Digital camera with apparatus for authentication of images produced from an image file
First Claim
1. A digital camera with apparatus for authentication of images produced from an image file taken by said digital camera of a scene, said digital camera having embedded therein a private key unique to said digital camera and a known public key so uniquely based upon said private key that digital data encrypted with said private key may be decrypted using said public key, said digital camera apparatus comprisingfirst means for calculating image hash of said image file using a predetermined algorithm,second means for encrypting said image hash with said embedded private key, thereby producing a digital signature uniquely associated with said image file, andthird means for maintaining association of both said image file and said digital signature derived from said image file by said first and second means.
2 Assignments
0 Petitions
Accused Products
Abstract
A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included.
849 Citations
9 Claims
-
1. A digital camera with apparatus for authentication of images produced from an image file taken by said digital camera of a scene, said digital camera having embedded therein a private key unique to said digital camera and a known public key so uniquely based upon said private key that digital data encrypted with said private key may be decrypted using said public key, said digital camera apparatus comprising
first means for calculating image hash of said image file using a predetermined algorithm, second means for encrypting said image hash with said embedded private key, thereby producing a digital signature uniquely associated with said image file, and third means for maintaining association of both said image file and said digital signature derived from said image file by said first and second means.
Specification