be done so that the third party, without theauthority of access, cannot alter data due to that enciphering in aconventional data protection technical. But, there was a problem of notbeing able to prevent a present the image data that was picked up frombeing altered, even when there is a right of authorship and a thirdparty without a authority uses it.

[0005] A guarantee cannot be made against alteration to a data on thereceiving side.

[0006] It is an object of the present invention to provide the imagepickup that can certify an addition or alteration in image data by aphotographing person in another person. The another person is forexample, a receiver of image data.

[0007] An other object of the present invention is to provide an imagepickup that can certify an addition or alteration of image data by animage data addressee in the photographing person and a third party.

[0008] To achieve the object, two steps are coding an image data &enciphering the coded image data(ciphering: to change original data toan encryption data). The enciphering includes adding a watermark to thecoded image data.

[0009] The enciphering is done before the coded data is stored in mediumor is transferred to another device, when the expression is changed.

[0010] Processing unit enciphers an image marked image data in thepresent invention in the image pickup equipment. Case of transmitteddata to external equipment such as a client terminal, enciphered imagedata is transmitted. The processing unit calculates a check-sum of imagedata, adds the check-sum to image data, and then enciphers the imagedata that has the added said check-sum. As a result, an addition or analteration by an image data of photographing person can be certified tothe image data addressee.

[0011] As a result, an addition or alteration of image data by an imagedata addressee can be certified to the photographing person and a thirdparty.

[0012] And this invention includes as follows:

[0013] A digital camera for receiving an optical image and outputtingtrusted digital image data, is comprising, an optical-electrical systemhaving an optical input for receiving the optical image, and anoptical-electrical processor responsive to the optical image andgenerating the trusted digital image data representative of a securityimage superimposed with the optical image. In the digital camera, saidoptical-electrical processor generates a enciphered digital image dataas the trusted digital image data. In the digital camera, the trusteddigital image data is a still image data. The digital camera iscomprising a storing device connected to said optical-electricalprocessor, and storing the trusted digital image data. The digitalcamera is further comprising a display device connected to saidoptical-electrical processor, and displaying the trusted digital imagedata. The digital camera is further comprising a communication controldevice connected to optical-electrical processor, and transferring thetrusted digital image data to an external device. In the digital camera,the trusted digital image data is displayed with a data showingfalsification, if anyone falsified the trusted image data.

[0014] A method performed by a single apparatus is comprising receivingan optical image, and outputting trusted digital image datarepresentative of the optical image. In the method performed by a singleapparatus, said apparatus is digital camera. The method is furthercomprising optical-electrical processing of the optical image, andgenerating digital image data representative of security imagesuperimposed with the optical image as the trusted digital image data.The method is further comprising, performing all of said steps prior tooutputting or storing the trusted digital image data. In the method,said outputting step outputs a enciphered digital image data as thetrusted digital image data. In the method, the trusted digital imagedata is a still image data. The method is further comprising, storingthe trusted digital image data. The method is further comprising,displaying the trusted digital image data. The method is furthercomprising, transferring the trusted digital image data to an externaldevice. In the method, the trusted digital image data is displayed witha data showing falsification, if anyone falsified the trusted imagedata.

[0015] A digital camera for receiving an optical and outputting trustedimage data, is comprising an optical-electrical system having an opticalinput for receiving the optical image, and means for generating thetrusted digital image data as representative of a security imagesuperimposed with the optical image and prior to storing or outputtingof any digital image data representative of the optical image.

[0016] System for receiving an optical image and outputting trusteddigital image data, is comprising, means for generating the trusteddigital image data as representative of a security image superimposedwith the optical image and prior to storing or outputting of any digitalimage data representative of the optical image.

BRIEF DESCRIPTION OF THE DRAWINGS

[0017]FIG. 1 is a system block diagram to implement the presentinvention.

[0018]FIG. 2 is the block diagram of the image pickup apparatus.

[0019]FIG. 3 is the block diagram of the control program that operatesin the processor in the image pickup apparatus, an enciphering programand a cipher deciphering program.

[0020]FIG. 4 is the flow-sheet of a control program in FIG. 3.

[0021]FIG. 5 is a flowchart of processing of a display in FIG. 4.

[0022]FIG. 6 is the flowchart of a television output processing in FIG.4.

[0023]FIG. 7 is the flowchart of processing between external devices inFIG. 4.

[0024]FIG. 8 is the flowchart of data transfer processing in FIG. 7.

[0025]FIG. 9 is the flowchart of data deletion processing in FIG. 7.

[0026]FIG. 10 is the flowchart of cipher system alteration processing inFIG. 7.

[0027]FIG. 11 is the example of a data transfer processing command.

[0028]FIG. 12 is the example of a data deletion requirement command.

[0029]FIG. 13 is a diagram showing an example of a data list command.

[0030]FIG. 14 is a diagram showing an example of a specificationcommand.

[0031]FIG. 15 is a diagram showing an example of an image data command.

[0032]FIG. 16 is a diagram showing an example of a cipher systemalteration requirement command.

[0033]FIG. 17 is a diagram showing an example of a data control table.

[0034]FIG. 18 is a diagram showing a flow-sheet of a deciphering programin FIG. 3.

[0035]FIG. 19 is a diagram showing an example of a enciphering programin FIG. 3.

[0036]FIG. 20 is a block diagram of a client terminal.

[0037]FIG. 21 is a block diagram of a control program in the clientterminal and an image display program.

[0038]FIG. 22 is a flowchart of processing of a control program in FIG.21.

[0039]FIG. 23 is a flowchart of data transfer processing in FIG. 22.

[0040]FIG. 24 is a flowchart of data deletion processing in FIG. 22

[0041]FIG. 25 is a flow-sheet of a cipher system alteration reason inFIG. 22.

[0042]FIG. 26 is a diagram showing an example of a cipher system controltable in FIG. 22.

[0043]FIG. 27 is a flowchart of processing of an image display programin FIG. 21.

[0044]FIG. 28 is a diagram showing an image plane example that is shownto the display unit of the image pickup apparatus.

[0045]FIG. 29 is a diagram showing an image plane example that is shownon the client terminal that can decipher the image of FIG. 28.

[0046]FIG. 30 is a diagram showing an example of the image plane that isdisplayed on the client terminal that cannot decipher the image of FIG.28.

[0047]FIG. 31 is a diagram showing an example of the image plane that isdisplayed in case the image of FIG. 28 is falsified.

[0048]FIG. 32 is the block diagram of another image pickup apparatus toimplement the present invention.

[0049]FIG. 33 is a diagram showing a program constitution in the imageconverter in FIG. 32.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0050] A system to implement the present invention in FIG. 1 is shown.101 is an image pickup apparatus storing digital data converted frompicked up image data. 103 is a client terminal that receives a digitaldata from the image pickup apparatus 101 and does an image planedisplay, etc. 102 is a network that connects(or couples) the clientterminal 103 and the image pickup apparatus 101. In case the acceptanceof digital data by the client terminal 103 from the image pickupapparatus 101 is operated, the network 102 can be made to connect theclient terminal 103 and the image pickup apparatus 101. When the client103 does not operate to the image pickup apparatus 101, the image pickupapparatus 101 and the client terminal 103 may not connect to the network102. The network 102 may be a cable to which the client terminal 103 andthe image pickup apparatus 101 are connected directly. In addition, thenetwork 103 may be a telephone network connected to other clientterminals and equipment and an wide area network that is represented toan internet.

[0051] The image pickup apparatus 101 disconnected with other imagepickup apparatus, and may receive an image data from the other imagepickup apparatus. In addition, the image pickup apparatus 101 can becomposed of a device that picking up an image and a device storing thepicked-up digital data.

[0052] The image pickup apparatus is shown in FIG. 2. The image inputinto image input unit 202 via lens 201 is input into image cipher device203 according to instructions of a user input from input unit 209,enciphered, and accumulated to stock pile device 213. The lens 201 andthe image input unit 202 are devices to be able to input the image toimage pickup apparatus. So the lens 201 may be device has a samefunction as the lens and the image input unit 202 may be replaced by theother device 2. The image data enciphered and stored in a storing device213 is input to image deciphering device 204 from an inputting device209, and deciphered according to an instruction from a user of the imagepickup apparatus by a program operating in processor 211. The cordedimage data is displayed on a display unit 210 and a television monitor205 via television output unit 206. The image pickup apparatus isconnected to an external device 207, such as the client terminal 103,via the network 215. A command received via a communication control unit208 is read and is processed from the communication control unit 208 toa memory 212. The command created as it was processed is input into thecommunication control unit 208 and is transmitted to the externaldevices 207, such as the client terminal 103 via the network 215. Theimage code device 203, the image deciphering device 204, the televisionoutput unit 206, the communication control unit 208, the input unit 209,the display unit 210, the processor 211, the memory 212 and the storingdevice 213 are connected via a core bus 214.

[0053] It is not necessary to connect the communication control unit 208to the network 215 in case the client terminal, etc. are not operatedfrom the external device 207. The storing device 213 can be removed fromthe image pickup apparatus. It is not necessary that the televisionmonitor 205 connects to the image pickup apparatus if it is not outputto a television, and, the television output unit 206 can be omitted.

[0054] The control program that operates in processor 211 of the imagepickup apparatus is shown in FIG. 3, with an enciphering program and acipher deciphering program. Elements 203-204, 206, 208-210 and 213 arethe same as in FIG. 2. The control program 301 follows a commandreceived from the communication control unit 208 and various setting arechanged, an image data accumulated to the storing device 213 is deleted,and it is transmitted to the communication control unit 208.

[0055] The control program 301 initializes enciphering program 302, makea deciphering program 303 decipher an image data and outputs decipheredimage data to the television output unit 206 and the display unit 210.The deciphering program 302 receives the image data from the image codedevice 203, enciphers the received image data, and stores encipheredimage data in the storing device 213. The deciphering program 303 readsthe stored image data from the storing device 213 and deciphers the readimage data according to an instruction of the control program 301. Thedeciphering program 303 makes the image deciphering device 204 decipherthe image data, and output the deciphered data to the television outputunit 206 and the display unit 210.

[0056] In FIG. 4, a flowchart of a control program on the image pickupapparatus is shown. Step 401 is initializing, and step 402 is waitingfor an instruction by a user from the input unit 209. When there is theinput from the user in step 402, step 403 judges an instruction input inthat is then executioner of a communication with the external device207. Therefore, in case it is execution of the communication, processingbetween external devices is done in step 404, and it returns to step 402again. In step 403, when the instruction is not execution of acommunication, it judges whether the instruction is display execution ofthe image to the display unit 210 in step 405. Therefore, in case it isa display of an image, display processing is done in step 406, and itreturns to step 402 again. It is judged whether the instruction inputtedin step 403 is execution output of an image in step 407. Therefore, incase it is the television output, the television output processing isdone in step 408, and it returns to step 402 again. When the instructionis judged to be not television output, in step 409 it judges whether theinstruction input in step 403 is alteration execution of a cipher mode.Therefore, in case it is the cipher mode alteration, cipherphotographing mode alteration processing is done in step 410, and itreturns to step 402 again. In case it is not a cipher mode alteration instep 409, it returns to 402 again. In case the image pickup apparatusdoes not have the television output unit, step 407 and 408 can beomitted. A cipher photographing mode can be made a fixation, and step409 and step 410 can be omitted.

[0057]FIG. 5 is 1 flowchart of the display processing that is executedin step 406 in case the instructions that a user input in step 405 ofFIG. 4 are display execution of an image. The list of an image dataaccumulated to the storing device 213 in step 501 is displayed on thedisplay unit 210. It is indicated that it is deciphered, and the cipherof the image data specified in step 503 that judged whether it specifiedthe image data that a user displays on 502 from the input unit displaysit on a display unit to the deciphering program 302.

[0058]FIG. 6 is 1 flowchart of the television output processing that isexecuted in step 408 in case the instruction that a user input in step407 of FIG. 4 are television output execution of an image. A list of animage data accumulated to the storing device 213 in step 601 isdisplayed on the display unit 210. In step 602, it is judged whether theuser the image data that a user specifies an image data televisionoutputted by the input unit. In case it is specified, the decipheringprogram 302 is it is instructed to decor the specified image data and tooutput it to the television output unit.

[0059]FIG. 7 is 1 flowchart of processing between the external devicesthat are executed in step 404 in case the instructions that a user inputin step 403 of FIG. 4 are communication execution with the externaldevice. It is judged whether the communication connection settles instep 701 with the external device. When the communication connectionsettled, in step 702 it is judged whether the communication connectionis released. In case the connection is released, the processing isended. When the communication connection was not released in step 702,it is judged whether command is received from the external device instep 703. In case it is not being received, it is judged whether thecommunication connection is not released in 702 again. When command isreceived in step 703, it is judged whether the command is a datatransfer requirement in step 704. In case it is the data transferrequirement, the data transfer processing is done in step 705. In caseit is not the data transfer requirement in step 704, it is judgedwhether a command is a data deletion requirement in 705. In case it isthe data deletion requirement, the data deletion processing is done instep 707. In case it is not the data deletion requirement step 706, itis judged whether the command is a cipher system alteration requirementin step 707. In case it is the cipher system alteration requirement, thecipher system alteration processing is done in step 709. In case it isnot the cipher system alteration requirement, the processing against thecommand is not done in step 709. After data transfer processing step705, data deletion processing step 707, or cipher system alterationprocessing step 709 is ended, and when it was not the cipher systemalteration requirement in step 708, it is judged whether thecommunication connection with an external device was released in step702.

[0060]FIG. 8 is 1 flowchart of the data transfer processing that isexecuted in step 705 in case a command received from the external devicein step 704 of FIG. 7 is a data transfer requirement. In step 801, it istransferred a list of the image data stored in the storing device 213,and it is judged whether it was received a data specifying commandtransferred in step 802. Transmission of all data specified in step 803and specified in the command after data specification command receivingended or judged in step 802. Transmission of all data that was made adata command in step 805 and was specified in the command again aftertransmission that read the data that was transmitted to the following instep 804 from the accumulation equipment when it did not end ended orjudged in 803.

[0061] In case the transfer of all data ends in step 803, processing isended.

[0062]FIG. 9 is a flowchart of the data deletion processing that isexecuted in step 707 in case a commando received from the externaldevice in step 706 of FIG. 7 is a data deletion requirement. A list ofan image data accumulated to the storing device 213 in step 901 is madea command, and it is transmitted to the external device. In 902, itwaits for receiving of the data specification command that is deletedthe image data. In case the deletion of all data specified in step 903and specified in the commando after specification commando receivingended, judged and did not end in step 902, the data that is deleted nextin step 904 is deleted from the storing device. After the data wasdeleted, it is judged all data that specified in the command are deletedin step 903. In case the deletion of all data ends in 903, processing isended.

[0063]FIG. 10 is a flowchart of the cipher system alteration processingthat is executed in step 709 in case a commando received from theexternal device in 708 of FIG. 7 is a cipher system alteration command.It is judged whether the cipher system and the commando of cipher keyspecification are received from the external device in step 1001. Thecipher system specified in the commando received in 1002 and a cipherkey are accumulated to the storing device. It is set as the relevantcipher system, the cipher system using a cipher key when doing thefollowing enciphering processing in step 1003 and a cipher key. Aenciphering processing program is initialized in step 1004. Rearranginga data in step 1002, a enciphering and an accumulation can be done for acipher key.

[0064] The example of the data transfer requirement commando that isreceived from the external device in FIG. 11 is shown. 1101 is theidentifier that shows that it is a data transfer requirement.

[0065] The example of the data deletion requirement command that isreceived from the external device is shown in FIG. 12. 1201 is theidentifier that shows that it is a data deletion requirement.

[0066] The example of the data list commando that is transmitted to anexternal device is shown in FIG. 13. 1301 is the identifier that showsthat it is a list of data. And, 1302 and 1303 are data for lists ofimages. The data for a list of images is “a sumnale data” of a placewhere an image reduced and created from the image data name of 1304 andthe image data of 1305 is a sample data. There may be “The sumnaledata”.

[0067] The example of the specification commando that is received fromthe external device is shown in FIG. 14. 1401, 1402 and 1402 arespecified image data names.

[0068] In FIG. 15, the example of the image data commando that istransmitted to an external device is shown. 1501 is an image data name,1502 is an image data, 1503 is an enciphering method of the image datawas enciphered. In case a enciphering is not done and in case a ciphersystem is fixed as a system, cipher system 1503 cannot be.

[0069] The example of the cipher system alteration requirement commandothat is received from the external device is shown in FIG. 16. 1601 isthe cipher key that is used in the relevant cipher system, 1602 is 1503is an enciphering method, and 1603 is enciphering key that used by theenciphering method. If a cipher key is not used in the encipheringmethod, there may not be the cipher key.

[0070] The example of the control table of the data that is accumulatedto the stock pile device is shown in FIG. 17.

[0071]1813 is control part of the enciphering program, and stores theenciphering method, the cipher key and the enciphering program. Theenciphering method, the cipher key and the enciphering program storerelated each other in the control part. In the embodiment, encipheringprogram 1803 executes enciphering method 1 of 1801 by using the cipherkey 1802, and a enciphering program 1806 shows that cipher system 2 of1804 is executed by using the cipher key 1805. 1814 is control part ofthe image data, and stores the enciphering-method and the image data.The enciphering method and the image data control with relation of eachother in the control part.

[0072] The enciphering method 1 of 1808 in this embodiment, theenciphering of image data 1809 in enciphering method 2 of 1810 and theindication of the enciphering in 1812 by image data 1811 are done forimage data 1807. A address that instead of managing a encipheringprogram in 1803 and 1806, a enciphering program is accumulatedseparately can be managed the storing device, and a enciphering programname can be managed. And various enciphering processing can be omittedin 1 enciphering program. In case a cipher system does not use thecipher key, a cipher key can be omitted, and in case the encipheringmethod that is used in the image pickup apparatus is fixed, there cannotbe enciphering program management part 1813. In this case, it may storeand control relating the image data and enciphering or non-ciphering,without to store and control relation of the image data and encipheringmethod. At that time, as it is shown that a enciphering is being done,in this embodiment, 1808 and 1810 changes.

[0073] Accumulation equipment removes it from the image pickup equipmentand manages only management part 1814 of image data an accumulation tothe accumulation equipment in case it is done. And then, a cryptographkey can be enciphered, it can accumulate, by the accumulation managementto the storage that can be removed and cannot be done from the imagepickup equipment of management part 1813 of an enciphered program, datacan be rearranged.

[0074]FIG. 18 is 1 flow-sheet of a cipher deciphering program that isinstructed a state that is deciphered and the cipher of an image dataspecified in 503 of FIG. 5 displays on a display unit) and is instructedso that it is deciphered, and the cipher of an image data specified in603 of FIG. 6 likewise outputs it to a television output unit. An imagedata specified from the control table in the stock pile device thatshowed an example in FIG. 17 in 1902 that did initialized processing in1901 and a enciphering system are read.

[0075] It is judged whether it is a method that cannot be decipheredwhen a cryptograph method is enciphered once in 1903 like for example,provisional publication key cryptograph method in 1903. In case of themethod that cannot be deciphered, image deciphering equipment isdirected to output it to a equipment (in this embodiment, the equipmentis the display device or the television output device) specified todisplay it on 1906 to “display impossibility”.

[0076] In step 1903, the image data was enciphered by a encipheringmethod to be done deciphering like as JPA-10-108180, in step 1904deciphering the encored image data, the image deciphering device isinstructed to output the image data to an equipment(in this embodiment,the equipment is the display device or television output device). Theenciphering method as shown in JPA-10-108180, whose disclosure isincorporated by herein by reference.

[0077] A flowchart of processing of a enciphering program on the imagepickup apparatus is shown in FIG. 19. The system that is done by thefollowing the enciphering method and the cipher key are done ainitialization to the origin in 2001. It waits for output of an imagedata that the cipher from the image cipher device in 2002 happened. In2003, it is judged whether the image data is enciphered or not, when theimage data is not enciphered, the image data is stored in storing device2007 and controlled by storing device 2007. The result of 2005 is addedafter the cord that represents the termination of an image in the imagedata that calculates the check SAM of an image data before doing theenciphering in 2004 in case the enciphering in 2003 is done, and theenciphering in 2006 is done for an image data after a calculation dataaddition. A result that a check-sum is calculated can be added to thearea that can be used for a freedom in the application in the image datain 2005. And, in case it is not necessary to find that the user of theclient terminal that is referred to which an image data is transmittedchanged an image or in case it is not necessary to control presence orabsence of the alteration of an image so severely, 2004-2005 can beomitted.

[0078] The enciphering method that is done in 2006 uses a method to bedone to display the image piled the enciphering key is used in 2006,like as JPA-10-108180. And, the cipher system that cannot be handled asan image in 2006 like a publication key cipher system can be used.

[0079] The client terminal that connected to the image pickup apparatus,received the image data, and displaying the received image data is shownin FIG. 20. The command received through the communication control unit2106 from the external device 2107 such as the image pickup apparatusthat is connected via the network 2109 is read to the memory 2104, it isprocessed, therefore, it is transmitted to the external device 2107 viathe network 2109, and the created the command is input into thecommunication control unit 2106. The image data accumulated to thestoring device 2105 is displayed on the display 2102 by the program thatoperates in processor 2103 according to the user instructions input fromthe input unit 2101. The input unit 2101, the display 2102, theprocessor 2103, the memory 2104, the storing device 2105 and thecommunication control unit 2106 are connected via the core bus 2108. Itis not necessary to connect the communication control unit 2106 to thenetwork 2109 in case the client terminal does not operate the externaldevice 2107 such as the image pickup apparatus.

[0080] The constitution of the control program that operates in theprocessor 2103 of the client terminal in FIG. 21 and the image displayprogram is shown. As a result the various setting of the image pickupapparatus are changed, the image data in the storing device of the imagepickup apparatus is deleted, it is taken in the communication controlunit 2106 and a commando are transmitted and received, and 2201 followsinstructions of the user input from the input unit 2101 in the controlprogram. The image display program manages a cipher system and a cipherkey to stock pile device 2105 and deciphers an image data and displaysit on display 2102 according to the user instructions that are inputfrom the input unit 2101.

[0081] A flowchart of processing of a control program on the clientterminal is shown in FIG. 22. In 2302, initialized processing is done.In 2302, input of instructions by a user from the input unit is done.When the user inputs instructions in 2302, the inputted instruction isdecided that is processing starts with the image pickup apparatus ornot. If the instruction is decided that is the processing starts, acommunication connection is established with the image pickup apparatusin 2304. If the instruction is decided that is not the processingstarts, the instruction inputted in 3205 is decided that is datatransfer requirement or not. If the instruction inputted in 3205 isdecided that is data transfer requirement, the data transfer processingis done in 2306. If the instruction inputted in 3205 is decided that isnot data transfer requirement, the instruction inputted in 3205 isdecided that is data deletion requirement or not in 2307. If theinstruction inputted in 3205 is the data deletion requirement, the datadeletion requirement is done in 2308 If the instruction inputted in 3205is not the data deletion requirement, the instruction inputted in 3205is decided that is requirement of enciphering method alteration or not.If the instruction inputted in 3205 is the requirement of encipheringmethod alteration, the requirement of enciphering method alteration isdone in 2310. If the instruction inputted in 3205 is not the requirementof enciphering method alteration, the instruction inputted in 3205 isdecided that is end of processing or not in 2311. If the instructioninputted in 3205 is the end of processing, the processing is ended byreleasing the communication connection with the image pickup apparatusin 2312. If the instruction inputted in 3205 is not the end ofprocessing, and after the establishment of communication 2304, the datatransfer processing 2306, the data deletion processing 2308, or theenciphering method alteration processing 2310, the instruction from theuser is waited in 2302 again. In case a cipher system is made afixation, 2309-2310 is omitted.

[0082]FIG. 23 is a flowchart of the data transfer processing that isexecuted in 2306 in case the instructions that a user input in 2305 inFIG. 23 are data transfer requirements. It waits for the transmission tothe image pickup apparatus of a data transfer requirement commando in2401 and the receiving of a data list commando in 2402. It waits for theinput from the input unit of specification of the data that istransmitted from a list where a user was displayed on 2404. Thespecification commando of a data specified in 2404 is transmitted to animage pickup apparatus in 2405. It waits for transmission of a dataspecified from the image pickup apparatus in 2406 and receiving of alldata. It waits for the indication of the instructions that preserve therelevant data in the storing device in 2407 after receiving of all databy a user in 2406.

[0083] In case a user indicates preservation of a data in 2407, afterstock pile retention, processing is ended to the stock pile device in2408. In case it is indicated that it is not retained a data in 2407,processing is ended.

[0084]FIG. 24 is 1 flow-sheet of the data deletion processing that isexecuted in 2308 in case the instructions that a user input in 2307 inFIG. 23 are data deletion requirements. It waits for the transmission tothe image pickup apparatus of a data deletion requirement in 2501 andthe receiving of a data list command in 2502. A list of data received in2502 is displayed on the display in 2503. It waits for the input fromthe input unit of specification of the data that is deleted from thelist where a user was displayed on 2504. The specification command of adata specified in 2504 is transmitted to the image pickup apparatus in2505, and processing is ended.

[0085]FIG. 25 is a flowchart of the cipher system alteration processingthat is executed in 2310 in case the instructions that a user input in2309 in FIG. 22 are cipher system alteration requirements. It waits forinput of the cipher key that a user uses for the enciphering method andit in 2601. When the enciphering method that a user input in 2601 and acipher key are managed the storing data to the storing device, therequirement of enciphering method alteration command is transmitted toan image pickup apparatus in 2603, and processing is ended.

[0086] The example of the enciphering method control table that isaccumulated to the stock pile device is shown in FIG. 26. In thisexample, it is shown that the cipher key 2702 is used in cipher system 1of 2701, and the cipher key 2504 is used in enciphering method 2 of2703. Rearranging a data, a enciphering and an accumulation can be donefor a cipher key. And, in case a cipher system is a fixation, this tablecan be omitted, and a display program can have a cipher system and acipher key.

[0087] A flowchart of processing of an image display program on theclient end is shown in FIG. 27. It waits for a selection of the datathat is displayed on 2802 from the input unit that does initializedprocessing in-2801. In case the enciphering, the judgment in 2803 andthe enciphering are done for the data that a user selected in 2802, animage is displayed on a display in 2810. When it is enciphered the imagedata in 2803, it is judged whether the enciphering method iscorresponding with 2804, and the enciphering method is not correspondingwith 2804, displaying “Cannot Display”.

[0088] When he enciphering method is corresponding with 2804,deciphering the image data in 2806, calculating a check-sum of an imagedata omitted a check-sum in FIG. 2807, comprising calculated check-sumand added check-sum to the image data in 2808. And when result of thecomparison the calculated check-sum and added check-sum is not anequivalence same, displaying “Falsification” on the display. In case itis not necessary to find that the user of the client terminal that isreferred to which an image data is transmitted changed an image or incase it is not necessary to control presence or absence of thealteration of an image so severely, 2807-2809 can be omitted.

[0089] The image plane example that is shown to the display unit of animage pickup apparatus in case the enciphering in the image decipheringdata organization method of JPA-10-108180 and an image cipher datadeciphering system is being done is shown in FIG. 28. As for the displayunit and 2903, 2901 is an image pickup apparatus casing main body, and2902 is the image that is displayed.

[0090]FIG. 29 is the image plane example that is shown on the clientterminal that can decipher the image data that showed an example in FIG.28 3001 is a display, and 3002 is a normally displayed image.

[0091]FIG. 30 is the image plane example that is shown on the clientterminal that cannot decipher the image data that showed an example inFIG. 28. As for the displayed image and 3102, 3103 is a key used at thetime of a enciphering, and 3101 is the cipher key in the display.

[0092]FIG. 31 is the image plane example that is shown by a check SAMcalculation at the time of cipher deciphering in the client terminalthat can decipher the image data that showed an example in FIG. 28. Asfor the displayed image and 3202, 3203 is shown, and “Falsification” isshown by 3201 in the display.

[0093] And, in case it is being enciphered in JPA-10-108180, it becomesan image on which even if a display is done on the client terminal thatcan decipher image data *(a cryptograph, in case even if check-sumcalculation is not done, a falsification is done to the image data, acryptograph key was displayed like FIG. 30, and a falsification isdisclosed easily.

[0094] It is transmitted from image data in the state of encipheringbefore accumulating the image data that was picked up that provided anenciphered function in the image pickup equipment according to the aboveexample to the accumulation equipment and enciphering in case oftransmitting image data to external equipment. Therefore, Only receiverof the image data can decipher the image data. Therefore, an image datareceiving person can certify a change addition of image data by aphotographing person. And, according to this example, check-sumcalculation result of image data is enciphered, after an addition, imagedata is enciphered, and after cryptograph deciphering, a check-sum ofimage data is calculated on the receiving person side. It is done tocertificate the image data receiver not to add change to the image dataagainst the photographing person the other person, by comparingcalculated check-sum and the extracted check-sum.

[0095] And, the enciphered method that is displayed on a state that wasenciphered while it can be displayed as an image, in case according tothis example, the receiving person side adds a change to image data isused. So it is done to certificate the image data receiver not to addchange to the image to the photographing person and the other persons,with out calculating the check-sum. The constitution of another imagepickup apparatus to implement a present invention in FIG. 32 is shown.201-202 and 205-214 is the same as FIG. 2. The image input into theimage input unit via lens 201 is input into an image converter 3301according to instructions of the user input from the input unit 209. Theenciphering the back of a cipher the obedience to the settingaccumulated to stock pile device 213 of the input image, the cipher andthe accumulation to the stock pile device and the accumulation in thestoring device are done. The image data accumulated to the accumulationequipment follows indication of a user input from input device 209 anddeciphers it after cryptograph deciphering in case it is input and iscipherd into image conversion equipment with the program that operateson processor 211. And then, in case it is not enciphered, it isdeciphered, and it is displayed to display 210, and it is displayed totelevision monitor 205 through television output device 206.

[0096] The lens 201, the image input unit 202, the television outputunit 206, the communication control unit 208, the input unit 209,display unit 210, the processor 211, the memory 212, the stock piledevice 213 and the image converter 3301 are connected via the core bus214. It is not necessary to connect the communication control unit 208to the network 215 in case the client terminal, etc. are not operatedfrom the external device 207. The storing device 213 can be removed fromthe image pickup apparatus, and it can be made a done object. It is notnecessary that the television monitor 205 should connect in case it isnot output to a television. And, a television output unit can beomitted.

[0097]FIG. 33 shows an image program constitution in an image converter3301 of the image pickup apparatus of FIG. 32. 202, 206, 208, 210 and213 is the same as FIG. 2, and 301-303 is the same as FIG. 3. The cipherby the image cipher program 3401 and the input to enciphering program302 are done for the image input into image converter 3301 from theimage input unit. The image data that a cipher happened deciphered theimage data from the cipher deciphering program is deciphered in imagedeciphering program 3402 and is output to a television output unit or adisplay unit.

[0098] Because according to the above example, coding and enciphering,cryptograph deciphering of an image and deciphering of an image areexecuted with 1 equipment, before enciphering enciphered image data, itdoes not flow on the internal bus. Therefore, an image data receivingperson can certify a change addition of image data by a photographingperson. The image pickup equipment that can certify an addition of achange by image data by a photographing person like the aboveexplanation in the image data receiving person can be provided by thepresent invention.

[0099] And, the image pickup equipment and the image data use systemthat can certify an addition of a change by image data by an image datareceiving person in the photographing person and a third party can beprovided.

1-19 (Canceled).
 20. A digital image processing system comprising: animage input unit for receiving an optical image; and an image processingdevice connectable to the image input unit, wherein the image processingdevice further comprises: an image code device for transforming theoptical image to digital image data; a processor; a memory; and astorage device, wherein said processor ciphers the digital image data toprovide encrypted digital image data before storing the digital imagedata into said storage device and transfers the encrypted digital imagedata to said storage device, wherein said memory includes informationfor indicating a relation among the encrypted digital image data,encryption method which is used for ciphering the digital image data andencryption key which is used for deciphering of the encrypted digitalimage data.
 21. A digital image processing system according to claim 20,wherein said processor uses one of a plurality of the encryption methodsbased on an instruction of a user.
 22. A digital image processing systemaccording to claim 21, wherein said memory is prohibited from beingremoved from the image processing device.
 23. A digital image processingsystem according to claim 21, wherein the image processing devicefurther comprises: a communication control unit; and an interfaceconnected to an external device used by the user, wherein saidcommunication control unit sends the encrypted digital image data to theexternal device via the interface in accordance with an instructionreceived from the external device.
 24. A digital image processing systemaccording to claim 23, wherein said processor adds a check to thedigital image data before ciphering.
 25. A digital image processingsystem comprising: a plurality of image pick up apparatuses; and anetwork connected the plurality of the image pick up apparatuses eachother, wherein some of the image pick up apparatuses comprise: an imageinput unit for receiving an optical image; an image code device fortransforming the optical image to digital image data; a processor; amemory; and a storage device, wherein one of the plurality of image pickup apparatuses sends digital image data to the other one of theplurality of image pickup apparatuses via the network, wherein saidprocessor of the other one of the plurality of image pick up apparatusesciphers the digital image data, which are sent from the one of theplurality of image pick up apparatuses, to provide encrypted digitalimage data before storing the digital image data into said storagedevice and transfers the encrypted digital image data to said storagedevice, wherein said memory includes information for indicating arelation among the encrypted digital image data, encryption method whichis used for ciphering the digital image data an encryption key which isused for deciphering of the encrypted digital image data.
 26. A digitalimage processing system according to claim 25, wherein said processor ofthe other one of the plurality of image pick up apparatuses uses one ofa plurality of the encryption methods based on an instruction of a user.27. A digital image processing system according to claim 25, whereinsaid memory is prohibited from being removed from the image processingdevice.
 28. A digital image processing system according to claim 27,wherein the other one of the plurality of image pick up apparatusesfurther comprises: a communication control unit; and an interfaceconnected to an external device used by the user, wherein saidcommunication control unit sends the encrypted digital image data to theexternal device via the interface in accordance with an instructionreceived from the external device.
 29. A digital image processing systemaccording to claim 28, wherein said processor adds a check to thedigital image data before ciphering.