EP1072149A1 - Authentication and verification within a digital camera architecture - Google Patents

Authentication and verification within a digital camera architecture

Info

Publication number
EP1072149A1
EP1072149A1 EP99965936A EP99965936A EP1072149A1 EP 1072149 A1 EP1072149 A1 EP 1072149A1 EP 99965936 A EP99965936 A EP 99965936A EP 99965936 A EP99965936 A EP 99965936A EP 1072149 A1 EP1072149 A1 EP 1072149A1
Authority
EP
European Patent Office
Prior art keywords
photograph
digital
camera
produce
hash digest
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99965936A
Other languages
German (de)
French (fr)
Inventor
Joseph Victor Wallace
Mark Leonard Buer
John Francis Kowalski
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Publication of EP1072149A1 publication Critical patent/EP1072149A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32128Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title attached to the image data, e.g. file header, transmitted message header, information on the same page or in the same computer file as the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3204Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
    • H04N2201/3205Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of identification information, e.g. name or ID code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3212Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
    • H04N2201/3214Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image of a date
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3212Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
    • H04N2201/3215Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image of a time or duration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation

Definitions

  • the present invention concerns digital cameras and pertains particularly to authentication and verification within a digital camera architecture.
  • an enhanced digital camera includes a non-volatile memory in which is stored a security value used to produce digital signatures for photographs.
  • a processor within the enhanced digital camera processes a photograph by hashing digital data for the photograph to produce a hash digest.
  • the processor then performs a digital signature function on the hash digest using the security value in order to produce a digital signature for the photograph.
  • the processor hashes a serial number for the camera and a date and time stamp along with the digital data for the photograph to produce the hash digest.
  • the security value is, for example, a unique private key that is part of a private/public key pair.
  • the non-volatile memory and the processor are within a secure integrated circuit and the processor generates the private/public key pair.
  • the non-volatile memory is, for example, a one-time programmable memory.
  • the public key is, for example, stored in a third party database and may be accessed (using the serial number for the enhanced digital camera) when it is necessary to authenticate a photograph taken by the enhanced digital camera.
  • the digital signature is stored with the digital data for the photograph.
  • digital data for the photograph is hashed to produce a computed hash digest.
  • the serial number for the camera and the date and time stamp are hashed along with the digital data for the photograph.
  • the public key for the enhanced digital camera is used to perform a digital signature function on the digital signature for the photograph in order to produce an extracted hash digest.
  • the computed hash digest is compared with the extracted hash digest to determine whether the photograph is authentic and unaltered.
  • the authentication and integrity verification utilized by the enhanced digital camera architecture of the present invention provides the necessary functionality to authenticate photographs and to detect alterations.
  • Figure 1 is a simplified block diagram of a digital camera architecture that incorporates authentication and verification in accordance with a preferred embodiment of the present invention.
  • Figure 2 illustrates an authentication and verification process within a digital camera in accordance with a preferred embodiment of the present invention.
  • Figure 3 illustrates a detection process used to detect modification of a digital picture and/or digital signature in accordance with a preferred embodiment of the present invention.
  • FIG. 1 is a simplified block diagram of the architecture of an enhanced digital camera 10 that incorporates authentication and verification in order to provide the necessary functionality to protect digital photographic data from alterations.
  • Digital camera 10 for example, can operate in an authentication and integrity verification (AIV) mode or in non- AIV mode.
  • AIV mode enhanced digital camera 10 architecture authenticates and digitally signs each photograph as a picture is taken. This allows for detection of tampering with the original photograph.
  • a hash function is used to protect the integrity of the original digital image and a digital signature function is used to protect the authenticity of the image. The solution will not prevent tampering, rather it allows for detection of the tampering.
  • Enhanced digital camera 10 includes the typical functional blocks normally included within a digital camera.
  • enhanced digital camera 10 includes an image processor 11 and a memory module for storing pictures that have been taken.
  • a secure camera integrated circuit 12 contains other functional blocks of enhanced digital camera 10. These functional blocks are contained in a single integrated circuit, not only to reduce manufacturing cost, but also to provide a necessary level of security that does not allow a private key component to ever be exposed outside secure camera integrated circuit 12.
  • the functional components included within secure camera integrated circuit 12 are an analog- to-digital (A/D) converter block 21, a digital signal processing block 23, random access memory (RAM) 24, read-only memory (ROM) 25 and a memory module interface 27.
  • A/D analog- to-digital
  • RAM random access memory
  • ROM read-only memory
  • secure camera integrated circuit 12 includes a one-time programmable (OTP) memory 26.
  • One-time programmable memory 26 is a secure memory that stores the security value of the digital camera.
  • memory 26 could be manufactured from flash memory, programmable read-only memory
  • PROM PROM
  • EEPROM Electrically erasable programmable read-only memory
  • any other memory that can permanently and securely store the security value of enhanced digital camera 10.
  • the security value of enhanced digital camera 10 is, for example, a unique public/private key pair.
  • the security value of the digital camera is any unique security value that can be used to produce a digital signature.
  • microprocessor 23 generates a public/private key pair at the time of manufacture of enhanced digital camera 10.
  • Microprocessor 23 programs the generated public/private key pair into OTP memory 26.
  • the public key component of the public/private key is then sent out of secure camera integrated circuit 12 and enhanced digital camera 10.
  • the public key is then recorded, along with the serial number, for example, by a secure third party (Certificate Authority), for purposes of later authenticating and verifying the integrity of a photograph.
  • the secure third party could be a company that is in the business of issuing digital certificates for individuals and corporations.
  • FIG. 2 illustrates an authentication and verification process that is utilized by enhanced digital camera 10 in accordance with a preferred embodiment of the present invention.
  • a photograph is snapped, the resulting digital data 31 is stored in RAM 24.
  • a date and time stamp 41 generated by a real-time clock 32, is prepended to digital data 31.
  • Also prepended to digital data 31 is a camera serial number 42 of enhanced digital camera 10.
  • a hash function 34 is used to hash together digital data 31, date and time stamp 41 and camera serial number 42 in order to generate a hash digest 35.
  • a digital signature function 37 digitally signs hash digest 35 with a unique private key 36 to produce a digital signature 44.
  • Unique private key 37 is a private key which is used only for enhanced digital camera 10.
  • Digital signature 44 is appended to digital data 31.
  • the entire structure for the photograph including data/time stamp 41, camera serial number 42, digital data 31 and digital signature 44, is stored in memory module 13.
  • the stored structure for the photograph allows the photograph to be authenticated. In effect, a digital fingerprint of the photograph has been created as the photograph is taken. This allows any changes to the picture to be detected.
  • the preferred embodiment of the present invention resists attack by those trying to circumvent the protection system. The two most obvious ways to attack the protection system would be to modify the photograph (digital data 31) and return it to memory module 13 or to modify the photograph (digital data 31) and digital signature 44, so the two match, and return the result to memory module 13. Either of these attacks, however, can be protected utilizing the preferred embodiment of the present invention.
  • Figure 3 illustrates a detection process used to detect when the photograph (digital data 31) has been modified and returned to memory module 13 or when the photograph (digital data 31) and digital signature 44 have both been modified and then returned to memory module 13.
  • a secure database 60 is used to store public keys for enhanced digital cameras.
  • database 60 is a third party database used to archive the camera serial numbers and associated public keys.
  • each of representative entries 61, 62, 63 and 64 includes a camera serial number and an associated public key.
  • a hash function 71 is used to hash together digital data 53, a date and time stamp 51 and a camera serial number 52 in order to generate a computed hash digest 72.
  • Camera serial number 52 is used to access from database 60 a unique public key 73 for the enhanced digital camera.
  • a digital signature function 74 uses unique public key 73 to extract from digital signature 50 an extracted hash digest 75.
  • a compare function 76 compares computed hash digest 72 with extracted hash digest 75 and an output 77 indicates whether there is a match (i.e., the photograph is authentic and unaltered) or there is not a match (i.e., the photograph is not authentic or has been altered).
  • the detection process in Figure 3 detects both the case where a photograph has been modified and returned to a memory module and the case where a photograph and digital signature have been modified and both returned to memory module 13. Modifying the photograph (but not the signature) and returning it to the memory module would result in a mismatch of the hash value of the new picture and the hash value stored in the signature. Modifying both the photograph and the signature would also result in a mismatch of the computed hash value and the hash value stored in the signature. Even though the hash value stored in the signature was properly computed, unless the hash value is signed with the correct private key, it will be detected as an altered photograph. Thus, someone attempting to sign a photograph with a non-registered public/private key pair could be detected.
  • an attempt could be made to circumvent the protection system For example, an attempt could be made to extract the private key from a registered camera via a physical attack. The extracted private key could then be used to sign the hash value of a modified photograph. In the event this type of tampering is suspected, it may be necessary to examine the enhanced digital camera for signs of tampering to determine whether a physical attack has occurred. Also precautions can be taken when designing secure camera IC 12 to assure that the private key would be very difficult to access by an attacker. The strength and integrity of the system is predicated on the ability to store data (i.e., a private key) internal to the camera in a secure manner.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Studio Devices (AREA)
  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

An enhanced digital camera includes a non-volatile memory in which is stored a security value used to produce digital signatures for photographs. A processor within the enhanced digital camera processes a photograph by hashing digital data for the photograph to produce a hash digest. The processor then performs a digital signature function using the security value in order to produce a digital signature for the photograph.

Description

AUTHENTICATION AND VERIFICATION WITHIN A DIGITAL
CAMERA ARCHITECTURE
TECHNICAL FIELD The present invention concerns digital cameras and pertains particularly to authentication and verification within a digital camera architecture.
BACKGROUND As digital cameras become a widely used consumer item, there is a likelihood that photographs taken by digital cameras will increasingly be used for applications such as insurance claims and law enforcement. However, unlike previous photographic cameras, digital photography presents even the novice photographic enthusiast, using a standard personal computer, the means to "doctor" or manipulate photographs without detection. This is because digital cameras allow for photographs to be manipulated, modified and edited without degradation to the quality of the photograph. Consequently detection of such manipulations are not possible. This could present the opportunity for an unscrupulous individual to utilize digital photography to perform insurance fraud or to tamper with evidence used in a court of law.
SUMMARY OF THE INVENTION In accordance with the preferred embodiment of the present invention, an enhanced digital camera includes a non-volatile memory in which is stored a security value used to produce digital signatures for photographs. A processor within the enhanced digital camera processes a photograph by hashing digital data for the photograph to produce a hash digest. The processor then performs a digital signature function on the hash digest using the security value in order to produce a digital signature for the photograph. In the preferred embodiment, the processor hashes a serial number for the camera and a date and time stamp along with the digital data for the photograph to produce the hash digest. The security value is, for example, a unique private key that is part of a private/public key pair. To increase security of the private key the non-volatile memory and the processor are within a secure integrated circuit and the processor generates the private/public key pair. The non-volatile memory is, for example, a one-time programmable memory. The public key is, for example, stored in a third party database and may be accessed (using the serial number for the enhanced digital camera) when it is necessary to authenticate a photograph taken by the enhanced digital camera.
The digital signature is stored with the digital data for the photograph. In order to authenticate the photograph, digital data for the photograph is hashed to produce a computed hash digest. For example, the serial number for the camera and the date and time stamp are hashed along with the digital data for the photograph. The public key for the enhanced digital camera is used to perform a digital signature function on the digital signature for the photograph in order to produce an extracted hash digest. The computed hash digest is compared with the extracted hash digest to determine whether the photograph is authentic and unaltered. The authentication and integrity verification utilized by the enhanced digital camera architecture of the present invention provides the necessary functionality to authenticate photographs and to detect alterations.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a simplified block diagram of a digital camera architecture that incorporates authentication and verification in accordance with a preferred embodiment of the present invention.
Figure 2 illustrates an authentication and verification process within a digital camera in accordance with a preferred embodiment of the present invention.
Figure 3 illustrates a detection process used to detect modification of a digital picture and/or digital signature in accordance with a preferred embodiment of the present invention.
DISCLOSURE OF THE INVENTION Figure 1 is a simplified block diagram of the architecture of an enhanced digital camera 10 that incorporates authentication and verification in order to provide the necessary functionality to protect digital photographic data from alterations. Digital camera 10, for example, can operate in an authentication and integrity verification (AIV) mode or in non- AIV mode. In AIV mode, enhanced digital camera 10 architecture authenticates and digitally signs each photograph as a picture is taken. This allows for detection of tampering with the original photograph. A hash function is used to protect the integrity of the original digital image and a digital signature function is used to protect the authenticity of the image. The solution will not prevent tampering, rather it allows for detection of the tampering.
Enhanced digital camera 10 includes the typical functional blocks normally included within a digital camera. For example, enhanced digital camera 10 includes an image processor 11 and a memory module for storing pictures that have been taken.
A secure camera integrated circuit 12 contains other functional blocks of enhanced digital camera 10. These functional blocks are contained in a single integrated circuit, not only to reduce manufacturing cost, but also to provide a necessary level of security that does not allow a private key component to ever be exposed outside secure camera integrated circuit 12.
The functional components included within secure camera integrated circuit 12 are an analog- to-digital (A/D) converter block 21, a digital signal processing block 23, random access memory (RAM) 24, read-only memory (ROM) 25 and a memory module interface 27.
In addition, secure camera integrated circuit 12 includes a one-time programmable (OTP) memory 26. One-time programmable memory 26 is a secure memory that stores the security value of the digital camera. Alternative to a one-time programmable memory, memory 26 could be manufactured from flash memory, programmable read-only memory
(PROM), EEPROM, or any other memory that can permanently and securely store the security value of enhanced digital camera 10.
The security value of enhanced digital camera 10 is, for example, a unique public/private key pair. Alternatively, the security value of the digital camera is any unique security value that can be used to produce a digital signature. For example, microprocessor 23 generates a public/private key pair at the time of manufacture of enhanced digital camera 10. Microprocessor 23 programs the generated public/private key pair into OTP memory 26. The public key component of the public/private key is then sent out of secure camera integrated circuit 12 and enhanced digital camera 10. The public key is then recorded, along with the serial number, for example, by a secure third party (Certificate Authority), for purposes of later authenticating and verifying the integrity of a photograph. For example, the secure third party could be a company that is in the business of issuing digital certificates for individuals and corporations.
Figure 2 illustrates an authentication and verification process that is utilized by enhanced digital camera 10 in accordance with a preferred embodiment of the present invention. When a photograph is snapped, the resulting digital data 31 is stored in RAM 24. A date and time stamp 41, generated by a real-time clock 32, is prepended to digital data 31. Also prepended to digital data 31 is a camera serial number 42 of enhanced digital camera 10. A hash function 34 is used to hash together digital data 31, date and time stamp 41 and camera serial number 42 in order to generate a hash digest 35. A digital signature function 37 digitally signs hash digest 35 with a unique private key 36 to produce a digital signature 44. Unique private key 37 is a private key which is used only for enhanced digital camera 10. Digital signature 44 is appended to digital data 31. The entire structure for the photograph, including data/time stamp 41, camera serial number 42, digital data 31 and digital signature 44, is stored in memory module 13. The stored structure for the photograph allows the photograph to be authenticated. In effect, a digital fingerprint of the photograph has been created as the photograph is taken. This allows any changes to the picture to be detected. The preferred embodiment of the present invention resists attack by those trying to circumvent the protection system. The two most obvious ways to attack the protection system would be to modify the photograph (digital data 31) and return it to memory module 13 or to modify the photograph (digital data 31) and digital signature 44, so the two match, and return the result to memory module 13. Either of these attacks, however, can be protected utilizing the preferred embodiment of the present invention. Figure 3 illustrates a detection process used to detect when the photograph (digital data 31) has been modified and returned to memory module 13 or when the photograph (digital data 31) and digital signature 44 have both been modified and then returned to memory module 13.
A secure database 60 is used to store public keys for enhanced digital cameras. For example, database 60 is a third party database used to archive the camera serial numbers and associated public keys. As show in Figure 3, each of representative entries 61, 62, 63 and 64 includes a camera serial number and an associated public key.
In order to detect whether a digital data 53 within a structure 50 has been modified, a hash function 71 is used to hash together digital data 53, a date and time stamp 51 and a camera serial number 52 in order to generate a computed hash digest 72. Camera serial number 52 is used to access from database 60 a unique public key 73 for the enhanced digital camera. A digital signature function 74 uses unique public key 73 to extract from digital signature 50 an extracted hash digest 75. A compare function 76 compares computed hash digest 72 with extracted hash digest 75 and an output 77 indicates whether there is a match (i.e., the photograph is authentic and unaltered) or there is not a match (i.e., the photograph is not authentic or has been altered).
The detection process in Figure 3 detects both the case where a photograph has been modified and returned to a memory module and the case where a photograph and digital signature have been modified and both returned to memory module 13. Modifying the photograph (but not the signature) and returning it to the memory module would result in a mismatch of the hash value of the new picture and the hash value stored in the signature. Modifying both the photograph and the signature would also result in a mismatch of the computed hash value and the hash value stored in the signature. Even though the hash value stored in the signature was properly computed, unless the hash value is signed with the correct private key, it will be detected as an altered photograph. Thus, someone attempting to sign a photograph with a non-registered public/private key pair could be detected.
While the present invention provides significant protection, there are possible ways an attempt could be made to circumvent the protection system. For example, an attempt could be made to extract the private key from a registered camera via a physical attack. The extracted private key could then be used to sign the hash value of a modified photograph. In the event this type of tampering is suspected, it may be necessary to examine the enhanced digital camera for signs of tampering to determine whether a physical attack has occurred. Also precautions can be taken when designing secure camera IC 12 to assure that the private key would be very difficult to access by an attacker. The strength and integrity of the system is predicated on the ability to store data (i.e., a private key) internal to the camera in a secure manner. The most effective way to do this, as described above, is to utilize a one-time programmable memory that is fully integrated into a single chip architecture in the enhanced digital camera. In this way, it is never necessary for the private key information to be sent outside the secure integrated circuit and increasing the ability to protect the integrity of photographs. Another potential attack on the integrity of the system would be for an attacker to access database 60 in order to insert a bogus public key. Photographs could then be "authenticated" with a bogus private key related to the bogus public key. However, inserting a bogus public key into a secured, third-party database could be difficult to achieve without detection. Databases used for securing digital signatures are typically digitally signed by the third party, adding an additional layer of security. Providing similar safeguards for database 60 would provide significant protection to the embodiments of the present invention.
The foregoing discussion discloses and describes merely exemplary methods and embodiments of the present invention. As will be understood by those familiar with the art, the invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. Accordingly, the disclosure of the present invention is intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims.

Claims

CLAIMS We Claim: 1. A method for protecting a photograph taken by a digital camera comprising the following steps: (a) hashing digital data for the photograph to produce a hash digest; and, (b) performing a digital signature function on the hash digest using a security value in order to produce a digital signature for the photograph.
2. A method as in claim 1 additionally comprising the following step: (c) storing the digital signature with the digital data for the photograph.
3. A method as in claim 1 wherein step (a) includes hashing a serial number for the camera along with the digital data for the photograph to produce the hash digest.
4. A method as in claim 1 wherein step (a) includes hashing a serial number for the camera and a date and time stamp along with the digital data for the photograph to produce the hash digest.
5. A method as in claim 1 wherein in step (b) the security value is a unique private key which is part of a private/public key pair.
6. A method as in claim 1 wherein step (a) and step (b) are both performed within a secure integrated circuit.
7. A method for authenticating a photograph taken by a digital camera comprising the following steps: (a) hashing digital data for the photograph to produce a computed hash digest; (b) accessing a security value for the digital camera; (c) using the security value for the digital camera to perform a digital signature function on a digital signature for the photograph in order to produce an extracted hash digest; and, (d) comparing the computed hash digest with the extracted hash digest to determine whether the photograph is authentic.
8. A method as in claim 7 wherein in step (c) the digital signature is stored with digital data for the photograph.
9. A method as in claim 7 wherein step (a) includes hashing a serial number for the camera along with the digital data for the photograph to produce the computed hash digest.
10. A method as in claim 7 wherein step (a) includes hashing a serial number for the camera and a date and time stamp along with the digital data for the photograph to produce the computed hash digest.
11. A method as in claim 7 wherein in step (b) the security value is a public key which is part of a private/public key pair.
12. An enhanced digital camera, comprising: a non-volatile memory in which is stored a security value used to produce digital signatures for photographs; and, a processor, the processor processing a photograph by hashing digital data for the photograph to produce a hash digest and the processor performing a digital signature function on the hash digest using the security value in order to produce a digital signature for the photograph.
13. An enhanced digital camera as in claim 12 wherein the processor stores the digital signature with the digital data for the photograph.
14. An enhanced digital camera as in claim 12 wherein when the processor hashes the digital data for the photograph, the processor hashes a serial number for the camera along with the digital data for the photograph to produce the hash digest.
15. An enhanced digital camera as in claim 12 wherein when the processor hashes the digital data for the photograph, the processor hashes a serial number for the camera and a date and time stamp along with the digital data for the photograph to produce the hash digest.
16. An enhanced digital camera as in claim 12 wherein the security value is a unique private key which is part of a private/public key pair.
17. An enhanced digital camera as in claim 12 wherein the non- volatile memory and the processor are within a secure integrated circuit.
18. An enhanced digital camera as in claim 12 wherein the non- volatile memory is a one-time programmable memory.
19. An enhanced digital camera as in claim 12 wherein the processor generates the security value.
20. An enhanced digital camera as in claim 12 wherein the security value is a unique private key which is part of a private/public key pair which is generated by the processor.
EP99965936A 1999-02-16 1999-11-30 Authentication and verification within a digital camera architecture Withdrawn EP1072149A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US25109399A 1999-02-16 1999-02-16
US251093 1999-02-16
PCT/US1999/028290 WO2000049797A1 (en) 1999-02-16 1999-11-30 Authentication and verification within a digital camera architecture

Publications (1)

Publication Number Publication Date
EP1072149A1 true EP1072149A1 (en) 2001-01-31

Family

ID=22950448

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99965936A Withdrawn EP1072149A1 (en) 1999-02-16 1999-11-30 Authentication and verification within a digital camera architecture

Country Status (3)

Country Link
EP (1) EP1072149A1 (en)
JP (1) JP2002542502A (en)
WO (1) WO2000049797A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10164966B2 (en) 2013-02-25 2018-12-25 Lockstep Technologies Pty Ltd Decoupling identity from devices in the internet of things

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6735253B1 (en) 1997-05-16 2004-05-11 The Trustees Of Columbia University In The City Of New York Methods and architecture for indexing and editing compressed video over the world wide web
US7216232B1 (en) * 1999-04-20 2007-05-08 Nec Corporation Method and device for inserting and authenticating a digital signature in digital data
US6826315B1 (en) * 2000-09-13 2004-11-30 Hewlett-Packard Development Company, L.P. Digital imaging device with image authentication capability
JP2002215029A (en) * 2001-01-22 2002-07-31 Seiko Epson Corp Information authentication device and digital camera using the same
DE10119647A1 (en) * 2001-04-20 2002-10-24 Transas S R O Digital recording of all types of image and sound data with means for ensuring recorded data is not manipulated by encryption of data after recording and prior to output in a manner analogous to watermarking
US20030065922A1 (en) 2001-09-28 2003-04-03 Fredlund John R. System and method of authenticating a digitally captured image
WO2003030541A2 (en) * 2001-10-03 2003-04-10 The Trustees Of Columbia University In The City Of New York Method and apparatus for watermarking and authenticating data
EP1453292A1 (en) * 2001-11-30 2004-09-01 Swiss Imaging Technologies AG Image data improvement for wirelessly transmitted digital image data
JP2003198540A (en) * 2001-12-28 2003-07-11 Canon Inc Image generator and verification data generating method
GB2404487A (en) * 2003-07-31 2005-02-02 Sony Uk Ltd Access control for digital storage medium content
GB2404489A (en) 2003-07-31 2005-02-02 Sony Uk Ltd Access control for digital storage medium content
WO2006096612A2 (en) 2005-03-04 2006-09-14 The Trustees Of Columbia University In The City Of New York System and method for motion estimation and mode decision for low-complexity h.264 decoder
JP4835533B2 (en) * 2007-08-03 2011-12-14 株式会社ニコン Image input apparatus and program
WO2009126785A2 (en) 2008-04-10 2009-10-15 The Trustees Of Columbia University In The City Of New York Systems and methods for image archaeology
GB2461344A (en) * 2008-07-04 2010-01-06 Canford Audio Plc Secure recording of interviews using a hashed algorithm to produce an authentication code
US8671069B2 (en) 2008-12-22 2014-03-11 The Trustees Of Columbia University, In The City Of New York Rapid image annotation via brain state decoding and visual pattern mining
IT1403121B1 (en) * 2010-09-28 2013-10-04 Calandrelli METHOD OF ORIGINAL CERTIFICATION OF A DIGITAL CONTENT PRODUCED BY AN APPARATUS, ELECTRONIC CALCULATION DEVICE AND MEMORIZATION TO BE INCORPORATED IN A APPLIANCE FOR THE PROCESSING OF THIS METHOD, AND CERTIFIED PRINT OF SUCH DIGITAL CONTENT.
US10398379B2 (en) * 2011-12-15 2019-09-03 Becton, Dickinson And Company System for improved interpretation of physiological data and presentation of physiological condition management information
DE102011122273A1 (en) * 2011-12-23 2013-06-27 Giesecke & Devrient Gmbh Apparatus and method for generating digital images
US20160379330A1 (en) 2013-06-21 2016-12-29 Signs & Wonders Unlimited, Llc Method and apparatus for protecting digital photos from alteration
US9384520B2 (en) 2013-06-21 2016-07-05 Signs & Wonders Unlimited, Llc System and method for encoding and authenticating a digital image
RU2633185C2 (en) * 2014-05-28 2017-10-11 Сергей Валентинович Баушев Method of creating digital photos protected from forgery, and device for its implementation
US10419225B2 (en) 2017-01-30 2019-09-17 Factom, Inc. Validating documents via blockchain
US10411897B2 (en) 2017-02-17 2019-09-10 Factom, Inc. Secret sharing via blockchains
US10817873B2 (en) 2017-03-22 2020-10-27 Factom, Inc. Auditing of electronic documents
US10685399B2 (en) 2017-03-31 2020-06-16 Factom, Inc. Due diligence in electronic documents
US10270599B2 (en) 2017-04-27 2019-04-23 Factom, Inc. Data reproducibility using blockchains
US10630483B2 (en) 2017-10-23 2020-04-21 Legitipix, LLC Anonymous image/video digital signature insertion and authentication
US10783164B2 (en) 2018-05-18 2020-09-22 Factom, Inc. Import and export in blockchain environments
US11170366B2 (en) 2018-05-18 2021-11-09 Inveniam Capital Partners, Inc. Private blockchain services
US11134120B2 (en) 2018-05-18 2021-09-28 Inveniam Capital Partners, Inc. Load balancing in blockchain environments
US11164250B2 (en) 2018-08-06 2021-11-02 Inveniam Capital Partners, Inc. Stable cryptocurrency coinage
US11044095B2 (en) 2018-08-06 2021-06-22 Factom, Inc. Debt recordation to blockchains
US11989208B2 (en) 2018-08-06 2024-05-21 Inveniam Capital Partners, Inc. Transactional sharding of blockchain transactions
US20200042982A1 (en) 2018-08-06 2020-02-06 Factom Digital Contracts in Blockchain Environments
US11328290B2 (en) 2018-08-06 2022-05-10 Inveniam Capital Partners, Inc. Stable cryptocurrency coinage
JPWO2021075198A1 (en) * 2019-10-17 2021-04-22
US11343075B2 (en) 2020-01-17 2022-05-24 Inveniam Capital Partners, Inc. RAM hashing in blockchain environments
US12008526B2 (en) 2021-03-26 2024-06-11 Inveniam Capital Partners, Inc. Computer system and method for programmatic collateralization services
US12007972B2 (en) 2021-06-19 2024-06-11 Inveniam Capital Partners, Inc. Systems and methods for processing blockchain transactions
FR3124914B1 (en) * 2021-07-01 2024-03-01 Bp Ventures process and system for certifying legal facts.

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5499294A (en) * 1993-11-24 1996-03-12 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration Digital camera with apparatus for authentication of images produced from an image file
US5801856A (en) * 1996-07-24 1998-09-01 Eastman Kodak Company Secure photographic systems
JP3154325B2 (en) * 1996-11-28 2001-04-09 日本アイ・ビー・エム株式会社 System for hiding authentication information in images and image authentication system
US5898779A (en) * 1997-04-14 1999-04-27 Eastman Kodak Company Photograhic system with selected area image authentication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0049797A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10164966B2 (en) 2013-02-25 2018-12-25 Lockstep Technologies Pty Ltd Decoupling identity from devices in the internet of things

Also Published As

Publication number Publication date
JP2002542502A (en) 2002-12-10
WO2000049797A1 (en) 2000-08-24

Similar Documents

Publication Publication Date Title
EP1072149A1 (en) Authentication and verification within a digital camera architecture
US11550935B2 (en) Method, apparatus, and electronic device for blockchain-based recordkeeping
US6397331B1 (en) Method for expanding secure kernel program memory
US8060748B2 (en) Secure end-of-life handling of electronic devices
KR100407900B1 (en) Method and apparatus for securely transmitting and authenticating biometric data over a network
EP2513834B1 (en) System and method for verifying the identity of an individual by employing biometric data features associated with the individual as well as a computer program product for performing said method
US7492925B2 (en) Biometric identification data protection
CN110800254A (en) System and method for generating digital indicia
CN110958319B (en) Method and device for managing infringement and evidence-based block chain
CA2290170C (en) Improved digital signature
JP2003513388A (en) System and method for ensuring data reliability with a secured counter
CN114238874A (en) Digital signature verification method and device, computer equipment and storage medium
KR100908100B1 (en) Encrypted image data with matryoshka structure and, system and method for mutual synchronization certificating using the same
US20100208950A1 (en) Biometric identification data protection
US20090240955A1 (en) Secure media storage device and method of securing media storage devices
JP4373279B2 (en) Management method of IC card for electronic signature
JP4710232B2 (en) Electronic data storage system that stores electronic data while guaranteeing the evidence
CN117557441B (en) Image copyright protection and transaction authentication method, device and medium
Lee Biometrics and identity fraud
EP3594011A1 (en) Secure cold storage medium
CN118536170A (en) PDF file signature and tamper-proof method, device and equipment
JP2006235666A (en) User authentication system
KR100947105B1 (en) Method for creating encrypted image file with matryoshka structure
CN117294468A (en) Network security protection system based on block chain
JP2006107305A (en) Data storage device

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

17P Request for examination filed

Effective date: 20010226

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Withdrawal date: 20020403