PRIVACY-PRESERVING EVIDENCE IN ALPR APPLICATIONS
First Claim
1. A method for preserving privacy of evidence comprising:
- receiving an encrypted first image which has been generated by encrypting a first image with a symmetric cryptographic key that is based on first information extracted from the first image and first metadata associated with the first image;
establishing a link between a second image and the first image;
receiving the first metadata;
extracting second information from the second image;
reconstructing the symmetric cryptographic key that was used to encrypt the first image based on the second information extracted from the second image and the first metadata, the reconstructed symmetric cryptographic key permitting the first encrypted image to be decrypted to regenerate the first image,wherein at least one of the establishing a link between a second image and the first image and the reconstructing of the symmetric cryptographic key is performed with a processor.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for preserving privacy of evidence are provided. In the method, an encrypted first image is generated by encrypting a first image acquired at a first location with a symmetric cryptographic key that is based on first information such as a license plate number extracted from the first image and first metadata associated with the first image, such as a time at which the first image was acquired. When a link is established between a second image and the first image, for example, through visual signature matching, the symmetric cryptographic key can be reconstructed, without having access to the first image, but based instead on the first metadata and information extracted from the second image. The reconstructed symmetric cryptographic key can then be used for decryption of the encrypted image to establish evidence that the license plate number was indeed extracted from the first image.
29 Citations
21 Claims
-
1. A method for preserving privacy of evidence comprising:
-
receiving an encrypted first image which has been generated by encrypting a first image with a symmetric cryptographic key that is based on first information extracted from the first image and first metadata associated with the first image; establishing a link between a second image and the first image; receiving the first metadata; extracting second information from the second image; reconstructing the symmetric cryptographic key that was used to encrypt the first image based on the second information extracted from the second image and the first metadata, the reconstructed symmetric cryptographic key permitting the first encrypted image to be decrypted to regenerate the first image, wherein at least one of the establishing a link between a second image and the first image and the reconstructing of the symmetric cryptographic key is performed with a processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
memory which receives; an encrypted first image which has been generated by encrypting a first image with a symmetric cryptographic key that is based on first identifier information extracted from the first image and first metadata associated with the first image, the first metadata, and a first visual signature which has been extracted from the first image; a signature matching component which compares the first visual signature with a second visual signature extracted from a second image to establish a link between the second image and the first image; an identifier recognition component which extracts second identifier information from the second image; a cryptographic key reconstruction component for reconstructing the symmetric cryptographic key that was used to encrypt the first image based on the second identifier information extracted from the second image and the first metadata, the reconstructed symmetric cryptographic key permitting the first encrypted image to be decrypted to regenerate the first image; at least one processor which implements the signature matching component, identifier recognition component, and cryptographic key reconstruction component. - View Dependent Claims (17, 18)
-
-
19. A method for preserving privacy of evidence comprising:
-
in a first location, capturing a first image of a vehicle and associated first metadata and generating an encrypted first image by encrypting the first image with a symmetric cryptographic key that is based on first identifier information extracted from the first image and the first metadata; in a second location, spaced form the first location, capturing a second image of a vehicle and associated second metadata; in at least one of the second location and a third location; receiving the encrypted first image and the first metadata; determining that a condition is met based on the first and second metadata; and reconstructing the symmetric cryptographic key from the first metadata and the second identifier information extracted from the second image, thereby establishing that the second identifier information matches the first identifier information. - View Dependent Claims (20, 21)
-
Specification