Digital imaging system for evidentiary use
First Claim
1. System for authenticating digital information, comprising:
- a) an image acquisition device for producing an original array of two-dimensional digital information;
b) means for obtaining current date and time information from satellite or radio broadcasts;
c) means for obtaining current location information from satellite or radio broadcasts;
d) means for identifying a Sensor ID for the image acquisition device;
e) an encoder for converting date/time, location, and Sensor ID into two-dimensional format called the Encoded Data Array;
f) an embedder for combining the Encoded Data Array and the Original Array into a new Composite Array g) an encrypter for transforming the Composite Array into another two-dimensional array called the Encrypted Composite Array;
h) a Transmission Process to transfer the Encrypted Composite Array to the intended recipient;
i) a decrypter to restore the Composite Array j) a decoder with fault indicator when date/time, location, and source cannot be decoded;
k) an Encoding Extractor for removing the Encoded Data Array from the Decrypted Composite Array;
l) means for restoring the Original Array at pixel locations used for the Encoding; and
m) means for determining changes between the Restored Original Array and the Original Array.
1 Assignment
0 Petitions
Accused Products
Abstract
The Evidentiary Imaging System (EIS) provides secure storage or transmission of a digital image into which is encoded the date, time, and location at which the image was taken, along with the camera ID and frame number. The encoding is dispersed throughout the image so that the image cannot be modified without distorting the encoding. The image may be encrypted for additional security. Annotation can be superimposed on the encoded or encoded and encrypted image to classify or identify the image to human or automated scanning systems. The annotation can also be used to key the decoding and decryption tasks. The EIS produces imagery which may be authenticated as to originality, time and location of imaging. The imagery may be stored, duplicated, and transmitted while retaining its authenticity. However, any modifications to the image, including any local changes, are readily detected because the encoding will not decode correctly. The EIS is designed to provide imagery which may be used for evidentiary proof of authenticity, ownership, originality, date and time, and location of imaged events. Certain users of EIS systems, such as police forensics labs, may have a central depository for the decoding and decryption keys used with their cameras. Other users may rely upon authentication services provided by the EIS manufacturer or an independent expert in the EIS technique.
While many different schemes for encoding and encryption may be used, FlashCorrelation® provides a computationally simple and rapid method for encoding each item of information; allowing for separate or total encoding and readout of encoding layers representing: date, time, location, camera ID, and frame number. As covered in the issued FlashCorrelation® U.S. Pat. Nos. 5,583,950 and 5,982,932, readout and authentication can be done by one party authorized to have the decoding and decryption schemes, or readout and authentication may require two or more parties.
-
Citations
34 Claims
-
1. System for authenticating digital information, comprising:
-
a) an image acquisition device for producing an original array of two-dimensional digital information;
b) means for obtaining current date and time information from satellite or radio broadcasts;
c) means for obtaining current location information from satellite or radio broadcasts;
d) means for identifying a Sensor ID for the image acquisition device;
e) an encoder for converting date/time, location, and Sensor ID into two-dimensional format called the Encoded Data Array;
f) an embedder for combining the Encoded Data Array and the Original Array into a new Composite Array g) an encrypter for transforming the Composite Array into another two-dimensional array called the Encrypted Composite Array;
h) a Transmission Process to transfer the Encrypted Composite Array to the intended recipient;
i) a decrypter to restore the Composite Array j) a decoder with fault indicator when date/time, location, and source cannot be decoded;
k) an Encoding Extractor for removing the Encoded Data Array from the Decrypted Composite Array;
l) means for restoring the Original Array at pixel locations used for the Encoding; and
m) means for determining changes between the Restored Original Array and the Original Array. - View Dependent Claims (2, 3, 4, 5, 7, 8, 9, 12, 13, 14, 15, 16, 17, 19, 20)
-
-
6. System as in claims land 2 in which the Decoder utilizes FlashCorrelation<
- <
to select pixel locations of the Encoded Data Array and test for authenticity. - View Dependent Claims (10, 11)
- <
-
18. System of claims land 2 in which the Encoding is performed by overlaying a pattern of pixels of a particular color or grey scale value.
-
21. A method for authenticating digital images, comprising the steps of:
-
capturing a digital image;
recording authentication information at the time and place of said capturing, said authentication information being unique to said digital image and including at least one piece of information from a source independent of said capturing;
encoding said authentication information into a data array mapable to said digital image;
mapping said data array to said digital image, thereby creating a composite array;
optionally encrypting said composite array;
optionally annotating said composite array;
comparing said data array, optionally encrypted and annotated, to a target composite array, wherein said comparing determines whether said authentication information is embedded in said target composite array, thereby proving that said target composite array is an authentic copy of said composite array. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A system for authenticating digital images, comprising:
-
means for capturing a digital image;
means for recording authentication information at the time and place of said capturing, said authentication information being unique to said digital image and including at least one piece of information from a source independent of said capturing;
means for encoding said authentication information into a data array mapable to said digital image;
means for mapping said data array to said digital image, thereby creating a composite array;
means for optionally encrypting said composite array;
means for optionally annotating said composite array;
means for comparing said data array, optionally encrypted and annotated, to a target composite array, wherein said comparing determines whether said authentication information is embedded in said target composite array, thereby proving that said target composite array is an authentic copy of said composite array. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
Specification