Digital imaging system for evidentiary use
First Claim
1. System for authenticating digital information, comprising:
- a) an image acquisition device for producing an original array of two-dimensional digital information;
b) means for obtaining current date and time information from satellite or radio broadcasts;
c) means for obtaining current location information from satellite or radio broadcasts;
d) means for identifying a Sensor ID for the image acquisition device;
e) an encoder for converting date/time, location, and Sensor ID into two-dimensional format called the Encoded Data Array;
f) an embedder for combining the Encoded Data Array and the Original Array into a new Composite Arrayh) a Transmission device to transfer the Composite Array to a recipient;
n) means for comparing said transferred Composite Array to said Encoded Data Array, said comparing means thereby being able to use said Encoded Data Array to determine whether the information in said Encoded Data Array is embedded in said Composite Array, said comparing means also being able to separately determine whether said date/time information, said location information, and said Sensor ID information is embedded in said Composite Array, said comparing means being further limited by being able to make said determination without extracting or otherwise decoding the information in said Encoded Data Array;
j) a decoder with fault indicator when date/time, location, and source cannot be decoded;
k) an Encoding Extractor for removing the Encoded Data Array from the Composite Array;
l) means for restoring the Original Array at pixel locations used for the Encoding; and
m) means for determining changes between the Restored Original Array and the Original Array.
1 Assignment
0 Petitions
Accused Products
Abstract
The Evidentiary Imaging System (EIS) provides secure storage or transmission of a digital image into which is encoded the date, time, and location at which the image was taken, along with the camera ID and frame number. The encoding is dispersed throughout the image so that the image cannot be modified without distorting the encoding. The image may be encrypted for additional security. Annotation can be superimposed on the encoded or encoded and encrypted image to classify or identify the image to human or automated scanning systems. The annotation can also be used to key the decoding and decryption tasks. The EIS produces imagery which may be authenticated as to originality, time and location of imaging. The imagery may be stored, duplicated, and transmitted while retaining its authenticity. However, any modifications to the image, including any local changes, are readily detected because the encoding will not decode correctly.
43 Citations
34 Claims
-
1. System for authenticating digital information, comprising:
-
a) an image acquisition device for producing an original array of two-dimensional digital information; b) means for obtaining current date and time information from satellite or radio broadcasts; c) means for obtaining current location information from satellite or radio broadcasts; d) means for identifying a Sensor ID for the image acquisition device; e) an encoder for converting date/time, location, and Sensor ID into two-dimensional format called the Encoded Data Array; f) an embedder for combining the Encoded Data Array and the Original Array into a new Composite Array h) a Transmission device to transfer the Composite Array to a recipient; n) means for comparing said transferred Composite Array to said Encoded Data Array, said comparing means thereby being able to use said Encoded Data Array to determine whether the information in said Encoded Data Array is embedded in said Composite Array, said comparing means also being able to separately determine whether said date/time information, said location information, and said Sensor ID information is embedded in said Composite Array, said comparing means being further limited by being able to make said determination without extracting or otherwise decoding the information in said Encoded Data Array; j) a decoder with fault indicator when date/time, location, and source cannot be decoded; k) an Encoding Extractor for removing the Encoded Data Array from the Composite Array; l) means for restoring the Original Array at pixel locations used for the Encoding; and m) means for determining changes between the Restored Original Array and the Original Array. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for authenticating digital images, comprising the steps of:
-
capturing a digital image; recording authentication information at the time and place of said capturing, said authentication information being unique to said digital image and comprising a plurality of pieces of information, including at least one piece of information from a source independent of said capturing; encoding said authentication information into a data array mapable to said digital image; mapping said data array to said digital unage, thereby creating a composite array; optionally encrypting said composite array; optionally annotating said composite array; comparing said data array, optionally encrypted and annotated, to a target composite array, wherein said comparing determines whether said authentication information is embedded in said target composite array, said comparing also being able to separately determine whether each of said plurality of pieces of information is embedded in said target composite array, said comparing being further limited by being able to make said determination without extracting or otherwise decoding information in said data array, thereby proving that said target composite array is an authentic copy of said composite array. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A system for authenticating digital images, comprising:
-
means for capturing a digital image; means for recording authentication information at the time and place of said capturing, said authentication information being unique to said digital image and comprising a plurality of pieces of information, including at least one piece of information from a source independent of said capturing; means for encoding said authentication information into a data array mapable to said digital image; means for mapping said data array to said digital image, thereby creating a composite array; means for optionally encrypting said composite array; means for optionally annotating said composite array; means for comparing said data array, optionally encrypted and annotated, to a target composite array, wherein said comparing determines whether said authentication information is embedded in said target composite array, said comparing means also being able to separately determine whether each of said plurality of pieces of information is embedded in said target composite array, said comparing means being further limited by being able to make said determination without extracting or otherwise decoding information in said data array, thereby proving that said target composite array is an authentic copy of said composite array. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
Specification