Authentication and Validation of Smartphone Imagery
First Claim
1. A method of processing images or video captured by a digital image capture device for subsequent validation and authentication, comprising the steps of:
- the digital still or video image capture device capturing a still or video image and metadata associated with the still or video image;
the digital image capture device generating a symmetric key;
the digital image capture device generating a unique identifier and embedding the unique identifier in the captured image using the symmetric key to form a watermarked image;
the digital image capture device digitally signing the watermarked image, the symmetric key, and the metadata; and
the digital image capture device transmitting the digitally signed watermarked image, symmetric key, and metadata to an authentication centric entity for authentication and validation.
3 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and processor-executable software for processing images or video captured by a smartphone or other digital image capture device for subsequent validation and authentication captures not only the image, but also metadata relevant to the authenticity of validity of the image, such as position, time, camera movement and orientation, image parameters, and so forth. The image is watermarked and both the watermarked image and the metadata, as well as a symmetric key used in the watermarking, are digitally signed and transmitted or uploaded to a web server or authentication centric entity for authentication and storage. When a third party submits an image to the web server or authentication centric entity, the submitted image is compared with the stored watermarked image for authentication and validation of the submitted image, and the metadata is then retrieved to enable analysis of the contents of authenticated and validated image.
-
Citations
60 Claims
-
1. A method of processing images or video captured by a digital image capture device for subsequent validation and authentication, comprising the steps of:
-
the digital still or video image capture device capturing a still or video image and metadata associated with the still or video image; the digital image capture device generating a symmetric key; the digital image capture device generating a unique identifier and embedding the unique identifier in the captured image using the symmetric key to form a watermarked image; the digital image capture device digitally signing the watermarked image, the symmetric key, and the metadata; and the digital image capture device transmitting the digitally signed watermarked image, symmetric key, and metadata to an authentication centric entity for authentication and validation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of authenticating and validating an image by an authentication centric entity, comprising the steps of:
-
receiving from a digital image capture device a digitally signed watermarked still or video image, symmetric key, and metadata; verifying, by a digital computing device, the authenticity of the watermarked image, symmetric key, and metadata by decrypting the digital signature; storing the watermarked image, symmetric key, and metadata in at least one data storage device; upon receiving a submitted image, comparing the submitted image with the stored watermarked image; if the submitted image matches the stored watermarked image or if differences between the submitted image and the stored watermarked images are acceptable differences, retrieving at least the stored metadata; and notifying a sender of the submitted image that the image is deemed to be at least potentially authentic and valid, and sending the retrieved metadata to the sender for further analysis. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of processing images or video captured by a digital image capture device for subsequent validation and authentication, comprising the steps of:
-
the digital still or video image capture device capturing a still or video image and metadata associated with the still or video image, the metadata includes data on a location at which the image was captured, a time when the image was captured, and additional information associated with the image capture; the digital image capture device digitally signing the captured image and the metadata; and the digital image capture device transmitting the digitally signed image and metadata to an authentication centric entity for authentication and validation. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. Processor-executed software including instructions for executing a method of processing images or video captured by a digital image capture device for subsequent validation and authentication, the method executed by the software including the steps of:
-
the digital still or video image capture device capturing a still or video image and metadata associated with the still or video image; the digital image capture device generating a symmetric key; the digital image capture device generating a unique identifier and embedding the unique identifier in the captured image using the symmetric key to form a watermarked image; the digital image capture device digitally signing the watermarked image, the symmetric key, and the metadata; and the digital image capture device transmitting the digitally signed watermarked image, symmetric key, and metadata to an authentication centric entity for authentication and validation. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. An authentication centric entity including at least one server, the at least one server being connected to receive and authenticate digitally-signed watermarked images from any of a plurality of registered image capture devices, and to receive submitted image authentication and validation requests from users, the authentication centric entity including hardware and processor-executed software for carrying out the following steps:
-
receiving from a digital image capture device a digitally signed watermarked still or video image, symmetric key, and metadata; verifying, by a digital computing device, the authenticity of the watermarked image, symmetric key, and metadata by decrypting the digital signature; storing the watermarked image, symmetric key, and metadata in at least one data storage device; upon receiving a submitted image, comparing the submitted image with the stored watermarked image; if the submitted image matches the stored watermarked image or if differences between the submitted image and the stored watermarked images are acceptable differences, retrieving at least the stored metadata; and notifying a sender of the submitted image that the image is deemed to be at least potentially authentic and valid, and sending the retrieved metadata to the sender for further analysis. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60)
-
Specification