System for authentication of JPEG image data

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S203000, C713S179000

Reexamination Certificate

active

07627761

ABSTRACT:
A system and method for authentication of JPEG image data enables the recipient to ascertain whether the received image file originated from a known identified source or whether the contents of the file have been altered in some fashion prior to receipt. A unique hashing function is derived from a first section of image data contained in the JPEG compressed image in such a way that any changes subsequently made to the first section of image data is reflected in a different hashing function being derived from a signature string is then embedded into a next section of the image data. Since the embedding of a previous section's integrity checking number is done without modifying the JPEG bit stream, any JPEG decoder can thereafter properly decode the image.

REFERENCES:
patent: 5499294 (1996-03-01), Friedman
patent: 5646997 (1997-07-01), Barton
patent: 5748783 (1998-05-01), Rhoads
patent: 5764770 (1998-06-01), Schipper et al.
patent: 5822458 (1998-10-01), Silverstein et al.
patent: 5862218 (1999-01-01), Steinberg
patent: 5875249 (1999-02-01), Mintzer et al.
patent: 5895779 (1999-04-01), Boffa
patent: 6005936 (1999-12-01), Shimizu et al.
patent: 6332030 (2001-12-01), Manjunath et al.
patent: 6400996 (2002-06-01), Hoffberg et al.
patent: 6532541 (2003-03-01), Chang et al.
patent: 6785815 (2004-08-01), Serret-Avila et al.
patent: 6823075 (2004-11-01), Perry
patent: 6823076 (2004-11-01), Cahill et al.
patent: 6850252 (2005-02-01), Hoffberg
patent: 6889324 (2005-05-01), Kanai et al.
patent: 6912658 (2005-06-01), Glogau et al.
patent: 7313696 (2007-12-01), de Queiroz
patent: 7360093 (2008-04-01), de Queiroz
patent: 7493489 (2009-02-01), de Queiroz
patent: 2002/0090108 (2002-07-01), Rhoads
patent: 2002/0146123 (2002-10-01), Tian
patent: 2003/0182574 (2003-09-01), Whitten et al.
patent: 2003/0217255 (2003-11-01), Wyatt
patent: 2004/0013268 (2004-01-01), de Queiroz
patent: 2004/0015696 (2004-01-01), de Queiroz
patent: 2004/0015697 (2004-01-01), de Queiroz
patent: 2004/0017925 (2004-01-01), Marvel et al.
patent: 2005/0166057 (2005-07-01), Kanai et al.
patent: 2006/0161761 (2006-07-01), Schwartz et al.
patent: 2008/0189546 (2008-08-01), Yoon
Chen et al., “Analysis and Architecture Design of EBCOT for JPEG-2000”, Conference Proceedings of the 2001 IEEE International Symposium on Circuits and Systems (ISCAS), May 6-9, 2001, vol. II, pp. 765-768.
Grosbois, R.; Gerbelto, P.; Ebrahimi, T.; Authentication and access control in the JPEG 2000 compressed domain; SPIE 46thAnnual Meeting, Applications of Digital Image Processing Jul. 29-Aug. 3, 2001; Retrieved date Nov. 2, 2005.
An article entitled: “JPEG 2000: Overview Architecture and Applications”, by Gormish et. al., inProceedings of the IEEE International Conference in Image Processing, Vancouver, Canada, 2000.
The article “A Public Key Watermark for Image Verification and Authentication” authored by P. Wong, which appears at theIEEE Proceedings of the International Conference on Image Processing, Chicago IL 1998.
The article entitled: “Watermarking of Digital Image and Video Data”, by Langelaar et. al., IEEE Signal Processing Magazine, pp. 20-46, vol. 17, No. 5, Sep. 2000.
The article “Images with self-correcting capabilities”, by J. Fridrich and M. Goljan, which appears at the Proceedings of theIEEE International Conference on Image Processing, Kobe, Japan, Oct. 1999.
Schneier, D. Applied Cryptography; John Wiley & Sons; 1996, pp. 584-587.
Grosbois, R.; Gerbelto, P.; Ebrahimi, T.; Authentication and access control in the JP 2000 compressed domain; In Proc. Of the SPIE 46thAnnual Meeting, appliocations of Digital Image Processing XXIV, San Diego, Jul. 29-Aug. 3, 2001; 10 pages.
Wong, P.; Hewlitt Packard Company; A Public Key Watermark for Image Verification and Authentication, 1998; IEEE Retrieved Date Mar. 10, 2006 pp. 455-459.
Martina, M.; JPEG2000 Decoder Architecture for Mobile Applications; Oct. 11-12, 2001; pp. 1-5.
Ching-Yung Lin; Shih-Fu Chang. A robust image authentication method distinguishing JPEG compression from malicious manipulation; IEEE Transactions on Circuits and Systems for Video Techology, vol. 11. No. 2, pp. 153-168 Feb. 2001.
Fridrich, J.; Goljan, M.; Rui Du. Invertible authentication watermark for JPEG images; Information Technology: Coding and Computing, 2001. Proceedings. International Conference on Apr. 2-4, 2001 pp. 223-227O D.
Kundur, D.; Hatzinakos, D..Digital watermarking for telltale tamper proofing and authentication; Proceedings of the IEEEvol. 87, Issue 7, Jul. 1999 pp. 1167-1180.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System for authentication of JPEG image data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System for authentication of JPEG image data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for authentication of JPEG image data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4148491

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.