Method for authentication of JPEG image data

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S176000, C380S203000

Reexamination Certificate

active

10200819

ABSTRACT:
A method enables a recipient of JPEG image data to authenticate the JPEG image data by producing a hashing function from a first section of the JPEG image data. A first integrity checking value is produced from the hashing function produced from the first section of JPEG image data and, from a least significant transmitted bit-plane of a second section of the JPEG image data, an embedded encrypted signature string is extracted and decrypted to generate a second integrity checking value. The first and second integrity checking values are compared and the first section of the JPEG image data is authenticated when the second integrity checking value matches the first integrity checking value.

REFERENCES:
patent: 5499294 (1996-03-01), Friedman
patent: 5646997 (1997-07-01), Barton
patent: 5748783 (1998-05-01), Rhoads
patent: 5764770 (1998-06-01), Schipper et al.
patent: 5822458 (1998-10-01), Silverstein et al.
patent: 5862218 (1999-01-01), Steinberg
patent: 5875249 (1999-02-01), Mintzer et al.
patent: 5895779 (1999-04-01), Boffa
patent: 6005936 (1999-12-01), Shimizu et al.
patent: 6332030 (2001-12-01), Manjunath et al.
patent: 6400996 (2002-06-01), Hoffberg et al.
patent: 6532541 (2003-03-01), Chang et al.
patent: 6785815 (2004-08-01), Serret-Avila et al.
patent: 6823075 (2004-11-01), Perry
patent: 6823076 (2004-11-01), Cahill et al.
patent: 6850252 (2005-02-01), Hoffberg
patent: 6889324 (2005-05-01), Kanai et al.
patent: 6912658 (2005-06-01), Glogau et al.
patent: 2002/0090108 (2002-07-01), Rhoads
patent: 2002/0146123 (2002-10-01), Tian
patent: 2003/0217255 (2003-11-01), Wyatt
patent: 2004/0015695 (2004-01-01), de Queiroz
patent: 2004/0015696 (2004-01-01), de Queiroz
patent: 2004/0015697 (2004-01-01), de Queiroz
patent: 2004/0017925 (2004-01-01), Marvel et al.
Authentication and access control in the JPEG 2000 Compressed domain by Raphael Grosbois, Pierre Gerbelto, Touradj Ebrahimi□□SPIE 46th Annual Meeting, Applications of Digital Image Processing Jul. 29-Aug. 3, 2001.□□Retrieved date Nov. 2, 2005.
Ping Wah Wong Hewlett Packard Company, A public Key Watermark for Image Verification and Authentication, 1998, IEEE□□Retrieved Date Mar. 10, 2006 pp. 455-459.
An article entitled: “JPEG 2000: Overview Architecture and Applications”, by Gormish et. al., inProceedings of the IEEE International Conference in Image Processing, Vancouver, Canada, 2000.
The article “A Public Key Watermark for Image Verification and Authentication” authored by P. Wong, which appears at theIEEE Proceedings of the International Conference on Image Processing, Chicago IL 1998.
The article entitled: “Watermarking of Digital Image and Video Data”, by Langelaar et. al., IEEE Signal Processing Magazine, pp. 20-46, vol. 17, No. 5, Sep. 2000.
The article “Image with self-correcting capabilities”, by J. Fridrich and M. Goljan, which appears at the Proceedings of theIEEE International Conference on Image Processing, Kobe, Japan, Oct. 1999.
Schneier, D. Applied Cryptography; John Wiley & Sons; 1996, pp. 584-587.
Chen et al.; Analysis and Architecture Design of EBCOT fro JPEG-2000. conference Proceedings of the 2001 IEEE International Symposium on Circuits and Systems (IACAS); May 2-9, 2001; vol. II, pp. 765-768.
Martina, M.; JPEG2000 Decoder Architecture for Mobile Applications; Oct. 11-12, 2001; pp. 1-5.
Ching-Yung Lin; Shih-Fu Chang. A robust image authentication method distinguishing JPEG compression from malicious manipulation; IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, No. 2, pp. 153-168, Feb. 200100.
Fridrich, J.; Goljan, M.; Rui Du. Invertible authentication watermark for JPEG images; Information Technology: Coding and Computing, 2001. Proceedings. International Conference on Apr. 2-4, 2001 pp. 223-227O D.
Kundur, D.; Hatzinakos, D..Digital watermarking for telltale tamper proofing and authentication; Proceedings of the IEEEvol. 87, Issue 7, Jul. 1999 pp. 1167-1180.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for authentication of JPEG image data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for authentication of JPEG image data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for authentication of JPEG image data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3828628

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.