Claims
- 1. A method for authentication of JPEG compressed image data comprising the decoding steps of:
a) deriving a hashing function from a first section of JPEG compressed image data such that any changes subsequently made to said section of data would be reflected in a different hashing function being derived therefrom and producing a first integrity checking number from said derived hashing function; b) identifying a second section of data and decoding therefrom an embedded signature string; c) decrypted said signature string to recover a second integrity checking number; d) comparing said recovered second integrity checking number with said first derived integrity checking number and, if the two numbers match, then authenticating the data; e) repeating steps A-D for each successive data sections until the very last data section is reached; and f) at the very last data section, equating said last section of data as said second section and performing steps A-D.
- 2. A method as defined in claim 1 wherein said step of embedding comprises modifying the LSB of the DCT coefficient of the derived hashing function in order to maintain a parity of the sum of coefficients within a block or within a plurality of blocks in the JPEG compressed image.
- 3. A method as defined in claim 1 wherein said step of embedding comprising modifying the LSTB of the WT coefficient of the derived hashing function in order to maintain a parity of the sum of coefficients within a block or within a plurality of blocks in the JPEG compressed image.
- 4. A method as defined in claim 1 wherein said step of encrypting comprising a PGP method.
- 5. A method as defined in claim 1 wherein said hashing function comprises MD5.
- 6. A method as defined in claim 1 wherein said hashing function comprises CRC.
- 7. A method as defined in claim 1 wherein said JPEG image data is derived from fax transmission data.
- 8. A method as defined in claim 1 wherein said JPEG image data is derived from computer data.
- 9. A method as defined in claim 1 wherein said JPEG image data is derived from data transmitted over a computer network.
RELATED APPLICATIONS
[0001] Attention is directed to commonly owned and assigned copending Application Numbers:
[0002] U.S. Ser. No. (not yet assigned), filed ______ (Atty. Docket D/99422) entitled “SYSTEM AND METHOD FOR AUTHENTICATION OF JPEG IMAGE DATA”.
[0003] U.S. Ser. No. (not yet assigned), filed ______ (Atty. Docket D/99422Q1) entitled “SYSTEM AND METHOD FOR AUTHENTICATION OF JPEG IMAGE DATA”.
[0004] U.S. Ser. No. (not yet assigned), filed ______ (Atty. Docket D/99422Q2) entitled “SYSTEM AND METHOD FOR AUTHENTICATION OF JPEG IMAGE DATA”.