An Authenticated Camera

B. Schneier, J. Kelsey, D. Wagner, and C. Hall

12th Annual Computer Security Applications Conference, ACM Press, December 1996, pp. 24-30

ABSTRACT: We develop protocols for an authenticated camera that allows people to verify that a given digital image was taken by a specific camera at a specific time and specific place. These protocols require interaction between the camera and base station both before and after a series of images are taken.

[full text - postscript] [full text - LaTeX]

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc..