CHAPTER 3
124
Syntax
BIT POSITION
MEANING
4
5
Modify the contents of the document by operations other than
those controlled by bits 6, 9, and 11.
(Revision 2)
Copy or otherwise extract text and graphics from the
document, including extracting text and graphics (in support of ac-
cessibility to users with disabilities or for other purposes).
(Revision 3 or greater)
Copy or otherwise extract text and graphics
from the document by operations other than that controlled by bit
10.
Add or modify text annotations, fill in interactive form fields, and,
if bit 4 is also set, create or modify interactive form fields (including
signature fields).
Reserved; must be 1.
(Revision 3 or greater)
Fill in existing interactive form fields (includ-
ing signature fields), even if bit 6 is clear.
(Revision 3 or greater)
Extract text and graphics (in support of ac-
cessibility to users with disabilities or for other purposes).
(Revision 3 or greater)
Assemble the document (insert, rotate, or de-
lete pages and create bookmarks or thumbnail images), even if bit 4
is clear.
(Revision 3 or greater)
Print the document to a representation from
which a faithful digital copy of the PDF content could be generated.
When this bit is clear (and bit 3 is set), printing is limited to a low-
level representation of the appearance, possibly of degraded quality.
(See implementation note 25 in Appendix H.)
(Revision 3 or greater)
Reserved; must be 1.
6
7–8
9
10
11
12
13–32
Encryption Key Algorithm
As noted earlier, one function of a security handler is to generate an encryption
key for use in encrypting and decrypting the contents of a document. Given a
password string, the standard security handler computes an encryption key as
shown in Algorithm 3.2.