Show simple item record

dc.contributor.authorChristianson, B.
dc.contributor.authorMalcolm, J.
dc.contributor.authorRobinson, B.
dc.date.accessioned2010-03-17T11:39:19Z
dc.date.available2010-03-17T11:39:19Z
dc.date.issued2000
dc.identifier.citationChristianson , B , Malcolm , J & Robinson , B 2000 , ' Pictures Can’t Lie under Oath ' , Lecture Notes in Computer Science , vol. 1796 , pp. 208-211 . https://doi.org/10.1007/10720107_28
dc.identifier.issn0302-9743
dc.identifier.otherPURE: 97986
dc.identifier.otherPURE UUID: 183429d1-2587-43d3-be77-a9cc13233a1a
dc.identifier.otherdspace: 2299/4346
dc.identifier.otherScopus: 6344239176
dc.identifier.urihttp://hdl.handle.net/2299/4346
dc.description“The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of this article is not available in the UHRA]
dc.description.abstractBecause image manipulation by computer is so easy, it is hard to be sure that an image was indeed created at the date, time and place claimed, and that it has not been altered since. To gain this confidence requires a strong chain of evidence linking the collection of bits representing the image back to the camera that made the image. Cryptographic checksums used to implement parts of this chain must demonstrate that no other image was substituted for the correct one, even though a very long period of time might have been available for a malefactor to exhaustively search for an alternative that matched the checksum. It must be possible to secure the provenance of the image without taking the camera out of circulation, and subsequent tampering with the camera should not cast doubt on the provenance. Signing the image twice, but only publishing one of the public keys, allows the image to be verified whether the camera is available or not, and also undermines any claim that the signature could have been fabricated by trial and error. Watermarking, though largely irrelevant to this discussion, does provide a convenient way of ensuring that the image and the associated data can be handled in a way compatible with existing image processing software.en
dc.language.isoeng
dc.relation.ispartofLecture Notes in Computer Science
dc.titlePictures Can’t Lie under Oathen
dc.contributor.institutionSchool of Computer Science
dc.description.statusPeer reviewed
dc.relation.schoolSchool of Computer Science
dcterms.dateAccepted2000
rioxxterms.versionofrecordhttps://doi.org/10.1007/10720107_28
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record