SECURE IMAGE PIPELINE
First Claim
Patent Images
1. A computer-implemented method comprising:
- storing a shared secret at both of an image sensor module in a computing device and a trusted element in the computing device, the shared secret comprising a device-specific secret value and a definition of a plurality of pixel locations;
receiving an image at the image sensor module;
generating, by the image sensor module, a watermark based on the secret value;
applying, by the image sensor module, the watermark to the image to create a watermarked image, the applying being based on the pixel locations;
receiving the watermarked image at the trusted element; and
validating, by the trusted element, the watermarked image based on the watermark.
1 Assignment
0 Petitions
Accused Products
Abstract
Computer-implemented methods and systems for image security in computer vision applications are described. A shared secret is stored at an image sensor module and a trusted element. The shared secret includes a device-specific secret value and a definition of a plurality of pixel locations. An image is received at the image sensor module, which generates a watermark based on the secret value and applies the watermark to the image, based on the pixel locations, to create a watermarked image. The watermarked image is received at the trusted element, which validates the watermarked image based on the watermark.
32 Citations
30 Claims
-
1. A computer-implemented method comprising:
-
storing a shared secret at both of an image sensor module in a computing device and a trusted element in the computing device, the shared secret comprising a device-specific secret value and a definition of a plurality of pixel locations; receiving an image at the image sensor module; generating, by the image sensor module, a watermark based on the secret value; applying, by the image sensor module, the watermark to the image to create a watermarked image, the applying being based on the pixel locations; receiving the watermarked image at the trusted element; and validating, by the trusted element, the watermarked image based on the watermark. - View Dependent Claims (2, 3, 4, 5, 21, 22, 23, 24, 25)
-
-
6. A system comprising:
-
at least one memory for storing computer-executable instructions; at least one processing unit for executing the instructions stored on the memory, wherein execution of the instructions programs the processing unit to perform operations comprising; storing a shared secret at both of an image sensor module in a computing device and a trusted element in the computing device, the shared secret comprising a device-specific secret value and a definition of a plurality of pixel locations; receiving an image at the image sensor module; generating, by the image sensor module, a watermark based on the secret value; applying, by the image sensor module, the watermark to the image to create a watermarked image, the applying being based on the pixel locations; receiving the watermarked image at the trusted element; and validating, by the trusted element, the watermarked image based on the watermark. - View Dependent Claims (7, 8, 9, 10, 26, 27, 28, 29, 30)
-
-
11-20. -20. (canceled)
Specification