Image authenticating methods
First Claim
Patent Images
1. A method of authenticating images and particularly images of offending vehicles comprising the following steps:
- allocating image capturing systems (3), arranged to allow the taking of images and the capture of identification elements (101) of offenders (100), means of taking pictures supplying the data representative of the images taken, hereafter called captured image data (30);
providing informative system means to capture physical information relative to the offence, hereafter called offence data (20);
providing first memory and/or transmission means (430A) for memorizing and/or transmitting the captured image data and the offence dataproviding operating systems (430A) for exploiting the memorized and/or transmitted data and being essentially characterized in that;
the operating systems apply to the captured image data, any known processing suitable for improving or conserving the quality of the images in question and/or reducing the amount of data necessary for reconstruction of the images, without any significant loss of quality, in order to reduce the size of the memories necessary for storing the captured image data and/or the capacity of the means for transmitting this data, the intermediate data representative of images after these processing being called initial graphical data (10);
the operating systems operated to calculate from the offence data and from a graphical representation of the alphanumerical characters (410) associated with the offence data, new data representative of images, called graphical offence data (11);
the operating systems merging the initial graphical data and the graphical offence data in such a way as to obtain a new set of data representative of images, called graphical identifier-data (12), in which the initial graphical data and the graphical offence data constitute sub-sets accessible from this new set of data;
the operating systems operated to calculate, by applying a non-bijective function, denoted f, to the graphical identifier data, a set of data, hereafter called summary data (31), such that knowledge of only the summary data, does not allow one to return to the graphical identifier data;
the operating systems applying to the summary data a coding process denoted c, having an associated decoding process denoted c.sup.−
1, for obtaining a new set of data called signature data (33);
the operating systems operated to calculate, from the signature data and from a graphical representation of the alphanumerical characters constituting the signature data, new data representative of images, called graphical signature data (13);
the operating systems merging the graphical identifier data and the graphical signature data so as to obtain a new set of data representative of images, in which the graphical identifier data and the graphical signature data constitute sub-sets accessible from this new set of data, called graphical authenticable data (14),providing second means of memorization and/or of transmission (430B) of graphical authenticable data,providing control units (5) which can respectively read and/or receive the graphical authenticable data stored in the second memory and/or transmission means, the data actually read and/or received being called graphical received data (50);
the control units searching among the graphical received data for the subset of graphical identifier data, hereafter called tested graphical identifier data (51),the control units searching among the received graphical data, for the subset of graphical signature data, hereafter called tested graphical signature data (52);
the control units looking for a data set representative of signature data, called tested signature data (53), from the tested graphical signature data and from a alphanumerical character recognition table (510);
the control units operated to calculate a set of data, called tested summary data (55), by applying the non-bijective function to the tested graphical identifier data;
the control units applying to the tested signature data, the method of decoding c.sup.−
1 to obtain a set of data, called received summary data (54); and
the control units comparing the received summary data and the tested summary data, and supplying an alert signal when the data is not identical and/or a confirmation signal when they are identical.
1 Assignment
0 Petitions
Accused Products
Abstract
To authenticate images taken by image capturing elements (3) of offending vehicles, for example, when exceeding the authorized speed, provided elements are provided for allowing informative data on the offence to be supplied, such as the speed of the vehicle, the date, the time and the place of the offence and various processing methods are provided which enable, during exploitation of the images, detection of whether or not manipulations have been carried out on the images.
-
Citations
20 Claims
-
1. A method of authenticating images and particularly images of offending vehicles comprising the following steps:
-
allocating image capturing systems (3), arranged to allow the taking of images and the capture of identification elements (101) of offenders (100), means of taking pictures supplying the data representative of the images taken, hereafter called captured image data (30); providing informative system means to capture physical information relative to the offence, hereafter called offence data (20); providing first memory and/or transmission means (430A) for memorizing and/or transmitting the captured image data and the offence data providing operating systems (430A) for exploiting the memorized and/or transmitted data and being essentially characterized in that; the operating systems apply to the captured image data, any known processing suitable for improving or conserving the quality of the images in question and/or reducing the amount of data necessary for reconstruction of the images, without any significant loss of quality, in order to reduce the size of the memories necessary for storing the captured image data and/or the capacity of the means for transmitting this data, the intermediate data representative of images after these processing being called initial graphical data (10); the operating systems operated to calculate from the offence data and from a graphical representation of the alphanumerical characters (410) associated with the offence data, new data representative of images, called graphical offence data (11); the operating systems merging the initial graphical data and the graphical offence data in such a way as to obtain a new set of data representative of images, called graphical identifier-data (12), in which the initial graphical data and the graphical offence data constitute sub-sets accessible from this new set of data; the operating systems operated to calculate, by applying a non-bijective function, denoted f, to the graphical identifier data, a set of data, hereafter called summary data (31), such that knowledge of only the summary data, does not allow one to return to the graphical identifier data;
the operating systems applying to the summary data a coding process denoted c, having an associated decoding process denoted c.sup.−
1, for obtaining a new set of data called signature data (33);the operating systems operated to calculate, from the signature data and from a graphical representation of the alphanumerical characters constituting the signature data, new data representative of images, called graphical signature data (13); the operating systems merging the graphical identifier data and the graphical signature data so as to obtain a new set of data representative of images, in which the graphical identifier data and the graphical signature data constitute sub-sets accessible from this new set of data, called graphical authenticable data (14), providing second means of memorization and/or of transmission (430B) of graphical authenticable data, providing control units (5) which can respectively read and/or receive the graphical authenticable data stored in the second memory and/or transmission means, the data actually read and/or received being called graphical received data (50); the control units searching among the graphical received data for the subset of graphical identifier data, hereafter called tested graphical identifier data (51), the control units searching among the received graphical data, for the subset of graphical signature data, hereafter called tested graphical signature data (52);
the control units looking for a data set representative of signature data, called tested signature data (53), from the tested graphical signature data and from a alphanumerical character recognition table (510);the control units operated to calculate a set of data, called tested summary data (55), by applying the non-bijective function to the tested graphical identifier data; the control units applying to the tested signature data, the method of decoding c.sup.−
1 to obtain a set of data, called received summary data (54); and
the control units comparing the received summary data and the tested summary data, and supplying an alert signal when the data is not identical and/or a confirmation signal when they are identical. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification