Cryptography – Key management – Having particular key generator
Patent
1995-05-24
1996-03-12
Buczinski, Stephen C.
Cryptography
Key management
Having particular key generator
380 30, 380 18, 348207, 348441, 348460, 348469, 348552, H04N 7167, H04K 100, H04L 900
Patent
active
054992940
ABSTRACT:
A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included.
REFERENCES:
patent: 4453074 (1984-06-01), Weinstein
patent: 4670857 (1987-06-01), Rackman
patent: 4879747 (1989-11-01), Leighton et al.
patent: 5005200 (1991-04-01), Fischer
patent: 5027401 (1991-06-01), Soltesz
patent: 5185794 (1993-02-01), Thompson et al.
patent: 5321749 (1994-06-01), Virga
Whitfield Diffie, et al., "New Directions in Cryptography," IEEE Trans. on Information Theory., vol. IT-22, No. 6, pp. 644-654, Nov. 1976.
Taher Elgamal, "A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p.sup.2)," IEEE Trans. on Information Theory, vol. IT-31, No. 4, pp. 473-481, Jul. 1985.
R. L. Rivest, et al., "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, No. 2, pp. 120-126, Feb., 1978.
Dennis K. Branstad, "The Proposal for a U.S. Standard for Digital Signature Encoding," IEEE Spectrum, pp. 30, Aug. 1992.
Buczinski Stephen C.
Kusmiss John H.
The United States of America as represented by the Administrator
LandOfFree
Digital camera with apparatus for authentication of images produ does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Digital camera with apparatus for authentication of images produ, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital camera with apparatus for authentication of images produ will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2106301