An Authenticated Camera
B. Schneier, J. Kelsey, D. Wagner, and C. Hall
12th Annual Computer Security Applications Conference, ACM Press, December 1996, pp. 24-30
ABSTRACT: We develop protocols for an authenticated camera that allows people to verify that a given digital image was taken by a specific camera at a specific time and specific place. These protocols require interaction between the camera and base station both before and after a series of images are taken.
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient Systems, Inc..