System and method for authentication of JPEG image data

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S030000, C382S100000, C382S190000

Reexamination Certificate

active

07493489

ABSTRACT:
A system and method for authentication of JPEG image data enables the recipient to ascertain whether the received image file originated from a known identified source or whether the contents of the file have been altered in some fashion prior to receipt. A unique hashing function is derived from a first section of image data contained in the JPEG compressed image in such a way that any changes subsequently made to the first section of image data is reflected in a different hashing function being derived from a signature string is ten embedded into a next section of the image data. Since the embedding of a previous section's integrity checking number is done without modifying the JPEG bit stream, any JPEG decoder can thereafter properly decode the image.

REFERENCES:
patent: 5499294 (1996-03-01), Friedman
patent: 5646997 (1997-07-01), Barton
patent: 5748783 (1998-05-01), Rhoads
patent: 5764770 (1998-06-01), Schipper et al.
patent: 5822458 (1998-10-01), Silverstein et al.
patent: 5862218 (1999-01-01), Steinberg
patent: 5875249 (1999-02-01), Mintzer et al.
patent: 5895779 (1999-04-01), Boffa
patent: 5974548 (1999-10-01), Adams
patent: 6005936 (1999-12-01), Shimizu et al.
patent: 6212504 (2001-04-01), Hayosh
patent: 6332030 (2001-12-01), Manjunath et al.
patent: 6400996 (2002-06-01), Hoffberg et al.
patent: 6501397 (2002-12-01), Radha et al.
patent: 6532541 (2003-03-01), Chang et al.
patent: 6560706 (2003-05-01), Carbajal et al.
patent: 6785815 (2004-08-01), Serret-Avila et al.
patent: 6823075 (2004-11-01), Perry
patent: 6823076 (2004-11-01), Cahill et al.
patent: 6850252 (2005-02-01), Hoffberg
patent: 6889324 (2005-05-01), Kanai et al.
patent: 6904091 (2005-06-01), Schelkens et al.
patent: 6912658 (2005-06-01), Glogau et al.
patent: 7006656 (2006-02-01), Fridrich et al.
patent: 7046817 (2006-05-01), Kamijoh et al.
patent: 7092965 (2006-08-01), Easwar
patent: 7110608 (2006-09-01), Chan et al.
patent: 7269734 (2007-09-01), Johnson et al.
patent: 2002/0090108 (2002-07-01), Rhoads
patent: 2002/0146123 (2002-10-01), Tian
patent: 2003/0217255 (2003-11-01), Wyatt
patent: 2004/0013268 (2004-01-01), de Queiroz
patent: 2004/0015695 (2004-01-01), de Queiroz
patent: 2004/0015697 (2004-01-01), de Queiroz
patent: 2004/0017925 (2004-01-01), Marvel et al.
patent: 11-196392 (1999-07-01), None
patent: 2001-203878 (2001-07-01), None
patent: 2001-223735 (2001-08-01), None
patent: 2002-094769 (2002-03-01), None
Grosbois, Raphael; Gerbelot, Pierre; Ebrahimi, Touradj. “Authentication and access control in the JPEG 2000 compressed domain”. In Proc of the SPIE 46th Annual Meeting, Applications of Digital Image Processing XXIV, San Diego, Jul. 29-Aug. 3, 2001.
Schneier, Bruce. Applied Cryptography. John Wiley & Sons. 1996. pp. 584-587.
Grosbois, R.; Gerbelto, P.; Ebrahimi, T.; Authentication and access control in the JPEG 2000 compressed domain; SPIE 46thAnnual Meeting, Applications of Digital Image Processing Jul. 29-Aug. 3, 2001; Retrieved date Nov. 2, 2005.
An article entitled: “JPEG 2000: Overview Architecture and Applications”, by Gormish et. al., inProceedings of the IEEE International Conference in Image Processing, Vancouver, Canada, 2000.
The article “A Public Key Watermark for Image Verification and Authentication” authored by P. Wong, which appears at theIEEE Proceedings of the International Conference on Image Processing, Chicago IL 1998.
The article entitled: “Watermarking of Digital Image and Video Data”, by Langelaar et. al., IEEE Signal Processing Magazine, pp. 20-46, vol. 17, No. 5, Sep. 2000.
The article “Images with self-correcting capabilities”, by J. Fridrich and M. Goljan, which appears at the Proceedings of theIEEE International Conference on Image Processing, Kobe, Japan, Oct. 1999.
Wong, P.; Hewlitt Packard Company; A Public Key Watermark for Image Verification and Authentication, 1998; IEEE Retrieved Date Mar. 10, 2006 pp. 455-459.
Chen et al.; Analysis and Architecture Design of EBCOT for JPEG-2000. conference Proceedings of the 2001 IEEE International Symposium on Circuits and Systems (IACAS); May 2-9, 2001; vol. II, pp. 765-768.
Martina, M.; JPEG2000 Decoder Architecture for Mobile Applications; Oct. 11-12, 2001; pp. 1-5.
Ching-Yung Lin; Shih-Fu Chang. A robust image authentication method distinguishing JPEG compression from malicious manipulation; IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, No. 2, pp. 153-168, Feb. 200100.
Fridrich, J.; Goljan, M.; Rui Du. Invertible authentication watermark for JPEG images; Information Technology: Coding and Computing, 2001. Proceedings. International Conference on Apr. 2-4, 2001 pp. 223-227O D.
Kundur, D.; Hatzinakos, D..Digital watermarking for telltale tamper proofing and authentication; Proceedings of the IEEEvol. 87, Issue 7, Jul. 1999 pp. 1167-1180.
Prosecution History for U.S. Appl. No. 10/200,925 as of Sep. 19, 2008.
Prosecution History for U.S. Appl. No. 10/200,872 as of Sep. 19, 2008.
Prosecution History for U.S. Appl. No. 10/200,819 as of Sep. 19, 2008.
Office Action from Japanese Patent Office for foreign counterpart to related US Patent Application.
Zhou, X.Q. Huang, H.K. Lou, S.L. “Authenticity and integrity of digital mammography images”. IEEE transactions on medical imaging. Aug. 2001. pp. 784-791.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for authentication of JPEG image data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for authentication of JPEG image data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for authentication of JPEG image data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4130027

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.