Authenticating images from digital cameras
First Claim
1. A method for forming a digital signature for authentication of image data for a digital camera that has captured event data for the image data, comprising the steps of:
- creating a message digest for the image data, the message digest being derived from the image data and from the event data;
encrypting the message digest with a private key unique to and secured with the digital camera; and
creating an image file for the image data, the image file having a header that includes the private-key-encrypted message digest together with unencrypted event data.
1 Assignment
0 Petitions
Accused Products
Abstract
Authentication of image from digital cameras with GPS-derived time and location data is disclosed. With the wide-spread availability of today'"'"'s desktop tools and imaging devices, unethical manipulation of digital image data is common, such that digital images are not ordinarily reliable and can be subject to trickery and forgery. In the past, imagery such as photographs and digital images were reliable enough to serve as documentary evidence in most cases, since a skilled craftsman was needed to modify the images and commit fraud. However, skilled craftsmen are no longer needed, and digital images can be modified by even a casual user. Moreover, time data and location data are not ordinarily included in digital images. According to the invention, a digital camera system documents the time, date and location where a digital image was taken, using GPS-derived data from a secure connection. The validity and authenticity of the digital image, as well as the time data and location data, is then protected with a public key signature system that provides a digital signature by which the image and time and location information can be authenticated.
189 Citations
59 Claims
-
1. A method for forming a digital signature for authentication of image data for a digital camera that has captured event data for the image data, comprising the steps of:
-
creating a message digest for the image data, the message digest being derived from the image data and from the event data;
encrypting the message digest with a private key unique to and secured with the digital camera; and
creating an image file for the image data, the image file having a header that includes the private-key-encrypted message digest together with unencrypted event data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus for forming a digital signature for authentication of image data for a digital camera that has captured event data for the image data, said apparatus comprising:
-
a first creation means for creating a message digest for the image data, the message digest being derived from the image data and from the event data;
means for encrypting the message digest with a private key unique to and secured with the digital camera; and
a second creation means for creating an image file for the image data, the image file having a header that includes the private-key-encrypted message digest together with unencrypted event data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus for forming a digital signature for authentication of image data for a digital camera that has captured event data for the image data, comprising:
-
a program memory for storing process steps of;
(1) creating a message digest for the image data, the message digest being derived from the image data and from the event data, (2) encrypting the message digest with a private key unique to and secured with the digital camera, and (3) creating an image file for the image data, the image file having a header that includes the private-key-encrypted message digest together with unencrypted event data; and
a processor for executing the process steps stored in said memory. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. Computer-executable process steps stored on a computer readable medium, said computer-executable process steps for forming a digital signature for authentication of image data for a digital camera that has captured event data for the image data, said computer-executable process steps comprising:
-
a first creating step to create a message digest for the image data, the message digest being derived from the image data and from the event data;
an encrypting step to encrypt the message digest with a private key unique to and secured with the digital camera; and
a second creating step to create an image file for the image data, the image file having a header that includes the private-key-encrypted message digest together with unencrypted event data. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
-
33. A method for validating authenticity of an image file containing image data and a header that includes a private-key-encrypted message digest together with unencrypted data including event data that went into forming the message digest, said method comprising the steps of:
-
obtaining a public key complementary to a private key used to encrypt the message digest;
decrypting the private-key-encrypted message digest using the public key so as to obtain a message digest;
calculating a trial message digest using a hashing function the same as the hashing function used to form the private-key-encrypted message digest, and also using the unencrypted event data in the header; and
comparing the trial message digest to the decrypted message digest to determine the authenticity of the image file, wherein the event data includes location data. - View Dependent Claims (34, 35, 36, 37, 38)
-
-
39. An apparatus for validating authenticity of an image file containing image data and a header that includes a private-key-encrypted message digest together with unencrypted data including event data that went into forming the message digest, said apparatus comprising:
-
means for obtaining a public key complementary to a private key used to encrypt the message digest;
means for decrypting the private-key-encrypted message digest using the public key so as to obtain a message digest;
means for calculating a trial message digest using a hashing function the same as the hashing function used to form the private-key-encrypted message digest, and also using the unencrypted event data in the header; and
means for comparing the trial message digest to the decrypted message digest to determine the authenticity of the image file, wherein the event data includes location data. - View Dependent Claims (40, 41, 42, 43, 44)
-
-
45. An apparatus for validating authenticity of an image file containing image data and a header that includes a private-key-encrypted message digest together with unencrypted data including event data that went into forming the message digest, comprising:
-
a program memory for storing process steps executable to;
(1) obtain a public key complementary to a private key used to encrypt the message digest, (2) decrypt the private-key-encrypted message digest using the public key so as to obtain a message digest, (3) calculate a trial message digest using a hashing function the same as the hashing function used to form the private-key-encrypted message digest, and also using the unencrypted event data in the header, and (4) compare the trial message digest to the decrypted message digest to determine the authenticity of the image file, wherein the event data includes location data; and
a processor for executing the process steps stored in said memory. - View Dependent Claims (46, 47, 48, 49, 50)
-
-
51. Computer-executable process steps stored on a computer readable medium, said computer-executable process steps for validating authenticity of an image file containing image data and a header that includes a private-key-encrypted message digest together with unencrypted data including event data that went into forming the message digest, said computer-executable process steps comprising:
-
an obtaining step to obtain a public key complementary to a private key used to encrypt the message digest;
a decrypting step to decrypt the private-key-encrypted message digest using the public key so as to obtain a message digest;
a calculating step to calculate a trial message digest using a hashing function the same as the hashing function used to form the private-key-encrypted message digest, and also using the unencrypted event data in the header; and
a comparing step to compare the trial message digest to the decrypted message digest to determine the authenticity of the image file, wherein the event data includes location data. - View Dependent Claims (52, 53, 54, 55, 56)
-
-
57. A secure connection between a GPS receiver and a digital camera, whereby the digital camera can obtain secure GPS-derived data in correspondence to digital images obtained by the digital camera, comprising:
-
a private key encrypter in the GPS receiver, said private key encrypter for private-key-encryption of information corresponding to GPS-derived data;
a public key decrypter in the digital camera, said public key decrypter for public-key-decryption of the private-key-encrypted GPS-derived data; and
an interface between the GPS receiver and the digital camera for transmitting the private-key-encrypted GPS-derived data from the GPS receiver to the digital camera. - View Dependent Claims (58, 59)
-
Specification