摘要 |
PROBLEM TO BE SOLVED: To perform sure management against illegal copy and leakage of confidential documents by checking the illegal documents and the confidential documents leaked outside, and verifying by which copying device and by whom the documents were copied. SOLUTION: When a start button 11 is pressed, a finger print reading part 2 reads the finger print of the pushing finger. When the read finger print is registered beforehand, an authentication information synthesis part 58 reads from a peculiar information storage part 55 information peculiar to the copying device, and date and time outputted from a clock part 54, creating an authentication information by synthesizing the finger print information, the peculiar information of the copying device, date and time, to store the authentication information in an authentication information storage part 59. When copying operation is started, a dispersion/synthesis processing part 60 reads the authentication information, writes the authentication information in plural points of a read image data as a watermark information, and an image output part 4 prints an image data synthesizing the authentication information on a sheet of recording paper. |