Method for authentication of JPEG image data
First Claim
1. A method for enabling a recipient of an image file of JPEG image data to authenticate the image file of JPEG image data, the image file of JPEG image data having a first section and a second section, the first section containing a predetermined number of blocks of transformed coefficients and the second section containing a predetermined number of blocks of transformed coefficients, comprising:
- (a) producing a hashing function from the first section of the image file of JPEG image data;
(b) producing a first integrity checking value from the hashing function produced from the first section of the image file of JPEG image data;
(c) identifying the second section of the image file of JPEG image data, the second section having an encrypted signature string embedded in a least significant transmitted bit plane block of the second section;
(d) extracting, from the least significant transmitted bit-plane of the second section of the image file of JPEG image data, the embedded encrypted signature string;
(e) decrypting the extracted signature string to recover a second integrity checking value;
(f) comparing the recovered second integrity checking value with the first integrity checking value;
(g) authenticating the first section of the image file of JPEG image data when the recovered second integrity checking value matches the first integrity checking value; and
(h) informing the recipient of the image file of JPEG image data that the image file of JPEG image data is authentic when each section of the image file of JPEG image data has been authenticated by comparing the recovered integrity checking value of each section with the produced integrity checking value of each section.
3 Assignments
0 Petitions
Accused Products
Abstract
A method enables a recipient of JPEG image data to authenticate the JPEG image data by producing a hashing function from a first section of the JPEG image data. A first integrity checking value is produced from the hashing function produced from the first section of JPEG image data and, from a least significant transmitted bit-plane of a second section of the JPEG image data, an embedded encrypted signature string is extracted and decrypted to generate a second integrity checking value. The first and second integrity checking values are compared and the first section of the JPEG image data is authenticated when the second integrity checking value matches the first integrity checking value.
39 Citations
12 Claims
-
1. A method for enabling a recipient of an image file of JPEG image data to authenticate the image file of JPEG image data, the image file of JPEG image data having a first section and a second section, the first section containing a predetermined number of blocks of transformed coefficients and the second section containing a predetermined number of blocks of transformed coefficients, comprising:
-
(a) producing a hashing function from the first section of the image file of JPEG image data; (b) producing a first integrity checking value from the hashing function produced from the first section of the image file of JPEG image data; (c) identifying the second section of the image file of JPEG image data, the second section having an encrypted signature string embedded in a least significant transmitted bit plane block of the second section; (d) extracting, from the least significant transmitted bit-plane of the second section of the image file of JPEG image data, the embedded encrypted signature string; (e) decrypting the extracted signature string to recover a second integrity checking value; (f) comparing the recovered second integrity checking value with the first integrity checking value; (g) authenticating the first section of the image file of JPEG image data when the recovered second integrity checking value matches the first integrity checking value; and (h) informing the recipient of the image file of JPEG image data that the image file of JPEG image data is authentic when each section of the image file of JPEG image data has been authenticated by comparing the recovered integrity checking value of each section with the produced integrity checking value of each section. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for enabling a recipient of an image file of JPEG image data to authenticate the image file of JPEG image data, the image file of JPEG image data having a first section and a second section, the first section containing a predetermined number of blocks of transformed coefficients and the second section containing a predetermined number of blocks of transformed coefficients, comprising:
-
a processor to produce a hashing function from the first section of the image file of JPEG image data; said processor producing a first integrity checking value from the hashing function produced from the first section of the image file of JPEG image data; said processor identifying the second section of the image file of JPEG image data, the second section having an encrypted signature string embedded in a least significant transmitted bit plane block of the second section; said processor extracting, from the least significant transmitted bit-plane of the second section of the image file of JPEG image data, the embedded encrypted signature string; said processor decrypting the extracted signature string to recover a second integrity checking value; said processor comparing the recovered second integrity checking value with the first integrity checking value; said processor authenticating the first section of the image file of JPEG image data when the recovered second integrity checking value matches the first integrity checking value; said processor informing the recipient of the image file of JPEG image data that the image file of JPEG image data is authentic when each section of the image file of JPEG image data has been authenticated by comparing the recovered integrity checking value of each section with the produced integrity checking value of each section. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification