Secure compressed imaging
First Claim
Patent Images
1. A method of authenticating a portion of an image, the method comprising the steps of:
- compressing an image frame;
dividing the compressed image frame into a plurality of image sections including a first image section and a second image section;
separately digitally signing each of the plurality of image sections to create a digital signature corresponding to each of the plurality of image sections;
transmitting the plurality of image sections and corresponding digital signatures such that at least the first image section and a digital signature corresponding to the first image section are received in their entirety; and
authenticating at least the first image section that is received using the digital signature.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure method and apparatus for compressing and digitally signing compressed video data. The apparatus compresses video data and permits signing of the compressed video image in such a way that if only a portion of the video image is successfully transmitted, the digital signature corresponding to that portion can still be verified. An optimization scheme which allows the verification of portions of a successful digital transmission with using only one digital signature is also disclosed.
199 Citations
20 Claims
-
1. A method of authenticating a portion of an image, the method comprising the steps of:
-
compressing an image frame; dividing the compressed image frame into a plurality of image sections including a first image section and a second image section; separately digitally signing each of the plurality of image sections to create a digital signature corresponding to each of the plurality of image sections; transmitting the plurality of image sections and corresponding digital signatures such that at least the first image section and a digital signature corresponding to the first image section are received in their entirety; and authenticating at least the first image section that is received using the digital signature. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for authenticating that an image has been transmitted from a sending device to a receiving device, the method comprising the steps of:
-
compressing the image to form a compressed image; dividing the compressed image into a plurality of sections; individually hashing each of the plurality of sections to produce a corresponding plurality of digest elements; combining the plurality of digest elements to produce a hash sequence table; digitally signing the hash sequence table to generate a hash sequence table signature; transmitting the hash sequence table signature, the hash sequence table and the plurality of sections; authenticating the hash sequence table using the hash sequence table signature; and authenticating at least one section of the compressed image by hashing the at least one section to produce a digest and comparing the digest with a corresponding digest element from the hash sequence table. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system for verifying the authenticity of a compressed digital image, the system comprising:
-
a communication link; a sending device coupled to the communication link, the sending device including a secure compressed signing device including (i) compression circuitry to compress a digital image to produce a compressed image, (ii) a partitioning circuit to partition the compressed image into a plurality of image sections, (iii) a hash circuit to hash each of the plurality of image sections and output a plurality of digests to be concatenated together to generate a hash sequence table, and (iv) a signing circuit to digitally sign said hash sequence table to produce a hash sequence table signature; and a receiving device configured to authenticate at least one image section of the plurality of image sections received in its entirety from the sending device by using the at least one image section, the hash sequence table signature, and the hash sequence table. - View Dependent Claims (14, 15, 16)
-
-
17. A method of forming a concatenated signed hash sequence table used for verifying the authenticity of a portion of an image frame when transmission of the image frame is interrupted or causes alterations of the image frame, said method comprising the steps of:
-
partitioning the image frame into a plurality of image sections; hashing each section in said plurality of image sections to generate a corresponding plurality of hash values; concatenating the hashed values to produce a hash sequence table; and signing digitally the hash sequence table to form a hash sequence table signature that can be used to authenticate a portion of the image frame that contains valid data. - View Dependent Claims (18, 19, 20)
-
Specification