Image processing apparatus and method for combining different images and highest security level image

ABSTRACT

Two or more designated images are combined (S 1254 ), and the type of security process to be performed for the combined image is input (S 1253 ). The security process is performed for the combined image by using the information associated with the input type of security process (S 1255 ).

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a technique of combining a plurality ofimages.

2. Description of the Related Art

Recently, various techniques associated with security have beenproposed. Japanese Patent Laid-Open No. 2001-324898 discloses a securitytechnique of composing a copy-forgery-inhibited pattern image with anoriginal image. Japanese Patent Laid-Open No. 11-179982 discloses asecurity technique of composing a digital watermark image with anoriginal image. Japanese Patent Laid-Open No. 2005-151030 discloses asecurity technique of encrypting an original image.

Even if a user wants to combine a plurality of images to which aplurality of different security processes are to be respectivelyapplied, it cannot help but combine the respective images uponapplication of different security processes to them. For this reason,the combined image obtained after combining these images becomes animage with nonuniform security levels, e.g., an image having some partswith a high security level and other parts with a low security level.For example, when a copy-forgery-inhibited pattern image is composedwith a first image, and a digital watermark image in which trackinginformation is embedded is composed with a second image, combining theseimages results in a combined image with different pages having differentsecurity levels. In addition, this combined image differs from an imagerequested by the user even from an aesthetic point of view. Assume thata copy-forgery-inhibited pattern image is composed with a first image,and nothing is composed with a second image. In this case, combiningthese images into one file only results in obtaining a combined imagewith different pages having different security levels. Furthermore, thiscombined image is not an image requested by the user even from anaesthetic point of view.

The present invention has been made in consideration of the aboveproblem, and has as its object to provide an image processing apparatuswhich can combine a plurality of images, to which a plurality ofdifferent types of processes are to be applied, in the manner desired bya user.

SUMMARY OF THE INVENTION

According to the first aspect of the present invention, the foregoingobject is attained by providing an image processing apparatuscomprising:

-   -   determination unit adapted to determine whether a presetting        image which presets, as a composing target, a security image        designated as a composing target for each of a plurality of        images which are designated to be combined exists among the        plurality of images;    -   setting unit adapted to make setting to compose a security image        with an image other than the presetting image and to output the        composed image, when the determination unit determines that the        presetting image exists; and    -   a combining unit adapted to combine the image, which is set by        the setting unit to compose with a security image and to output,        with the presetting image.

According to the second aspect of the present invention, the foregoingobject is attained by providing an image processing apparatuscomprising:

-   -   combining unit adapted to obtain a third image by combining a        first image for which setting is made to perform a first process        with a second image for which setting is made to perform a        second process; and    -   processing unit adapted to perform at least one of the first        process and the second process for the third image obtained by        the combining unit.

According to the third aspect of the present invention, the foregoingobject is attained by providing an image processing apparatuscomprising:

-   -   combining unit adapted to obtain a third image by combining a        first image with which first process information is associated        with a second image with which second process information is        associated; and    -   processing unit adapted to perform a process based on at least        one of the first process information and the second process        information for the third image obtained by the combining unit.

According to the fourth aspect of the present invention, the foregoingobject is attained by providing an image processing method comprising:

-   -   a determination step of determining whether a presetting image        which presets, as a composing target, a security image        designated as a composing target for each of a plurality of        images which are designated to be combined exists among the        plurality of images;    -   a setting step of making setting to compose a security image        with an image other than the presetting image and to output the        composed image, when it is determined in the determination step        that the presetting image exists; and    -   a combining step of combining the image which is set in the        setting step to compose with a security image and to output,        with the presetting image.

According to the fifth aspect of the present invention, the foregoingobject is attained by providing an image processing method comprising:

-   -   a combining step of obtaining a third image by combining a first        image for which setting is made to perform a first process with        a second image for which setting is made to perform a second        process; and    -   a processing step of performing at least one of the first        process and the second process for the third image obtained in        the combining step.

According to the sixth aspect of the present invention, the foregoingobject is attained by providing an image processing method comprising:

-   -   a combining step of obtaining a third image by combining a first        image with which first process information is associated with a        second image with which second process information is        associated; and    -   a processing step of performing a process based on at least one        of the first process information and the second process        information with respect to the third image obtained in the        combining step.

According to the seventh aspect of the present invention, the foregoingobject is attained by providing an image processing method comprising:

-   -   a first holding step of holding an image group;    -   a second holding step of holding information associated with a        security process which is performed to protect security of an        image;    -   a combining step of combining not less than two designated        images of the image group held in the first holding step;    -   an input step of inputting a type of security process, of        security processes corresponding to pieces of information held        in the second holding step, which is performed for the images        combined in the combining step; and    -   a processing step of performing a security process for the        images combined in the combining step by using information, of        the pieces of information held in the second holding step, which        is associated with security process having the type input in the        input step.

According to the eighth aspect of the present invention, the foregoingobject is attained by providing an image processing method comprising:

-   -   a holding step of holding a plurality of sets each including an        image and information associated with a security process which        is performed to protect security of the image;    -   a combining step of combining not less than two designated        images of an image group held in the holding step;    -   an input step of inputting a type of security process to be        performed for the images combined in the combining step;    -   a processing step of performing a security process for the        images combined in the combining step by using information, of        the respective pieces of information held in the holding step in        sets with the not less than two images, which is associated with        security process having the type input in the input step; and    -   a management step of managing the combined image for which the        security process has been performed in the processing step and        the information associated with security process having the type        input in the input step in association with each other.

According to the ninth aspect of the present invention, the foregoingobject is attained by providing an image processing apparatuscomprising:

-   -   first holding unit adapted to hold an image group;    -   second holding unit adapted to hold information associated with        a security process which is performed to protect security of an        image;    -   combining unit adapted to combine not less than two designated        images of the image group held by the first holding unit;    -   input unit adapted to input a type of security process, of        security processes corresponding to pieces of information held        by the second holding unit, which is performed for the images        combined by the combining unit; and    -   processing unit adapted to perform a security process for the        images combined by the combining unit by using information, of        the pieces of information held by the second holding unit, which        is associated with security process having the type input by the        input unit.

According to the 10th aspect of the present invention, the foregoingobject is attained by providing an image processing apparatuscomprising:

-   -   holding unit adapted to hold a plurality of sets each including        an image and information associated with a security process        which is performed to protect security of the image;    -   combining unit adapted to combine not less than two designated        images of an image group held by the holding unit;    -   input unit adapted to input a type of security process to be        performed for the images combined by the combining unit;    -   a processing unit adapted to perform a security process for the        images combined by the combining unit by using information, of        the respective pieces of information held by the holding unit in        sets with the not less than two images, which is associated with        security process having the type input by the input unit; and    -   a management unit adapted to manage the combined image for which        the security process has been performed by the processing unit        and the information associated with security process having the        type input by the input unit in association with each other.

Further features of the present invention will become apparent from thefollowing description of exemplary embodiments with reference to theattached drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram showing the functional configurations of MFPs204 and 205;

FIG. 2 is a view showing an example of the schematic configuration of asystem according to the second embodiment of the present invention;

FIG. 3 is a view showing an example of the display of a GUI fordesignating an image to be transmitted (registered) to an MFP 204 andfor designating the type of security process for the image;

FIG. 4 is a view for explaining processing in a PDL unit 105;

FIG. 5 is a block diagram showing the detailed functional configurationof an IP unit 102;

FIG. 6 is a view showing an example of the display of a GUI fordesignating, on the client terminal apparatus 203 side, images to becombined and the type of security process for the combined image;

FIG. 7 is a view showing an example of the display of a GUI forregistering a text file in the MFP 204;

FIG. 8 is a block diagram showing the hardware configuration of a clientterminal apparatus 203;

FIG. 9 is a view showing the state of dots in a copy-forgery-inhibitedpattern image;

FIG. 10A is a view showing visualization;

FIG. 10B is a view showing visualization;

FIG. 11 is a block diagram showing the hardware configuration of an MFP204;

FIGS. 12A and 12B are flowcharts showing processes to be performed by aclient terminal apparatus 203 and the MFP 204, respectively, whencombining desired image files of the image files registered in the MFP204 and performing a desired security process for the combined imagefile;

FIG. 13 is a view showing an example of the display of a GUI forselecting the type of security process for a combined image file on theGUI shown in FIG. 6 by selecting one of the text files held in a harddisk 1107 in association with combining target image files; and

FIGS. 14A and 14B are flowcharts showing processes to be performed by aclient terminal apparatus 203 and an MFP 204, respectively, whencombining desired image files of the image files registered in the MFP204 and performing a desired security process for the combined imagefile.

DESCRIPTION OF THE EMBODIMENTS

The preferred embodiments of the present invention will be described indetail with reference to the accompanying drawings.

First Embodiment

<System Configuration>

FIG. 2 is a view showing an example of the schematic configuration of asystem according to the first embodiment. As shown in FIG. 2, the systemaccording to this embodiment comprises a server apparatus 202, clientterminal apparatuses 203 a and 203 b, and MFPs (Multi FunctionPeripherals) 204 and 205, which connect to a network 201. Thesecomponents constituting the system according to this embodiment will bedescribed below.

The server apparatus 202 serves to manage the overall system, and holdsvarious kinds of data which are generated on the client terminalapparatus 203 a/203 b side and uploaded.

The client terminal apparatuses 203 a and 203 b serve to create/editvarious kinds of documents/graphic patterns by operating applicationsoftware for executing so-called DTP (Desk Top Publishing). Theseapparatuses then convert the created documents/graphic patterns into PDL(Page Description Language) data and transmit the data to the MFP 204and the MFP 205 through the network 201 in accordance with operationinstructions from operators. In the following description, the clientterminal apparatuses 203 a and 203 b will be generically called clientterminal apparatuses 203.

The MFPs 204 and 205 are color MEPs which can perform scanning,printing, and the like in full color. The network 201 comprises anetwork such as a LAN or the Internet. The server apparatus 202, clientterminal apparatus 203, and MFPs 204 and 205 can communicate data witheach other through the network 201.

Note that this embodiment is not limited to the system configurationshown in FIG. 2. That is, the embodiment is not limited to theconfiguration, the number, and the like of apparatuses of the system.

<Hardware Configuration of Client Terminal Apparatus 203>

FIG. 8 is a block diagram showing the hardware configuration of theclient terminal apparatus 203. Note that this embodiment can use acomputer such as a general PC (personal computer) or WS (workstation) asthe client terminal apparatus 203.

Reference numeral 801 denotes a CPU, which controls the overall clientterminal apparatus 203 and executes each process to be described laterwhich the client terminal apparatus 203 executes, by using programs anddata stored in a RAM 802 and a ROM 803.

The RAM 802 has an area for temporarily storing the program and dataloaded from an external storage device 806, data externally receivedthrough a NIC (network interface controller) 807, and the like. The RAM802 also has a work area used when the CPU 801 executes various types ofprocesses. The RAM 802 can provide various areas, as needed.

The ROM 803 stores setting data, a boot program, and the like for theclient terminal apparatus 203.

Reference numeral 804 denotes an operation unit, which comprises akeyboard, a mouse, and the like, and can input various kinds ofinstructions to the CPU 801 by being operated by the operator of theclient terminal apparatus 203.

Reference numeral 805 denotes a display unit, which comprises a CRT, aliquid crystal screen, or the like, and can display the processingresult obtained by the CPU 801 by using images, characters, and thelike.

The external storage device 806 is a large-capacity information storagedevice typified by a hard disk drive unit. The external storage device806 stores in advance an OS (Operating System) and programs and datawhich make the CPU 801 execute processes (to be described later) to beperformed by the client terminal apparatus 203. These programs and dataare loaded into the RAM 802 under the control of the CPU 801, as needed.

The NIC 807 serves to connect the client terminal apparatus 203 to thenetwork 201. The client terminal apparatus 203 communicates data witheach apparatus connecting to the network 201 through the NIC 807.

Reference numeral 808 denotes a bus which connects the above componentsto each other.

Note that the configuration shown in FIG. 8 is an example, and thehardware configuration of the client terminal apparatus 203 is notlimited to that shown in FIG. 8 as long as the configuration basicallyallows the client terminal apparatus 203 to execute the respectiveprocesses to be described below.

21 Functional Configurations of MFPs 204 and 205>

FIG. 1 is a block diagram showing the functional configuration of eachof the MFPs 204 and 205. Note that each component shown in FIG. 1 isimplemented by hardware or software as needed. The following descriptionwill be made on the assumption that the MFPs 204 and 205 have the samefunctional configuration, and hence the MFP 204 will be exemplified.

Reference numeral 101 denotes a scanner unit, which reads informationrecorded on a recording medium such as a sheet of paper as an imagesignal, and transmits the signal to an IP unit 102.

The IP (image processing) unit 102 A/D-converts the received imagesignal to obtain image data. The IP unit 102 then performs proper imageprocessing for the image data and transmits the image processing resultto a core unit 106 on the subsequent stage.

Reference numeral 103 denotes a FAX unit, which transmits/receivessignals through a telephone line typified by a facsimile line or thelike. Upon externally receiving a signal, the FAX unit 103 A/D-convertsthe received signal and transmits the resultant signal as data to thecore unit 106 on the subsequent stage.

Reference numeral 104 denotes a NIC, which connects the MFP 204 to thenetwork 201. The MFP 204 communicates data with each apparatusconnecting to the network 201 through the NIC 104.

Reference numeral 105 denotes a PDL unit. Upon receiving PDL (PageDescription Language) data from the client terminal apparatus 203, thePDL unit 105 bitmaps the data into an image, and transmits thebitmapping result to the core unit 106.

The core unit 106 controls the overall MFP 204 and also controls eachcomponent of the MFP 204. The core unit 106 transmits data received fromthe IP unit 102, FAX unit 103, or PDL unit 105 to a display unit 110 orprinter unit 108 on the subsequent stage in accordance with aninstruction from the client terminal apparatus 203.

The display unit 110 displays an image based on the received data. Theoperator uses the display unit 110 to check the contents of an imagewithout printing it, check (preview) the state of an image beforeprinting it, or view a thumbnail.

The printer unit 108 prints an image based on received data on arecording medium such as a sheet.

FIG. 11 is a block diagram showing the hardware configuration of the MFP204 having the above functional configuration.

Reference numeral 1101 denotes a CPU, which controls the overall MFP 204and executes each process (to be described later) to be performed by theMFP 204, by using programs and data stored in a RAM 1102 and a ROM 1103.In this embodiment, some or all functions of the IP unit 102, PDL unit105, and core unit 106 shown in FIG. 1 are implemented in the form ofprograms, and the scanner unit 101 executes the programs to implementthe respective functions. As described above, however, it suffices toimplement these functions by hardware as needed. Checked up to here.Perfect translation, further checking is probably not necessary

The RAM 1102 has an area for temporarily storing various kinds of datareceived from the client terminal apparatus 203 through the NIC 1105 andprograms and data loaded from a hard disk 1107. The RAM 1102 also has awork area used when the CPU 1101 executes various types of processes.

The ROM 1103 stores in advance programs and data which make the CPU 1101execute processes (to be described later) to be performed by the clientterminal apparatus 203. These programs and data are loaded into the RAM1102 under the control of the CPU 1101, as needed.

Reference numeral 1104 denotes a touch panel window, which correspondsto the display unit 110. The touch panel window 1104 can display variouskinds of processing results by using images, characters, and the like,and allows the operator to input a desired instruction to the CPU 1101by performing operation on the touch panel window 1104.

Reference numeral 1105 denotes a NIC, which corresponds to the NIC 104;and 1106, a button group, which comprises physical buttons and has aten-key pad for designating, for example, the number of copies.

The hard disk 1107 stores an OS (Operating System) or the like, and alsostores various kinds of data transmitted from the client terminalapparatus 203 through the network 201.

Reference numeral 1108 denotes a scanner unit, which corresponds to thescanner unit 101; 1109, a printer unit, which corresponds to the printerunit 108; 1110, a FAX unit, which corresponds to the FAX unit 103; and1111, a bus which connects the above components to each other.

21 IP Unit 102>

FIG. 5 is a block diagram showing the functional configuration of the IPunit 102 in detail. The CCD sensor of the scanner unit 101 converts anoptical signal input to the scanner unit 101 into an electrical signal,and inputs it to an A/D conversion unit 501 of the IP unit 102. If thisCCD sensor is an RGB three-line color sensor, the A/D conversion unit501 receives R, G, and B image signals, and converts the respectivecolor signals into 8-bit digital image data R0, G0, and B0,respectively.

The conversion results obtained by the A/D conversion unit 501, i.e.,the data of R0, the data of G0, and the data of B0, are transmitted to ashading unit 502 on the subsequent stage. The shading unit 502 performsknown shading correction for the received data of the respective colorsby using read signals based on a reference white plate. The shading unit502 transmits the correction results to a line interpolation unit (linedelay adjustment circuit) 503 on the subsequent stage.

In this case, the line sensors of the respective colors of the CCDsensor which the scanner unit 101 has are spaced apart from each otherby a predetermined distance. The line interpolation unit 503 correctsthe spatial shift of an image in the sub-scanning direction on the basisof received data, and transmits the correction result to an inputmasking unit 504.

The input masking unit 504 converts a read color space determined by thespectral characteristics of the R, G, and B filters of the CCD sensorwhich the scanner unit 101 has into an NTSC standard color space. Theinput masking unit 504 therefore converts the (R0, G0, B0) data inputfrom the line interpolation unit 503 into standard (R, G, B) data byperforming 3×3 matrix operation using constants unique to the apparatusin consideration of various characteristics, e.g., the sensitivitycharacteristics of the CCD sensor and the spectral characteristics ofthe illumination lamp. The input masking unit 504 transmits theconversion result to a LOG transformation unit (luminance/densitytransformation unit) 505 on the subsequent stage.

The LOG transformation unit 505 comprises a lookup table (LUT), andtransforms the R, G, and B data received from the input masking unit 504into C1, M1, and Y1 data. An output masking unit 506 receives the data(the data of C1, M1, and Y1) of the transformation result obtained bythe LOG transformation unit 505, corrects them into C, M, Y, K, LC, andLM signals (in this case, LC stands for light cyan, i.e., light-coloredcyan, and LM stands for light magenta, i.e., light-colored magenta) astoner colors of the printer unit 108, and outputs them.

A gamma transformation unit 507 transforms the data received from theoutput masking unit 506 into C, M, Y, K, LC, and LM data for imageoutput operation by using a lookup table (LUT) in consideration of thetint characteristics of toner and the density adjustment value input bythe user. Finally, a spatial filter 508 performs edge enhancement orsmoothing for the image in accordance with the received data, andtransmits the processing result to the core unit 106.

<PDL Unit 105>

FIG. 4 is a view for explaining processing in the PDL unit 105. Assumethat in this embodiment, the client terminal apparatus 203 creates imagedata comprising documents, graphic patterns, photographs, and the like.When transmitting the data to the MFP 204, the client terminal apparatus203 transmits the data to the MFP 204 upon transforming the data intoPDL data typified by the PostScript (registered product) languageavailable from Adobe.

As shown in FIG. 4, the PDL unit 105 includes a PDL rasterization unit402. Upon receiving the PDL data from the client terminal apparatus 203through the NIC 104, the PDL unit 105 performs RIP (Raster ImageProcessing) to convert the PDL data into raster image. Morespecifically, the PDL unit 105 temporarily stores the PDL data receivedfrom the client terminal apparatus 203 through the NIC 104 in the harddisk 1107, converts the data into a raster image, and manages/stores itfor each job. The converted raster image data are stored in a memorycapable of high-speed access for each of color components of C, M, Y,and K and for each job, and are set to the core unit 106 in accordancewith the state of the printer unit 108.

The contents of processing by the PDL unit 105 will be briefly describedbelow with reference to FIG. 4. This processing will be described indetail later with reference to FIG. 4.

21 Core Unit 106>

The core unit 106 will be described next.

The core unit 106 functions to perform so-called traffic control in theuse of the MFP 204. That is, bus switching is performed in accordancewith various functions in the MFP 204, e.g., the copy function, networkscan function, facsimile transmission/reception function, and displayfunction.

The following shows a pattern of bus switching for the execution of therespective functions:

-   -   copy function: scanner unit 101→core unit 106→printer unit 108    -   network scan function: scanner unit 101→core unit 106→NIC 104    -   network printer: NIC 104→core unit 106→printer unit 108    -   facsimile transmission function: scanner unit 101→core unit        106→FAX unit 103    -   facsimile reception function: FAX unit 103→core unit 106→printer        unit 108    -   display function: scanner unit 101 or FAX unit 103 or NIC        104→core unit 106→display unit 110

As described above, the image data output from the core unit 106 istransmitted to the printer unit 108 or the display unit 110.

<File Registration in MFP 204>

The following description concerns processing to be performed by theclient terminal apparatus 203 and the MFP 204 when the client terminalapparatus 203 transmits the image data (file) to the MFP 204 through thenetwork 201, and the MFP 204 registers the data.

Note that in this embodiment, in order to protect the security of animage to be registered in the MFP 204, the MFP 204 performs a securityprocess for the image to be registered before it is registered. Beforetransmitting the image to the MFP 204, therefore, the operator of theclient terminal apparatus 203 uses the GUI shown in FIG. 3 to designatethe type of security process to be performed by the MFP 204.

FIG. 3 is a view showing an example of the display of the GUI fordesignating an image to be transmitted (registered) to the MFP 204 andthe type of security process to be performed for the image. Note thatthe display unit 805 displays the GUI in FIG. 3 when the CPU 801executes driver software for the MFP 204, which is stored in theexternal storage device 806 of the client terminal apparatus 203, uponloading it into the RAM 802. Assume that the operator issues operationinstructions to the following GUIs including the GUI in FIG. 3 byoperating the operation unit 804 which the client terminal apparatus 203has. Assume also that the CPU 801 performs processing to be performed onthe client terminal apparatus 203 side as a result of operating the GUIusing the operation unit 804.

Reference numeral 301 in FIG. 3 denotes a tab for designating theregistration destination of an image file. Designating this tab willdisplay a menu displaying a list of apparatus names which can beselected as registration destinations. Selecting one of the apparatusnames displayed on the menu makes it possible to designate theregistration destination of the image. Referring to FIG. 3, “MFP-1” isselected as an output destination, which is the MFP 204.

Reference numerals 302 and 303 denote check buttons for selecting thetype of security process to be performed on the MFP 204 side for theimage transmitted to the MFP 204. The operator may designate the checkbox 302 if he/she wants to protect the security of a target image bycomposing a copy-forgery-inhibited pattern image with the target image.The operator may designate the check box 303 if he/she wants to protectthe security of this image by embedding digital watermark information inthe image (composing a digital watermark image with the target image).Assume that information about security is embedded in this digitalwatermark image. Information about security includes, for example,tracking information. This tracking information includes, for example,the name of a user who has generated an image, the serial number of anMFP storing an image, the name of a user who has stored an image, andthe time at which an image is stored.

Reference numeral 304 denotes a tab which the operator can be operatewhen designating the check box 302 and allows the operator to select acharacter sequence to be embedded in a copy-forgery-inhibited patternimage. Designating this tab will display a menu displaying a list ofcharacter sequences which can be selected as copy-forgery-inhibitedpatterns. Selecting one of the character sequences displayed on thismenu therefore makes it possible to designate a character sequence to beembedded in a copy-forgery-inhibited pattern image. Referring to FIG. 3,the character sequence “copy inhibition” is selected.

A copy-forgery-inhibited pattern image will be described below.

There has been available special paper called anti-counterfeit paper. Acharacter sequence such as “COPY” is embedded in this anti-counterfeitpaper so as not to be seen at a glance. This embedded character sequenceemerges on a copy obtained by copying the anti-counterfeit paper. Thismakes it possible to easily discriminate a document created by usingsuch anti-counterfeit paper from its copy. This can also make anybodyhesitate to use a copy of the document.

Owing to such effect of anti-counterfeit paper, this paper has been usedfor the creation of a resident card, a business form, or the like.However, anti-counterfeit paper is more expensive than plain paper.Another problem is that only the character sequence embedded at the timeof manufacture of paper emerges on a copy.

In such situation, a new technique which can obtain the same effect asthat of anti-counterfeit paper has attracted attention. This is atechnique of composing original data created by using a computer with acopy-forgery-inhibited pattern (sometimes called copy-restrainingpattern) image data inside a printer and outputting the image data withthe copy-forgery-inhibited pattern image obtained by the composingoperation. Note that a character sequence or the like is embedded inthis copy-forgery-inhibited pattern image. For this reason, the embeddedcharacter sequence emerges on a copy obtained by copying the image withthe copy-forgery-inhibited pattern as in the case of anti-counterfeitpaper. This technique has the merit of being capable of creating anoriginal at a lower cost than using anti-counterfeit paper because ofthe use of plain paper. This technique also allows to create newcopy-forgery-inhibited pattern image data every time an original iscreated. Therefore, the technique allows to freely set a color for acopy-forgery-inhibited pattern image, a character sequence to beembedded, and the like.

This copy-forgery-inhibited pattern image comprises a “remaining” areaand a “disappearing” area (or an area becoming lighter in color than“the remaining area”) on a copy. Note that the reflection densities inthese two areas are the same on the original. This makes it impossiblefor the human eye to perceive that a character sequence such as “COPY”is embedded. In this case, “remaining” means that an image on anoriginal is accurately reproduced on a copy, and “disappearing” meansthat an image on the original is not reproduced on the copy. Note that areflection density meter measures reflection densities.

Subsequently, a “remaining area” on a copy will be referred to as a“latent area”, and a “disappearing” area (or an area becoming lighter incolor than “remaining area”) will be referred to as a “background area”.

FIG. 9 is a view showing the state of dots in a copy-forgery-inhibitedpattern image. Referring to FIG. 9, an area where dots are denselyarranged is a latent area, and an area where dots are sparsely arrangedis a background area. The dots in these two areas are generated bydifferent halftone dot processes or different dither processes. Forexample, the dots in the latent area are generated by a halftone dotprocess with a low screen ruling, and the dots in the background areaare generated by a halftone dot process with a high screen ruling.Alternatively, the dots in the latent area are generated by using aclustered-dot dither matrix, and the dots in the background area aregenerated by using a dispersed-dot dither matrix.

The reproduction performance of a copying machine depends on the inputresolution and output resolution which the copying machine has. That is,the reproduction performance of the copying machine has its own limit.Assume that the dots in the latent area of a copy-forgery-inhibitedpattern image are formed larger than those which can be reproduced bythe copying machine and the dots in the background area are formedsmaller than those which can be reproduced. In this case, in general,the dots in the latent area are reproduced on a copy, but the dots inthe background area are difficult to reproduce on the copy. As a result,the latent area reproduced on the copy becomes darker than thebackground area. In the following description, making an embeddedcharacter sequence or the like look emerging by reproducing a latentarea on a copy to be darker than a background area will be referred toas visualization.

FIGS. 10A and 10B are views showing this visualization. FIGS. 10A and10B schematically show that clustered dots (large dots) are reproducedon a copy, and dispersed dots (small dots) are not accurately reproducedon the copy.

Note that a copy-forgery-inhibited pattern image is not limited to theabove arrangement, and may be configured to make a character sequencelike “COPY”, a symbol, a pattern, or the like emerge (be visualized) ona copy so as to be recognizable by the human eye. Even if a charactersequence like “COPY” is shown on a copy in an outlined state, thecharacter sequence achieves the object. Obviously, in this case, thearea of the character sequence “COPY” is referred to as a backgroundarea.

Referring back to FIG. 3, reference numeral 306 denotes a region whichthe operator can operate when designating the check box 303 and is usedto input a path for a digital watermark information file. Note thatdesignating a button 307 will display a window depicting a hierarchicaldirectory structure in the external storage device 806, and henceperforming known operation using the window makes it possible to selecta desired file. In this case, various kinds of information can bethought of as information to be embedded as digital watermarkinformation, e.g., the serial number of the MFP 204, the ID unique tothe operator, the date, the time, and the like.

Reference numeral 308 denotes an OK button. Designating the OK button308 after performing various types of setting processes by using the GUIin FIG. 3 makes the CPU 801 transmit various data set by the settingprocesses to the MFP 204.

Referring to FIG. 4, the image file transmitted from the client terminalapparatus 203 to the MFP 204 is an image file 403 whose file name is“File1.pdf”. In addition, the information (associated with a securityprocess) transmitted to the MFP 204, together with the image file 403,is a “command to add copy-forgery-inhibited pattern [copy inhibition]”.

Processing to be performed when the MFP 204 receives the image file 403and a command from the client terminal apparatus 203 will be describednext with reference to FIG. 4.

When the MFP 204 receives the image file 403 and a command through theNIC 104, the PDL rasterization unit 402 changes the file name to“File1_doc.pdf” and stores the file as a file 405 in the hard disk 1107without rasterizing the image file 403 at the time of file registration.

In addition, the MFP 204 creates a text file 406, with the file name“File1_jmn.txt”, describing the font information of the charactersequence “copy inhibition” and information (a superimposed pattern ofcharacter sequences or the like) associated with an overallcopy-forgery-inhibited pattern by referring to the command received fromthe client terminal apparatus 203, together with the image file 403, andstores the file in the hard disk 1107.

With the above processing, the MFP 204 stores, in the hard disk 1107thereof, the image file and text file transmitted from the clientterminal apparatus 203 as files each having a file name containing thecharacter sequence “File1”. This character sequence associates thesefiles with each other. Note that the respective file names and anassociation method are not limited to the above methods, and variousother methods are conceivable.

Assume that the client terminal apparatus 203 has then transmitted animage file having the file name “File2.pdf” and information (a “commandto embed digital watermark information”) associated with a securityprocess for the image file to the MFP 204.

In this case, the MFP 204 performs the same processing as that describedabove, i.e., storing, in the hard disk 1107, the image file having thefile name “File2.pdf” as a file having the file name “File2_doc.pdf”. Inaddition, the MFP 204 stores, in the hard disk 1107, the commandtransmitted to the MFP 204, together with this image file, as a textfile having the file name “File_jmn.txt”. The file having the file name“File2_jmn.txt” describes embedded information, e.g., the data of animage or character used as digital watermark information, an embeddingposition, and an embedding size.

Note that when registering a file containing images over a plurality ofpages in the MFP 204, it suffices to designate pages to be registered onthe GUI.

With the above processing, the MFP 204 stores the image file transmittedfrom the client terminal apparatus 203 in the hard disk 1107 which theMFP 204 has, and also stores, as a text file, information associatedwith a security process to be performed for the image file. The imagefile and the text file are associated with each other by making themhave file names containing a shared character sequence.

<File Combining>

The next description is about the processing of combining image files,of the plurality of image files registered in the hard disk 1107 of theMFP 204 by the above registration processing, which are designated bythe client terminal apparatus 203.

FIG. 6 is a view showing an example of the display of a GUI for makingthe user on the client terminal apparatus 203 side to designate imagesto be combined and designate the type of security process for thecombined image. Referring to FIG. 6, reference numeral 601 denotes a tabfor selecting in which MFP images are to be combined. Designating thistab will display a menu displaying a list of the names of MFPs which cancommunicate with the client terminal apparatus 203. Therefore, selectingone of the MFP names displayed on this menu makes it possible todesignate an MFP which is holding images to be combined. Assume that inthe case shown in FIG. 6, “MFP-1” has been selected, which is the MFP204.

Reference numeral 602 denotes a tab for selecting combining targetimages. Selecting this tab will display a menu displaying a list of thenames of files held in the currently selected MFP (the MFP 204 in thiscase).

When the operator designates the tab 601 and selects one of the MFPnames, the CPU 801 requests the MFP with the selected MFP name (MFP 204)to acquire the file names of all image files stored in the hard disk1107. Upon detecting this request, the CPU 1101 acquires the file namesof all the image files stored in the hard disk 1107 and transmits themto the client terminal apparatus 203. Therefore, designating the tab 602on the GUI in FIG. 6 makes it possible to display the list of theacquired file names, i.e., the list of the file names of all the imagefiles stored in the hard disk 1107 which the MFP with the MFP nameselected with the tab 601 has.

Selecting one of the file names from the menu displayed by designatingthe tab 602, and designating a reference button 603 will display thecontents (i.e., the image) of the selected file in, for example, anotherwindow. In addition, designating a selection button 604 will confirm theselected image file as a combining target image and additionally displaythe file name of the image file in a region 607. The file names of imagefiles confirmed in this manner are displayed in the region 607, and allthese files are combining target image files which will be describedbelow.

Reference numerals 605 and 606 denote check buttons for selecting asecurity process to be performed for one file obtained by combining theimage files having the file names displayed in the region 607. That is,when the operator wants to protect the security of an combined imagefile by composing a copy-forgery-inhibited pattern image with the imagefile, he/she may designate the check button 605. When the operator wantsto protect the security of this image file by embedding digitalwatermark information (composing a digital watermark image), he/she maydesignate the check button 606.

Reference numeral 608 denotes a region for inputting the file name ofone file obtained by combining the image files having the file namesdisplayed in the region 607.

Reference numeral 609 denotes an OK button. When the operator designatesthe OK button 609 after selecting the file names of combining targetimages, the file name of one file obtained by combining them, and thetype of security process to be performed for this one file by using theGUI in FIG. 6, the CPU 801 transmits the contents set by using the GUIin FIG. 6 to the destination designated with the tab 601, i.e., the MFP204.

Upon receiving the setting information set by using the GUI in FIG. 6from the client terminal apparatus 203 and detecting the information,the CPU 1101 of the MFP 204 loads, into the RAM 1102, the image files(the image files whose file names are displayed in the region 607), ofthe plurality of image files stored in the hard disk 1107, which areconfirmed as combining target images, and combines the loaded imagefiles. Referring to FIG. 4, the created combined image file is a file407 (file name “Gattai.cmb”). The CPU 1101 then performs the securityprocess designated by one of the check buttons 605 and 606 with respectto one image file (combined image file) obtained by combining the abovefiles.

If the designated security process is the process of composing andadding a copy-forgery-inhibited pattern image, the CPU 1101 performs theprocess of adding a predetermined character sequence to the combinedimage file. Since information associated with suchcopy-forgery-inhibited pattern superimposition is created in advance anddefined by a text file stored in the hard disk 1107, it suffices to usethis text file at the time of copy-forgery-inhibited patternsuperimposition.

If, however, the text files stored in the hard disk 1107 in associationwith the combining target image files designated by using the GUI inFIG. 6 include text files describing the execution of a security processby copy-forgery-inhibited pattern superimposition, it suffices to selectone of such text files and perform a security process for a combinedimage file.

If the designated security process is the process of embedding digitalwatermark information (i.e., composing a digital watermark image), theCPU 1101 performs the process of embedding predetermined digitalwatermark information in the combined image file. Since informationassociated with such an embedding process is defined by a text filecreated in advance and stored in the hard disk 1107, it suffices to usethis text file at the time of the embedding process.

If, however, the text files stored in the hard disk 1107 in associationwith the combining target image files designated by using the GUI inFIG. 6 include text files describing the execution of a security processby embedding digital watermark information, it suffices to select one ofsuch text files and perform a security process for a combined imagefile.

FIGS. 12A and 12B are flowcharts showing the processes to be performedby the client terminal apparatus 203 and the MFP 204, respectively, whencombining desired image files of the image files registered in the MFP204 and performing a desired security process for a combined image file.The external storage device 806 stores a program and data for making theCPU 801 execute processing (steps S1201 to S1213) performed by theclient terminal apparatus 203 in the flowcharts in FIGS. 12A and 12B.The program and data are loaded into the RAM 802 under the control ofthe CPU 801. The CPU 801 performs processing by using them. As aconsequence, the client terminal apparatus 203 executes steps S1201 toS1213 to be described below.

The ROM 1103 and the hard disk 1107 store a program and data for makingthe CPU 1101 execute processing (steps S1251 to S1256) performed by theMFP 204. The program and data are loaded into the RAM 1102 under thecontrol of the CPU 1101, as needed. The CPU 1101 performs processing byusing them. As a consequence, the MFP 204 executes steps S1251 to S1256to be described below.

When the operator of the client terminal apparatus 203 inputs aninstruction to start the GUI shown in FIG. 6 by using the operation unit804, the CPU 801 detects this, loads a program and data associated withthis GUI, which are stored in the external storage device 806, into theRAM 802, and executes processing (step S1201). With this operation, thedisplay unit 805 displays the GUI shown in FIG. 6.

When the operator designates the tab 601 on the GUI in FIG. 6 andselects the MFP 204, the CPU 801 transmits a request to the MFP 204 toacquire the file names of all the image files stored in the hard disk1107 of the MFP 204 (step S1202).

Upon detecting this request, the CPU 1101 of the MFP 204 acquires thefile names of all the image files stored in the hard disk 1107 (stepS1251), and transmits the acquired image file names to the clientterminal apparatus 203 (step S1252).

The CPU 801 of the client terminal apparatus 203 receives the image filenames and loads them into the RAM 802 (step S1203). The CPU 801 thenchecks whether the tab 602 is designated (step S1204). If it isdetermined as a result of this check that the tab 602 is not designated,the process advances to step S1208. If it is determined that the tab 602is designated, the process advances to step S1205 to make the displayunit 805 display a menu displaying the list of image file names loadedinto the RAM 802 in step S1203 (step S1205).

If none of the image file names displayed on this menu is selected, theprocess advances to step S1208 through step S1206. If any one of them isselected, the process advances to step S1207 through step S1206 toadditionally display the selected image file name in the region 607(step S1207). If the CPU 801 checks (step S1208) whether the checkbutton 605 or 606 is selected, and determines that the check button 605is selected, i.e., the process using a copy-forgery-inhibited pattern isselected as a security process, the flow advances to step S1209 to set acommand to compose a copy-forgery-inhibited pattern image, e.g., a“command to add copy-forgery-inhibited pattern [copy inhibition]” (stepS1209). If the check button 606 is selected, i.e., the process usingdigital watermark information is set as a security process, the flowadvances to step S1210 to set a command to use digital watermarkinformation, e.g., a “command to embed digital watermark information(compose a digital watermark image)” (step S1210).

If the file name of the combined image file is input to the region 608,the CPU 801 acquires this (step S1211). The CPU 801 then checks whetherthe OK button 609 is designated (step S1212). If this button isdesignated, the process advances to step S1213 to transmit various kindsof information set by using the GUI in FIG. 6 to the MFP 204 (stepS1213).

Upon receiving information transmitted from the client terminalapparatus 203, the CPU 1101 of the MFP 204 loads the information intothe RAM 1102 (step S1253). The CPU 1101 loads, into the RAM 1102, imagefiles (the image files having the file names displayed in the region607), of the image files held in the hard disk 1107, which are confirmedas combining target images by referring to the acquired information, andcombines them (step S1254). The file name of the combined image file isthe file name acquired from the region 608.

The CPU 1101 performs the security process designated with one of thecheck buttons 605 and 606 with respect to the combined image file byreferring to the information loaded into the RAM 1102 in step S1253(step S1255). In this security process, the CPU 1101 composes acopy-forgery-inhibited pattern image or embeds digital watermarkinformation (composes a digital watermark image). When superimposing acopy-forgery-inhibited pattern, the CPU 1101 adds a predeterminedcharacter sequence to the combined image file. On the other hand, whenembedding digital watermark information (composing a digital watermarkimage), the CPU 1101 embeds predetermined digital watermark informationin the combined image file (composes a digital watermark image).

The MFP 204 then outputs the combined image file to which the securityprocess has been performed to the output destination designated by theclient terminal apparatus 203 (step S1256). Such output destinationsinclude the printer unit 108 and the display unit 110. If notspecifically designated, the MFP 204 may register the combined imagefile, to which the security process has been performed, in the hard disk1107 again.

In addition, the combined image file is finally stored in the hard disk1107. When this combined image file is to be stored, it is necessary toadd information for specifying the security process which has beenexecuted for the combined image file. When the combined image file is tobe stored, therefore, the text file used to perform the security processfor the combined image file is associated with the combined image file.

Second Embodiment

The first embodiment has exemplified the two security processes, i.e.,the process of composing a copy-forgery-inhibited pattern image and theprocess of composing a digital watermark image. However, other processescan be used as security processes. For example, an encrypting techniquemay be used. Such encrypting techniques include, for example, atechnique of encrypting an image by using a known Hash function.

In order to select one of the process of composing acopy-forgery-inhibited pattern image, the process of composing a digitalwatermark image, and the process of encrypting as a security process tobe performed for an image to be registered in an MFP 204, it suffices toset a corresponding check box on the GUI in FIG. 3. This allows theoperator to select an encrypting technique in addition to the process ofcomposing a copy-forgery-inhibited pattern image and the process ofcomposing a digital watermark image as a security process to beperformed for an image to be registered in the MFP 204.

In addition, in order to select one of the process of composing acopy-forgery-inhibited pattern image, the process of composing a digitalwatermark image, and the process of encrypting as a security process tobe performed for a combined image file, it suffices to set acorresponding check box on the GUI in FIG. 6. This allows the operatorto select an encrypting technique in addition to the process ofcomposing a copy-forgery-inhibited pattern image and the process ofcomposing a digital watermark image as a security process to beperformed for a combined image file. Note that in this case, it isnecessary to create a text file describing information associated withan encrypting process (e.g., an encrypting scheme and parametersassociated with it). This text file is used for an encrypting process.

Third Embodiment

In the first embodiment, the operator of the client terminal apparatus203 selects combining target images from the images registered in theMFP 204 and the type of security process to be performed for a combinedimage file. However, the operator may perform these selecting operationsby using a touch panel window 1104 which an MFP 204 has.

If, for example, the operator of the MFP 204 wants to combine two ormore desired images of the image group (the plurality of images)registered in the MFP 204 and also wants to perform a desired securityprocess for a combined image file, he/she operates the touch panelwindow 1104 and a button group 1106 to input an instruction to display,on the touch panel window 1104, a GUI obtained by omitting the tab 601from the GUI in FIG. 6. This makes a CPU 1101 display the designatedGUI.

When the operator selects combining target images by using such a GUIand the type of security process by using the touch panel window 1104and the button group 1106 and designates an OK button 609, the CPU 1101performs the processing in steps S1254 to S1256.

As describe above, an external apparatus from the viewpoint of the MFP204, e.g., the client terminal apparatus 203, may perform the aboveselecting operations. However, it suffices to perform such operations byusing an operation interface which the MFP 204 has.

Fourth Embodiment

The first embodiment selects and determines the process of composing acopy-forgery-inhibited pattern image or the process of composing adigital watermark image as a security process for a combined image fileregardless of the type of security process set for each of combiningtarget images.

In this embodiment, when the user selects one of the text files held ina hard disk 1107 in association with combining target image files toperform a security process for a combined image file, the selected textfile is set to be associated with the remaining combining target imagefiles. That is, the processing based on the text file selected by theuser becomes a security process for a combined image file.

FIG. 13 is a view showing a GUI for making the user select one of thetext files held in the hard disk 1107 in association with combiningtarget image files so as to select the type of security process for acombined image file on the GUI shown in FIG. 6. The same referencenumerals as in FIG. 6 denote the same parts in FIG. 13, and adescription thereof will be omitted.

Referring to FIG. 13, reference numeral 1301 denotes a tab. Designatingthe tab 1301 makes it possible to display a menu displaying a list ofthe file names of text files held in the hard disk 1107 in associationwith all the image files (the image files additionally displayed in aregion 1305, i.e., the four image files File1_doc.pdf, File4_doc.pdf,File6_doc.pdf, and File7_doc.pdf) which are currently confirmed ascombining target images.

When the user selects one text file from the menu displayed upondesignation of the tab 1301 and designates a reference button 1302, thecontents of the selected text file are displayed in, for example,another window.

When the user designates a selection button 1303, the selected text fileis confirmed as a text file to be used instead of the four text filesdescribed above, and the file name of the confirmed text file isdisplayed in a region 1307. This confirmed text file is a text file tobe used when a security process is performed for a combined image file.

In this case, as in the region 607 in FIG. 6, in the region 1305, thefile names of the four image files currently confirmed as combiningtarget images are displayed. In a region 1306, text files (the four textfiles File1_jmn.txt, File4_jmn.txt, File6_jmn.txt, and File7_jmn.txt inFIG. 13) respectively associated with the fourth image files aredisplayed.

As described above, when the user selects a new text file from the menudisplayed by designating the tab 1301 instead of the four text filesdescribed above and then designates the selection button 1303, the textfile (File1_jmn.txt in FIG. 13) is confirmed instead of the four textfiles and is displayed in the region 1307.

As described above, in this embodiment, the user selects one of the textfiles associated with combining target images as a text file to be usedfor a security process performed for a combined image file. If,therefore, there is at least one of combining target images for whichthe process of composing a copy-forgery-inhibited pattern image is set,the user can select the process of composing a copy-forgery-inhibitedpattern image as a security process for a combined file. If, however,there is no image among the combining target images for which theprocess of composing a copy-forgery-inhibited pattern image is set, theuser cannot select the process of composing a copy-forgery-inhibitedpattern image as a security process for a combined file.

Referring to FIG. 13, reference numeral 1304 denotes a preview button.When the user designates the preview button 1304, the image filecurrently selected with a tab 602 is rasterized into an image. Thesecurity process selected with the tab 1301 is then performed for theraster image, and the resultant image is displayed in, for example,another window.

In this embodiment as well, the hard disk 1107 stores the combined imagefile. When storing this combined image file, however, it is necessary toadd information for specifying which type of security process has beenperformed for the combined image file. When a combined image file is tobe stored, therefore, a text file used for a security process for thecombined image file is associated with the combined image file.

In addition, this embodiment allows the user to select one of aplurality of types of security processes and also allows the user toselect one of a plurality of security processes. This will be describedmore comprehensively by taking an example.

Assume that a first process is applied to a first image, and a secondprocess is applied to a second image. In this case, this embodiment hasdisclosed a technique of allowing the user to select any one of thefirst and second processes upon combining the first and second images.With this technique, when setting information for composing a firstcopy-forgery-inhibited pattern image (an embedded character sequence:copy inhibition, color: cyan) with the first image is set together withsecond setting information for composing a second copy-forgery-inhibitedpattern image (an embedded character sequence: invalid, color: magenta)with the second image, one of the copy-forgery-inhibited pattern imagesis composed with an combined image. This can preventcopy-forgery-inhibited pattern images of different colors from beingcomposed with different pages of a combined image. That is, this canprevent aesthetic deterioration.

Obviously, in this embodiment as well, when setting information forcomposing the first copy-forgery-inhibited pattern image with the firstimage is set together with second setting information for composing thesecond copy-forgery-inhibited pattern image (the embedded charactersequence: invalid, color: magenta) with the second image, either acopy-forgery-inhibited pattern image or a digital watermark image iscomposed with a combined image.

Obviously, when combining an image obtained by encrypting any one ofcombining target images (an image with which an encrypting process isassociated as a text file) with another image, it is necessary tocombine the encrypted image with another image upon decoding theencrypted image. This applies to other embodiments.

All the above embodiments have been described on the assumption thatsome types of security processes are applied to all combining targetimages. For this reason, when the first and second images are to becombined, setting has been made to apply some types of securityprocesses to both the first image and the second image.

In the present invention, however, there is no need to apply some typesof security processes to all combining target images, and it suffices tomake setting to apply a security process to any one of combining targetimages. For example, it suffices to make setting to compose acopy-forgery-inhibited pattern image with the first image while makingsetting to apply no security process to the second image.

In such a case, obviously, the first and second images are combinedafter setting is made to compose a copy-forgery-inhibited pattern image,set for the first image, with the second image. This is because the GUIin FIG. 6 allows the user to only select a copy-forgery-inhibitedpattern image composing process as a security process to be selected.

FIGS. 14A and 14B are flowcharts showing the processes to be performedby a client terminal apparatus 203 and an MFP 204, respectively, whencombining desired image files of the image files registered in the MFP204 and performing a desired security process for a combined image file.

An external storage device 806 stores a program and data for making aCPU 801 execute processing performed by the client terminal apparatus203 in the flowcharts in FIGS. 14A and 14B. The program and data areloaded into a RAM 802 under the control of the CPU 801. The CPU 801performs processing by using them.

A ROM 1103 and a hard disk 1107 store a program and data for making aCPU 1101 execute processing performed by the MFP 204. The program anddata are loaded into a RAM 1102 under the control of the CPU 1101. TheCPU 1101 performs processing by using them.

When the operator of the client terminal apparatus 203 inputs aninstruction to start the GUI shown in FIG. 13 by using an operation unit804, the CPU 801 detects this, loads a program and data associated withthis GUI, which are stored in the external storage device 806, into theRAM 802, and executes processing (step S1401). With this operation, adisplay unit 805 displays the GUI shown in FIG. 13.

When the operator designates a tab 601 on the GUI in FIG. 13 and selectsthe MFP 204, the CPU 801 transmits a request to the MFP 204 to acquirethe file names of all the image files stored in the hard disk 1107 ofthe MFP 204 (step S1202).

Upon detecting this request, the CPU 1101 of the MFP 204 acquires thefile names of all the image files stored in the hard disk 1107 and thefile names of text files stored in the hard disk 1107 in associationwith the respective image files (step S1451), and transmits the acquiredimage file names and text file names to the client terminal apparatus203 (step S1452).

The CPU 801 of the client terminal apparatus 203 receives the image filenames and loads them into the RAM 802 (step S1401). The CPU 801 thenchecks whether the tab 602 is designated (step S1204). If it isdetermined as a result of this check that the tab 602 is not designated,the process advances to step S1403. If it is determined that the tab 602is designated, the process advances to step S1401 to make the displayunit 805 display a menu displaying the list of image file names loadedinto the RAM 802 in step S1401 (step S1205).

If none of the image file names displayed on this menu is selected, theprocess advances to step S1403 through step S1206. If any one of them isselected, the process advances to step S1402 through step S1206.

In step S1402, the CPU 801 additionally displays the selected image filename in the region 1305 and also additionally displays the text filename loaded into the RAM 802 in step S1401 as a text file nameassociated with the image file with the selected image file name in acorresponding portion in the region 1306 (step S1402).

The CPU 801 checks whether the tab 1301 is designated (step S1403) If itis determined as a result of this check that the tab 1301 is designated,the process advances to step S1211. If it is determined that the tab1301 is designated, the process advances to step S1404 to make thedisplay unit 805 display a menu displaying a list of the text file namesloaded into the RAM 802 in step S1401 (step S1404).

If none of the text file names displayed on this menu is selected, theprocess advances to step S1211 through step S1405. If any one of them isselected, the process advances to step S1406 through step S1405.

In step S1406, the CPU 801 displays the selected text file name in theregion 1307 (step S1406).

If the file name of the combined image file is input to a region 608,the CPU 801 acquires this (step S1211). The CPU 801 then checks whetheran OK button 609 is designated (step S1212). If this button isdesignated, the process advances to step S1407 to transmit various kindsof information set by using the GUI in FIG. 13 to the MFP 204 (stepS1407).

Upon receiving information transmitted from the client terminalapparatus 203, the CPU 1101 of the MFP 204 loads the information intothe RAM 1102 (step S1453).

The CPU 801 then refers to the information loaded into the RAM 1102 instep S1453 to determine whether there is an image file, of the imagefiles confirmed as combining target images (the image files having thefile names displayed in the region 1305), which is associated with thetext file selected with the tab 1301 (the text file of the text filename received from the client terminal apparatus 203 in step S1453)(step S1454).

That is, the CPU 801 determines whether there is an image file, of theplurality of images, for which a security image designated as acombining target for each of a plurality of images for which a combininginstruction has been issued (a security image as a combining targetindicated by the text file having the text file name received from theclient terminal apparatus 203 in step S1453, e.g., acopy-forgery-inhibited pattern image or a digital watermark image) isset in advance as a combining target.

If it is determined that there is no such image file, the processadvances to step S1456. If there is such an image file, the processadvances to step S1455.

In step S1455, the CPU 801 associates this text file with an image file,of the image files confirmed as combining target images, which is notassociated with the text file selected with the tab 1301. That is, theCPU 801 makes setting to compose a security image (a security image as acombining target indicated by the text file having the text namereceived from the client terminal apparatus 203 in step S1453) with animage file, of the image files confirmed as combining target images,which is not associated with the text file selected with the tab 1301,and output the resultant data.

In step S1456, the CPU 801 loads image files, of the image files held inthe hard disk 1107, which are confirmed as combining target images intothe RAM 1102, and combines them (step S1254). The file name of thecombined image file is the file name acquired from the region 608.

In addition, the CPU 801 refers to the information loaded into the RAM1102 in step S1453 and performs a security process for the combinedimage file in accordance with the text file selected with the tab 1301(the text file having the text file name received from the clientterminal apparatus 203 in step S1453) (step S1455).

The CPU 801 then outputs the combined image file to which the securityprocess has been performed to the output destination designated by theclient terminal apparatus 203 (step S1256). Such output destinationsinclude the printer unit 108 and display unit 110. If not specified, theCPU 801 may register, in the hard disk 1107 again, the combined imagefile to which the security process has been performed.

Furthermore, the combined image file is finally stored in the hard disk1107. When this combined image file is to be stored, it is necessary toadd information for specifying the security process which has beenexecuted for the combined image file. When the combined image file is tobe stored, therefore, the text file used to perform the security processfor the combined image file is associated with the combined image file.

Fifth Embodiment

In this embodiment, the text files registered in an MFP 204 are uploadedto a client terminal apparatus 203, and the client terminal apparatus203 creates one text file by using a plurality of such text files, anduploads the file to the MFP 204 again. This makes it possible to editthe data registered in the MFP 204 again.

FIG. 7 is a view showing an example of the display of a GUI forregistering a text file in the MFP 204. The GUI shown in FIG. 7 is usedto register, in the MFP 204, a new text file created by using aplurality of text files uploaded from the MFP 204 (which may be newlycreated instead of being uploaded)

Referring to FIG. 7, reference numeral 701 denotes a tab. Designatingthis tab will display a menu for displaying a list of the names of MFPswhich can communicate with the client terminal apparatus 203. Referencenumeral 702 denotes a region for inputting a path for a text file to beregistered. Since an external storage device 806 temporarily stores thetext file created on the client terminal apparatus 203 side, a storagepath is input to the region 702.

Reference numeral 703 denotes a reference button. Designating thisbutton will show a window depicting a hierarchical directory structurein the external storage device 806. Performing known operation using thewindow makes it possible to select a desired file.

Reference numeral 704 denotes an OK button. Designating the OK button704 upon determining a registration destination and a text file to beregistered by using the GUI in FIG. 7 causes the client terminalapparatus 203 to transmit the text file to be registered to theregistration destination.

Other Embodiment

Obviously, the object of the present invention is achieved in thefollowing manner. That is, a recording medium (or a storage medium)storing software program codes for implementing the functions of theabove embodiments is supplied to a system or apparatus. The computer (orthe CPU or MPU) of the system or apparatus reads out and executes theprogram codes stored in the recording medium. In this case, the programcodes read out from the recording medium implement the functions of theabove embodiments by themselves, and the recording medium storing theprogram codes constitutes the present invention.

An operating system (OS) or the like operating on the computer executespart or all of actual processing on the basis of the instructions of theprogram codes by executing the program codes read out by the computer.Obviously, the present invention incorporates a case wherein thefunctions of the above embodiments are implemented by the processing.

Assume that the program codes read out from the recording medium arewritten in a memory built in a feature expansion card inserted in thecomputer or a feature expansion unit connected to the computer.Obviously, the present invention incorporates a case wherein the CPU orthe like built in the feature expansion card or feature expansion unitperforms part or all of actual processing on the basis of theinstructions of the program codes, and the functions of the aboveembodiments are implemented by the processing.

When the present invention is applied to the above recording medium, therecording medium stores program codes corresponding to the flowchartsdescribed above. Each embodiment described above has mainly exemplifiedthe arrangement configured to make the user select one of a plurality ofsecurity processes for a plurality of images for which the plurality ofsecurity processes are to be respectively executed. However, the presentinvention is not limited to this. For example, the present invention mayincorporate an arrangement configured to make the user select some of aplurality of security processes for a plurality of images for which theplurality of security processes are to be respectively executed. Assumethat encrypting processing has been performed for the first image, andsetting is made to compose a copy-forgery-inhibited pattern image withthe second image. In this case, first of all, the first image isreconstructed upon being decoded, and the reconstructed first image iscombined with the second image. This arrangement may be configured toperform encrypting processing after composing a copy-forgery-inhibitedpattern image with the combined image.

Each embodiment described above has exemplified the case wherein theuser is made to select a desired process from a plurality of securityprocesses. However, the object of the present invention can be achievedeven by an arrangement which is not configured to make the user select.For example, a storage means stores information indicating that securitylevels increase in the order of process of composingcopy-forgery-inhibited pattern image >process of composing digitalwatermark image >encrypting process. When combining a plurality ofimages, the CPU may select which security process is executed for acombined image, upon determining which one of the security processes setfor the respective images has the highest security level. Although theorder of security levels is exemplified as follows: process of composingcopy-forgery-inhibited pattern image >process of composing digitalwatermark image >encrypting process, the order is not limited to this.This is because different users and managers will consider therespective processing techniques in different manners.

While the present invention has been described with reference toexemplary embodiments, it is to be understood that the invention is notlimited to the disclosed exemplary embodiments. The scope of thefollowing claims is to be accorded the broadest interpretation so as toencompass all such modifications and equivalent structures andfunctions.

This application claims the benefit of Japanese Patent Application No.2005-370894, filed Dec. 22, 2005, which is hereby incorporated byreference herein in its entirety.

1. An image processing apparatus comprising: a combination unit thatcombines a first image to a M-th (M≧2) image to generate a (M+1)-thimage; and a processing unit that compares security levels of a firstsecurity image to a M-th security image which are set in order toprotect securities of the first image to the M-th image respectively,and composing a security image having highest security level with the(M+1)-th image.
 2. The apparatus according to claim 1, whereincomposition processing of the security image is a processing ofembedding digital watermark information or a processing of combining acopy-forgery-inhibited pattern image.
 3. The apparatus according toclaim 1, wherein if a target image to be combined is encrypted, saidcombination unit decrypts the target image and then combines thedecrypted target image with another image.
 4. An image processing methodto be executed by an image processing apparatus comprising: acombination step, executed by a combination unit of the image processingapparatus, of combining a first image to a M-th (M≧2) image to generatea (M+1)-th image; and a processing step, executed by a processing unitof the image processing apparatus, of comparing security levels of afirst security image to a M-th security image which are set in order toprotect securities of the first image to the M-th image respectively,and composing a security image having highest security level with the(M+1)-th image.
 5. A computer-readable storage medium encoded withmachine readable instructions for causing a computer to execute an imageprocessing method, the method comprising: a combination step, executedby a combination unit of the image processing apparatus, of combining afirst image to a M-th (M≧2) image to generate a (M+1)-th image; and aprocessing step, executed by a processing unit of the image processingapparatus, of comparing security levels of a first security image to aM-th security image which are set in order to protect securities of thefirst image to the M-th image respectively, and composing a securityimage having highest security level with the (M+1)-th image.