Image authentication apparatus, image authentication method, and image authentication program
First Claim
1. A system that authenticates whether or not image data included in an image file has been altered, said system comprising:
- a control unit that classifies the image file into a first group if authentication data included in the image file has been generated using a private key cryptosystem, and classifies the image file into a second group if the authentication data included in the image file has been generated using a public key cryptosystem,wherein said control unit authenticates whether or not the image data included in the image file has been altered using the authentication data included in the image file,said control unit displays an indication of whether or not the image data included in the image file has been altered in a display area corresponding to the first group, if the image file is classified in the first group, andsaid control unit displays an indication of whether or not the image data included in the image file has been altered in a display area corresponding to the second group, if the image file is classified in the second group.
1 Assignment
0 Petitions
Accused Products
Abstract
A system classifies an image file into a first group if authentication data included in the image file has been generated using a private key cryptosystem, and classifies the image file into a second group if the authentication data included in the image file has been generated using a public key cryptosystem. The system authenticates whether or not image data included in the image file has been altered using the authentication data. The system displays an indication of whether or not the image data included in the image file has been altered in a display area corresponding to the first group, if the image file is classified in the first group. The system displays an indication of whether or not the image data included in the image file has been altered in a display area corresponding to the second group, if the image file is classified in the second group.
15 Citations
6 Claims
-
1. A system that authenticates whether or not image data included in an image file has been altered, said system comprising:
-
a control unit that classifies the image file into a first group if authentication data included in the image file has been generated using a private key cryptosystem, and classifies the image file into a second group if the authentication data included in the image file has been generated using a public key cryptosystem, wherein said control unit authenticates whether or not the image data included in the image file has been altered using the authentication data included in the image file, said control unit displays an indication of whether or not the image data included in the image file has been altered in a display area corresponding to the first group, if the image file is classified in the first group, and said control unit displays an indication of whether or not the image data included in the image file has been altered in a display area corresponding to the second group, if the image file is classified in the second group. - View Dependent Claims (2)
-
-
3. A method of authenticating whether or not image data included in an image file has been altered, said method comprising the steps of:
-
classifying the image file into a first group if authentication data included in the image file has been generated using a private key cryptosystem; classifying the image file into a second group if the authentication data included in the image file has been generated using a public key cryptosystem; authenticating whether or not the image data included in the image file has been altered using the authentication data included in the image file; displaying an indication of whether or not the image data included in the image file has been altered in a display area corresponding to the first group, if the image file is classified in the first group; and displaying an indication of whether or not the image data included in the image file has been altered in a display area corresponding to the second group, if the image file is classified in the second group. - View Dependent Claims (4)
-
-
5. A computer-readable medium that stores a program for causing a computer to perform a method of authenticating whether or not image data included in an image file has been altered, the method comprising the steps of:
-
classifying the image file into a first group if authentication data included in the image file has been generated using a private key cryptosystem; classifying the image file into a second group if the authentication data included in the image file has been generated using a public key cryptosystem; authenticating whether or not the image data included in the image file has been altered using the authentication data included in the image file; displaying an indication of whether or not the image data included in the image file has been altered in a display area corresponding to the first group, if the image file is classified in the first group; and displaying an indication of whether or not the image data included in the image file has been altered in a display area corresponding to the second group, if the image file is classified in the second group. - View Dependent Claims (6)
-
Specification