WO2000011834A1 - Graphic digital signatures - Google Patents

Graphic digital signatures Download PDF

Info

Publication number
WO2000011834A1
WO2000011834A1 PCT/US1998/017605 US9817605W WO0011834A1 WO 2000011834 A1 WO2000011834 A1 WO 2000011834A1 US 9817605 W US9817605 W US 9817605W WO 0011834 A1 WO0011834 A1 WO 0011834A1
Authority
WO
WIPO (PCT)
Prior art keywords
digital signature
digital
attachment
recipient
signature
Prior art date
Application number
PCT/US1998/017605
Other languages
French (fr)
Inventor
Mary J. Cronin
Scott B. Guthery
Original Assignee
Schlumberger Industries, S.A.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Schlumberger Industries, S.A. filed Critical Schlumberger Industries, S.A.
Priority to AU92943/98A priority Critical patent/AU9294398A/en
Priority to PCT/US1998/017605 priority patent/WO2000011834A1/en
Publication of WO2000011834A1 publication Critical patent/WO2000011834A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00281Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a telecommunication apparatus, e.g. a switched network of teleprinters for the distribution of text-based information, a selective call terminal
    • H04N1/00312Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a telecommunication apparatus, e.g. a switched network of teleprinters for the distribution of text-based information, a selective call terminal with a digital transmission apparatus, e.g. a switched network of teleprinters for the distribution of text-based information, SMS or ISDN device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00281Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a telecommunication apparatus, e.g. a switched network of teleprinters for the distribution of text-based information, a selective call terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/328Processing of the additional information

Definitions

  • a digital signature is a digital representation of information identifying the author or source of a document which includes but is not limited to a demonstration of knowledge of secret or little-known information
  • a sender using a computer or similar digital means, composes a message he intends to send to one or more recipients.
  • a digital signature is derived based on some aspect of the message. How the digital signatures are actually coded and decoded are beyond the scope of this patent, but see Mitchell, Piper and Wild, "Digital Signatures", Contemporary Cryptology, pp. 325-378, which is incorporated herein by reference .
  • Digital signatures are typically attached to digital messages which are passed from one computer to another via a network - from small, in-house intranets to the large networks such as the Internet.
  • Current methods represent digital signatures as large blocks of alphanumeric, hexadecimal or binary characters.
  • a digital signature might be represented in an electronic mail (e- mail) as follows:
  • the present invention provides means for steganographically embedding a digital signature into a more intuitive signature graphic such as is shown at 50 in Fig. 1 or into an audio recording of the sender saying something such as "This document about widget pricing dated May 23, 1997, has been written by me.”
  • a method of digital communication comprises the steps of providing a digital message that the sender desires to send to one or more recipients; providing a digital signature such as a private key encrypted hash of the message or a biometric such as a private encryption key or unique biometric information such as a facial picture, a fingerprint, an iris or retinal scan, typing and handwriting patterns, hand or finger geometry or a voice print; providing a user- perceptible attachment such as a picture or audio,- embedding the digital signature into the attachment; attaching the attachment to the message to form a digital communication; and sending the communication.
  • a digital signature such as a private key encrypted hash of the message or a biometric such as a private encryption key or unique biometric information such as a facial picture, a fingerprint, an iris or retinal scan, typing and handwriting patterns, hand or finger geometry or a voice print
  • providing a user- perceptible attachment such as a picture or audio,- embedding the digital signature into the attachment
  • the digital signature is embedded into the attachment by substituting bits of the digital signature into selected least significant bits of the attachment. In this manner, the changes to the attachment are virtually undetectable by the recipient . The existence or the state of the attachment itself may alert the recipient to the fact that a digital signature is present.
  • a header may be embedded into the attachment at predetermined locations . This header may serve to identify the existence of the digital signature, or .the header may contain parameters which provide further information about the digital signature, e.g., coding technique, location within the attachment, etc.
  • the attachment may be modified before embedding the digital signature by any number and manner of transformations. Such modification may be used to alert the recipient that a digital signature is present. Examples of such modification transformations are warping and morphing .
  • Either the recipient can initiate verification of the digital signature, or such verification can come about automatically.
  • both the message and the attachment are available to the recipient.
  • the recipient may begin the verification process, for example, by selecting the attachment using a computer mouse.
  • Verification comprises extracting the digital signature from the attachment and verifying the validity of the digital signature according to standard digital signature techniques.
  • the recipient may be notified as to whether the digital signature is valid or not, or the digital signature may be displayed to the recipient.
  • the software that forms those functions may, for example, be incorporated in otherwise conventional e- mail software.
  • Fig. 1 illustrates a graphic signature as it might appear in an e-mail.
  • Fig. 2A illustrates a prior art electronic e-mail communication with an alphanumeric representation of a digital signature.
  • Fig. 2B illustrates an electronic e-mail communication with a graphic in which a digital signature is steganographically embedded.
  • Fig. 3 is a flowchart showing generally the process of embedding a digital signature.
  • Fig. 4 is a flowchart showing generally the process of extracting a digital signature and further processing it.
  • Fig. 5 illustrates a graphic which could be used to notify a recipient of a valid digital signature.
  • Fig. 2A illustrates an electronic mail (e-mail) communication 100 as it might appear in prior art.
  • the sender has composed a message 102, in this example, consisting of the sentence "Please give Alice Gilbert a master key," followed by a salutation.
  • a digital signature 104 is generated.
  • the digital signature may be based on the message 102 and a key known or provided to the sender' s computer, or it may be independent of the message 102 itself, as in the case where the signature is a fingerprint.
  • the digital signature 104 is appended to the message 102, along with some additional information 106, to form the digital communication, which is transmitted or sent to one or more intended recipients.
  • a non-technical person receiving this message may not immediately know the purpose of the digital signature 104 and/or how to use it.
  • Fig. 2B illustrates the equivalent email communication 110 as produced by the present invention.
  • a message 112 consists of some text the sender wishes to convey to the recipient, again, in this example, the sentence "Please give Alice Gilbert a master key," followed by a salutation.
  • a graphic, digitized (not digital) signature 114 of the sender (Sally) is attached to the communication. This graphic 114 has been slightly altered such that it contains the same digital signature as shown in 104 of Fig. 2A.
  • the recipient When the signed email 110 of Fig. 2B arrives at its destination and is selected for reading by the recipient, the recipient is offered the opportunity to verify the signature. If the user decides to verify the signature, for example by selecting a "Verify" button, then the e-mail software extracts the digital signature 104 from the graphic 114 and performs the usual digital signature verification. If the digital signature 114 is verified, i.e., the digital signature supports the claim that the email comes from Sally Green, the software might display an acknowledgment such as "Signature verified as the signature of Sally Green," or a graphic 60 such as that shown in Fig. 5.
  • the message may be text, audio, graphic, or some other mode of conveying information digitally.
  • the communication is not limited to email.
  • the communication could be a transmittal of a World Wide Web page or some other means of digitally transmitting a message.
  • the attachment into which the digital signature is embedded may itself be text, audio, graphic, video, etc.
  • the attachment may be modified before embedding the digital signature. For example, warping and morphing, as well as other transformations, may be applied to a graphic or picture. Similarly, other types of transformations may be applied to audio signals. Such modifications may be used to alert the recipient that a digital signature is present .
  • Fig. 3 is a flowchart showing generally the process of embedding a digital signature.
  • the sender composes or otherwise provides a message comprising the information he wishes to communicate to the recipients .
  • an image or audio attachment is provided, and at 204 a digital signature is calculated or otherwise provided.
  • suitable digital signature algorithms can be found in "Digital Signature Schemes" by Birgit Pfitzmann and published by Springer-Verlag in 1996 (ISBN 3-540-61517- 2) which is herein incorporated by reference.
  • the attachment can be modified using image processing or audio processing algorithms .
  • the purpose of this transformation is to provide to the recipient an indicator that a digital signature has been included and can be validated.
  • an image may undergo warping 206, morphing 208, and/or other transformations 210.
  • Audio be may subjected to audio-type transforms, for example, filtering .
  • Warping 206 is typically applied to line-drawing images and comprises bending or moving some of the lines in the image. For example, if the original attachment is an image of a dragonfly and the body of the dragonfly is a long, curved cigar shape, this image can be warped by increasing or decreasing the bending of the body of the dragonfly.
  • the amount of warping is determined based on parameters computed from the document such as a word count .
  • Morphing algorithms 208 transform one image to another by computing a series of images visually between a beginning image and an ending image.
  • a user chooses an ending image to morph an original "signing" image toward. If some computed value for the message, such as a word count or a digital signature, is n on a scale from 0 to N, then the image that is n/N of the way from the original signing image to the ending image is selected as the attachment in which the digital signature will be embedded. Examples of suitable warping and morphing algorithms can be found in "Digital Image Warping" by George Wolberg and published by the IEEE Computer Society Press in 1990 (ISBN 0-81868944-7) which is herein incorporated by reference.
  • the digital signature is embedded into the attachment using steganographic techniques 212, described below.
  • the attachment is attached 214 to the message to form a communication, and finally, the communication is transmitted 216 to the intended recipients.
  • Steganographic algorithms are typically used to hide information in images, although the technique is easily applied to digital audio signals as well. What appears to be an innocent picture actually contains a secret message.
  • the embedding of the text into the picture is deliberately constructed so as to not disturb the image such that a viewer cannot tell that the picture contains a message simply by looking at it. In other words, the embedding does not alter - at least to the human eye or ear - the appearance of the picture or the sound of an audio.
  • each point (pixel) in the photograph is represented as a 16 -bit number where 0 represents all white, 32,768 represents all black and numbers in between represent shades of gray between white and black.
  • the digital signature can be embedded into the photograph by setting the low-order bit of a pixel (a point in the photograph) of the photograph to 0 when the corresponding bit in the digital signature is 0, and to 1 when the corresponding bit in the digital signature is 1. If the low-order bit in the pixel were originally 0 and it is now set to 1, then the pixel becomes just a little darker, but not enough to be noticeable.
  • Fig. 4 is a flowchart showing generally the process of extracting and processing the digital signature from the received communication.
  • the communication must be received by the recipient or his computer 302.
  • the recipient must be made aware that the communication contains an embedded digital signature. This is done by displaying 304 the graphic attachment so that the recipient can see it, or, in the case of an audio attachment, playing the attachment so that the recipient hears it . Any transformations which have been applied may themselves be the clue to the recipient that a digital signature has been embedded.
  • the recipient can then ask for validation of the digital signature 306 and the digital signature is extracted from the attachment 308 by reading the bits known to contain the digital signature.
  • the digital signature is verified 310 and the recipient is notified 312 as to whether the signature is valid or not.
  • the extracted digital signature can be displayed 314 for the recipient's viewing.

Abstract

A method for steganographically embedding digital signatures into graphic and audio attachments in electronic communications such as e-mail, World Wide Web pages, etc. Recipients, seeing the graphic or hearing the audio, are made aware of the existence of the embedded digital signature and may request that it be validated. The digital signature is extracted from the attachment and validated for the recipient.

Description

G APHIC DIGITAL SIGNATURES
BACKGROUND OF THE INVENTION
With the increased usage of the Internet and other computer networks, it is becoming increasingly important to be able to ensure that an electronic message received over a network is both authentic, i.e., that the sender is who he claims to be, and that the message has not been altered by some third party en route .
Digital signatures have been developed to fill this need. A digital signature is a digital representation of information identifying the author or source of a document which includes but is not limited to a demonstration of knowledge of secret or little-known information
Generally, a sender, using a computer or similar digital means, composes a message he intends to send to one or more recipients. At the sender's request, or automatically, a digital signature is derived based on some aspect of the message. How the digital signatures are actually coded and decoded are beyond the scope of this patent, but see Mitchell, Piper and Wild, "Digital Signatures", Contemporary Cryptology, pp. 325-378, which is incorporated herein by reference .
Digital signatures are typically attached to digital messages which are passed from one computer to another via a network - from small, in-house intranets to the large networks such as the Internet. Current methods represent digital signatures as large blocks of alphanumeric, hexadecimal or binary characters. For example, a digital signature might be represented in an electronic mail (e- mail) as follows:
iQBFAgUBM0jm3ygmpqV0uJ6VAQFOqwF/emw7/FlwFFe3q00HlQZbtzJI5Y2 RKMgYovXpsOsUgNVAbqHMiyHD2uTDLVxdID76=THEF
Representations such as this are not only aesthetically unpleasing to a human recipient but due to their highly technical appearance may serve to discourage non-technical users from using digital signature technology altogether.
SUMMARY OF THE INVENTION
Representing digital signatures in meaningful and intuitive graphical and audio forms allows non- echnical users to easily understand their purpose. Such users are therefore more likely to use digital signatures. By providing a method for personalizing the display of a digital signature, all users are encouraged to use digital signatures in their own messages .
The present invention provides means for steganographically embedding a digital signature into a more intuitive signature graphic such as is shown at 50 in Fig. 1 or into an audio recording of the sender saying something such as "This document about widget pricing dated May 23, 1997, has been written by me."
In accordance with the present invention, a method of digital communication comprises the steps of providing a digital message that the sender desires to send to one or more recipients; providing a digital signature such as a private key encrypted hash of the message or a biometric such as a private encryption key or unique biometric information such as a facial picture, a fingerprint, an iris or retinal scan, typing and handwriting patterns, hand or finger geometry or a voice print; providing a user- perceptible attachment such as a picture or audio,- embedding the digital signature into the attachment; attaching the attachment to the message to form a digital communication; and sending the communication.
In a preferred embodiment, the digital signature is embedded into the attachment by substituting bits of the digital signature into selected least significant bits of the attachment. In this manner, the changes to the attachment are virtually undetectable by the recipient . The existence or the state of the attachment itself may alert the recipient to the fact that a digital signature is present. Furthermore, a header may be embedded into the attachment at predetermined locations . This header may serve to identify the existence of the digital signature, or .the header may contain parameters which provide further information about the digital signature, e.g., coding technique, location within the attachment, etc.
The attachment may be modified before embedding the digital signature by any number and manner of transformations. Such modification may be used to alert the recipient that a digital signature is present. Examples of such modification transformations are warping and morphing .
Either the recipient can initiate verification of the digital signature, or such verification can come about automatically. Generally, when a communication is received, both the message and the attachment are available to the recipient. The recipient may begin the verification process, for example, by selecting the attachment using a computer mouse. Verification comprises extracting the digital signature from the attachment and verifying the validity of the digital signature according to standard digital signature techniques. Finally, the recipient may be notified as to whether the digital signature is valid or not, or the digital signature may be displayed to the recipient. The software that forms those functions may, for example, be incorporated in otherwise conventional e- mail software.
The above and other features of the invention including various novel details of construction and combinations of parts, and other advantages, will now be more particularly described with reference to the accompanying drawings and pointed out in the claims . It will be understood that the particular method and device embodying the invention are shown by way of illustration and not as a limitation of the invention. The principles and features of this invention may be employed in various and numerous embodiments without departing from the scope of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular description of preferred embodiments and the drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principals of the invention.
Fig. 1 illustrates a graphic signature as it might appear in an e-mail.
Fig. 2A illustrates a prior art electronic e-mail communication with an alphanumeric representation of a digital signature.
Fig. 2B illustrates an electronic e-mail communication with a graphic in which a digital signature is steganographically embedded.
Fig. 3 is a flowchart showing generally the process of embedding a digital signature.
Fig. 4 is a flowchart showing generally the process of extracting a digital signature and further processing it.
Fig. 5 illustrates a graphic which could be used to notify a recipient of a valid digital signature.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Fig. 2A illustrates an electronic mail (e-mail) communication 100 as it might appear in prior art. The sender has composed a message 102, in this example, consisting of the sentence "Please give Alice Gilbert a master key," followed by a salutation. A digital signature 104 is generated. The digital signature may be based on the message 102 and a key known or provided to the sender' s computer, or it may be independent of the message 102 itself, as in the case where the signature is a fingerprint. The digital signature 104 is appended to the message 102, along with some additional information 106, to form the digital communication, which is transmitted or sent to one or more intended recipients. A non-technical person receiving this message may not immediately know the purpose of the digital signature 104 and/or how to use it.
Fig. 2B illustrates the equivalent email communication 110 as produced by the present invention. A message 112 consists of some text the sender wishes to convey to the recipient, again, in this example, the sentence "Please give Alice Gilbert a master key," followed by a salutation. In this example, however, a graphic, digitized (not digital) signature 114 of the sender (Sally) is attached to the communication. This graphic 114 has been slightly altered such that it contains the same digital signature as shown in 104 of Fig. 2A.
When the signed email 110 of Fig. 2B arrives at its destination and is selected for reading by the recipient, the recipient is offered the opportunity to verify the signature. If the user decides to verify the signature, for example by selecting a "Verify" button, then the e-mail software extracts the digital signature 104 from the graphic 114 and performs the usual digital signature verification. If the digital signature 114 is verified, i.e., the digital signature supports the claim that the email comes from Sally Green, the software might display an acknowledgment such as "Signature verified as the signature of Sally Green," or a graphic 60 such as that shown in Fig. 5.
Of course it would be understood in the art that the message may be text, audio, graphic, or some other mode of conveying information digitally. Furthermore, it would be understood that the communication is not limited to email. For example, the communication could be a transmittal of a World Wide Web page or some other means of digitally transmitting a message. Finally the attachment into which the digital signature is embedded may itself be text, audio, graphic, video, etc.
The attachment may be modified before embedding the digital signature. For example, warping and morphing, as well as other transformations, may be applied to a graphic or picture. Similarly, other types of transformations may be applied to audio signals. Such modifications may be used to alert the recipient that a digital signature is present .
Fig. 3 is a flowchart showing generally the process of embedding a digital signature. First, at 200, the sender composes or otherwise provides a message comprising the information he wishes to communicate to the recipients . At 202 an image or audio attachment is provided, and at 204 a digital signature is calculated or otherwise provided. Examples of suitable digital signature algorithms can be found in "Digital Signature Schemes" by Birgit Pfitzmann and published by Springer-Verlag in 1996 (ISBN 3-540-61517- 2) which is herein incorporated by reference.
The attachment can be modified using image processing or audio processing algorithms . The purpose of this transformation is to provide to the recipient an indicator that a digital signature has been included and can be validated. For example, an image may undergo warping 206, morphing 208, and/or other transformations 210. Audio be may subjected to audio-type transforms, for example, filtering . Warping 206 is typically applied to line-drawing images and comprises bending or moving some of the lines in the image. For example, if the original attachment is an image of a dragonfly and the body of the dragonfly is a long, curved cigar shape, this image can be warped by increasing or decreasing the bending of the body of the dragonfly. In one embodiment of the present invention, the amount of warping is determined based on parameters computed from the document such as a word count .
Morphing algorithms 208 transform one image to another by computing a series of images visually between a beginning image and an ending image. In one embodiment of the present invention, a user chooses an ending image to morph an original "signing" image toward. If some computed value for the message, such as a word count or a digital signature, is n on a scale from 0 to N, then the image that is n/N of the way from the original signing image to the ending image is selected as the attachment in which the digital signature will be embedded. Examples of suitable warping and morphing algorithms can be found in "Digital Image Warping" by George Wolberg and published by the IEEE Computer Society Press in 1990 (ISBN 0-81868944-7) which is herein incorporated by reference.
Referring again to Fig. 3 after the transformations 206, 208, 210 have been applied to the attachment, the digital signature is embedded into the attachment using steganographic techniques 212, described below. The attachment is attached 214 to the message to form a communication, and finally, the communication is transmitted 216 to the intended recipients. Steganographic algorithms are typically used to hide information in images, although the technique is easily applied to digital audio signals as well. What appears to be an innocent picture actually contains a secret message. The embedding of the text into the picture is deliberately constructed so as to not disturb the image such that a viewer cannot tell that the picture contains a message simply by looking at it. In other words, the embedding does not alter - at least to the human eye or ear - the appearance of the picture or the sound of an audio.
Suppose for example that a black and white photograph exists such that each point (pixel) in the photograph is represented as a 16 -bit number where 0 represents all white, 32,768 represents all black and numbers in between represent shades of gray between white and black. Taking a digital signature as a string of bits, the digital signature can be embedded into the photograph by setting the low-order bit of a pixel (a point in the photograph) of the photograph to 0 when the corresponding bit in the digital signature is 0, and to 1 when the corresponding bit in the digital signature is 1. If the low-order bit in the pixel were originally 0 and it is now set to 1, then the pixel becomes just a little darker, but not enough to be noticeable. Similarly, if the low-order bit in the pixel were originally 1 and it is now set to 0, then the pixel becomes just a little brighter, but again not enough to be noticed. Continuing in this fashion, all of the bits of the digital signature can be embedded into the photograph without visually changing it. Examples of suitable steganographic algorithms can be found in "Information
Hiding: Proceedings of the First International Workshop, U.K. May 30 - June 1, 1996" edited by Ross Andersion and published by Springer-Verlag in 1996 (ISBN 3-540-61996-8) which is herein incorporated by reference.
In the present invention, it is not the intention to actually hide the digital signature from a recipient, that is prevent a recipient from accessing the embedded digital signature, but rather to use the attachment to "carry" the digital signature in such manner that the attachment is not noticeably altered by the digital signature.
Fig. 4 is a flowchart showing generally the process of extracting and processing the digital signature from the received communication. First, the communication must be received by the recipient or his computer 302. The recipient must be made aware that the communication contains an embedded digital signature. This is done by displaying 304 the graphic attachment so that the recipient can see it, or, in the case of an audio attachment, playing the attachment so that the recipient hears it . Any transformations which have been applied may themselves be the clue to the recipient that a digital signature has been embedded.
The recipient can then ask for validation of the digital signature 306 and the digital signature is extracted from the attachment 308 by reading the bits known to contain the digital signature. In a preferred embodiment, the digital signature is verified 310 and the recipient is notified 312 as to whether the signature is valid or not. Alternatively, the extracted digital signature can be displayed 314 for the recipient's viewing. While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims .

Claims

1. A method of digital communication comprising: providing a digital message; generating a digital signature related to the message,- and embedding the digital signature in a user- perceptible attachment accompanying the digital message .
2. A method as in Claim 1 wherein embedding the digital signature comprises the steps of: selecting bits within the attachment; associating bits of the digital signature with the selected bits; and altering the selected bits by writing the digital signature bits into the associated attachment bits.
3. A method as in Claim 2 wherein a known header string is inserted at a predetermined location in the attachment .
4. A method as in Claim 3 wherein the header string comprises parameters describing the digital signature.
5. A method as in Claim 1 further comprising the step of modifying the attachment before the step of embedding the digital signature.
6. A method as in Claim 1 wherein the attachment is a digital picture.
7. A method as in Claim 6 wherein the digital picture is a representation of an entity whose identity is being embedded in the picture.
8. A method as in Claim 6 further comprising the step of modifying the digital picture before the step of embedding the digital signature.
9. A method as in Claim 8 wherein the step of modifying the digital picture comprises warping the digital picture according to a computed value.
10. A method as in Claim 9 wherein the computed value is the digital signature.
11. A method as in Claim 8 wherein the step of modifying the digital picture comprises morphing the digital picture according to a computed value.
12. A method as in Claim 1 wherein the attachment is a digitized audio passage.
13. A method as in Claim 12 further comprising the step of modifying the audio passage in accordance with a computed value, before the step of embedding the digital signature.
14. A method as in Claim 12 wherein the audio passage is a voice recording of an entity whose identity is being embedded in the audio passage.
15. A method as in Claim 1 wherein the digital signature is generated from a private encryption key.
16. A method as in Claim 1 wherein the digital signature is a digitized biometric.
17. A method as in Claim 16 wherein the digitized biometric is a digital fingerprint.
18. A method as in Claim 16 wherein the digitized biometric is a digital voiceprint
19. A method as in Claim 16 wherein the digitized biometric is a digital retina scan.
20. A method as in Claim 1 further comprising: including the attachment with the embedded digital signature in a digital communication,- transmitting the digital communication to a recipient ; receiving the digital communication at the recipient; extracting the digital signature from the attachment within the received digital communication; and processing the extracted digital signature.
21. A method as in Claim 20 wherein the step of processing the extracted digital signature comprises-. verifying validity of the digital signature,- and notifying the recipient as to whether the digital signature is valid or not .
22. A method as in Claim 21 further comprising before the step of verifying validity: providing a means wherein the recipient is made aware of the existence of the digital signature,- and providing a means wherein the recipient can indicate that the digital signature should be validated, at which time the verifying and notifying steps take place .
23. A method as in Claim 21 wherein the step of processing the extracted digital signature comprises: displaying the digital signature to the recipient.
24. A computer system for sending a digital communication comprising : means for providing a digital message; means for generating a digital signature related to the message; means for embedding the digital signature in a user-perceptible attachment; means for attaching the attachment to the message to form the digital communication,- and means for sending the communication to a recipient .
25. A computer system for verifying authenticity of a received digital communication comprising: means for receiving the digital communication comprising a digital message and a user-perceptible attachment ; means for extracting the digital signature from the attachment ,- and means for processing the digital signature.
26. A computer system as in Claim 25 wherein the means for processing the digital signature further comprises: means for verifying validity of the digital signature; and means for notifying a recipient as to whether the digital signature is valid or not.
27. A computer system as in Claim 25 wherein the means for processing the digital signature further comprises : means for displaying the digital signature to the recipient.
PCT/US1998/017605 1998-08-25 1998-08-25 Graphic digital signatures WO2000011834A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU92943/98A AU9294398A (en) 1998-08-25 1998-08-25 Graphic digital signatures
PCT/US1998/017605 WO2000011834A1 (en) 1998-08-25 1998-08-25 Graphic digital signatures

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US1998/017605 WO2000011834A1 (en) 1998-08-25 1998-08-25 Graphic digital signatures

Publications (1)

Publication Number Publication Date
WO2000011834A1 true WO2000011834A1 (en) 2000-03-02

Family

ID=22267743

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/017605 WO2000011834A1 (en) 1998-08-25 1998-08-25 Graphic digital signatures

Country Status (2)

Country Link
AU (1) AU9294398A (en)
WO (1) WO2000011834A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1168197A2 (en) * 2000-06-27 2002-01-02 Hitachi, Ltd. Method of information display and communication system using the method
FR2854998A1 (en) * 2003-05-12 2004-11-19 Picture Certification Com E Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification
FR2861519A1 (en) * 2003-10-24 2005-04-29 Thery Jean Philippe Electronically signed document e.g. mail, securing and verifying process, involves securing document by creating electronic signature from content of document, and verifying secured document
WO2005060152A1 (en) 2003-12-16 2005-06-30 Sap Aktiengesellschaft Electronic signing apparatus and methods
US7241617B2 (en) 1998-07-03 2007-07-10 Dnavec Research, Inc. Sendai viral vectors comprising foreign genes inserted between the R1 and R2 Loci
US7457955B2 (en) 2004-01-14 2008-11-25 Brandmail Solutions, Inc. Method and apparatus for trusted branded email
US7502934B2 (en) 2003-12-16 2009-03-10 Sap Aktiengesellschaft Electronic signatures
US7581105B2 (en) 2003-12-16 2009-08-25 Sap Aktiengesellschaft Electronic signing apparatus and methods
US7917761B2 (en) * 2005-03-21 2011-03-29 Microsoft Corporation Digitally signing an electronic document with a user-entered signature image
US7991157B2 (en) 2006-11-16 2011-08-02 Digimarc Corporation Methods and systems responsive to features sensed from imagery or other data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0246823A2 (en) * 1986-05-22 1987-11-25 Racal-Guardata Financial Systems Limited Data communication systems and methods
DE4243908A1 (en) * 1992-12-23 1994-06-30 Gao Ges Automation Org Digital signature signal generation
WO1996042151A2 (en) * 1995-06-07 1996-12-27 The Dice Company Steganographic method and device
US5765176A (en) * 1996-09-06 1998-06-09 Xerox Corporation Performing document image management tasks using an iconic image having embedded encoded information
US5781635A (en) * 1995-12-29 1998-07-14 Intel Corporation Method and apparatus for improved digital message transaction model

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0246823A2 (en) * 1986-05-22 1987-11-25 Racal-Guardata Financial Systems Limited Data communication systems and methods
DE4243908A1 (en) * 1992-12-23 1994-06-30 Gao Ges Automation Org Digital signature signal generation
WO1996042151A2 (en) * 1995-06-07 1996-12-27 The Dice Company Steganographic method and device
US5781635A (en) * 1995-12-29 1998-07-14 Intel Corporation Method and apparatus for improved digital message transaction model
US5765176A (en) * 1996-09-06 1998-06-09 Xerox Corporation Performing document image management tasks using an iconic image having embedded encoded information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"AUTHENTICATION AND DISPLAY OF SIGNATURES ON ELECTRONIC DOCUMENTS", RESEARCH DISCLOSURE, no. 358, 1 February 1994 (1994-02-01), pages 75, XP000439803 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7241617B2 (en) 1998-07-03 2007-07-10 Dnavec Research, Inc. Sendai viral vectors comprising foreign genes inserted between the R1 and R2 Loci
EP1168197A3 (en) * 2000-06-27 2004-08-18 Hitachi, Ltd. Method of information display and communication system using the method
EP1168197A2 (en) * 2000-06-27 2002-01-02 Hitachi, Ltd. Method of information display and communication system using the method
US7010569B2 (en) 2000-06-27 2006-03-07 Hitachi, Ltd. Method of information display and communication system using the method
FR2854998A1 (en) * 2003-05-12 2004-11-19 Picture Certification Com E Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification
FR2861519A1 (en) * 2003-10-24 2005-04-29 Thery Jean Philippe Electronically signed document e.g. mail, securing and verifying process, involves securing document by creating electronic signature from content of document, and verifying secured document
US7502934B2 (en) 2003-12-16 2009-03-10 Sap Aktiengesellschaft Electronic signatures
WO2005060152A1 (en) 2003-12-16 2005-06-30 Sap Aktiengesellschaft Electronic signing apparatus and methods
US7581105B2 (en) 2003-12-16 2009-08-25 Sap Aktiengesellschaft Electronic signing apparatus and methods
US8078878B2 (en) 2003-12-16 2011-12-13 Sap Aktiengesellschaft Securing documents with electronic signatures
US8583931B2 (en) 2003-12-16 2013-11-12 Sap Aktiengesellschaft Electronic signing apparatus and methods
US7457955B2 (en) 2004-01-14 2008-11-25 Brandmail Solutions, Inc. Method and apparatus for trusted branded email
US8621217B2 (en) 2004-01-14 2013-12-31 Jose J. Picazo Separate Property Trust Method and apparatus for trusted branded email
US10298596B2 (en) 2004-01-14 2019-05-21 Jose J. Picazo, Jr. Separate Property Trust Method and apparatus for trusted branded email
US10951629B2 (en) 2004-01-14 2021-03-16 Jose J. Picazo, Jr. Separate Property Trust Method and apparatus for trusted branded email
US11711377B2 (en) 2004-01-14 2023-07-25 Jose J. Picazo, Jr. Separate Property Trust Method and apparatus for trusted branded email
US7917761B2 (en) * 2005-03-21 2011-03-29 Microsoft Corporation Digitally signing an electronic document with a user-entered signature image
US7991157B2 (en) 2006-11-16 2011-08-02 Digimarc Corporation Methods and systems responsive to features sensed from imagery or other data

Also Published As

Publication number Publication date
AU9294398A (en) 2000-03-14

Similar Documents

Publication Publication Date Title
US9516037B2 (en) Decoding of encrypted file
US6769061B1 (en) Invisible encoding of meta-information
EP1396142B8 (en) Method of authenticating a plurality of files linked to a text document
US7165268B1 (en) Digital signatures for tangible medium delivery
US5781635A (en) Method and apparatus for improved digital message transaction model
CN1151630C (en) Digital sign or electron seal identification system and identification mark management sequence
US20100161993A1 (en) Notary document processing and storage system and methods
JP2001273286A (en) Method and system for marking text document in pattern of extra blank for authentication
CN103678960B (en) Method and device for adding digital copyright information to data file
JPH1091065A (en) Method of protecting electronic signature to be attached to electronic document
JPH103257A (en) Method and device for adding electronic signature, and method for verifying electronic signature
US20030110384A1 (en) System and method for securely hyperlinking graphic objects
CN101465734A (en) Online artificial signing system and method
WO2000011834A1 (en) Graphic digital signatures
US8316454B2 (en) Method and system for protection of user information registrations applicable in electoral processes
JPH11196392A (en) Method for detecting falsification of electronic image and falsification detection system
EP1704667B1 (en) Electronic signing apparatus and methods
JP3770732B2 (en) Method for attaching information to image and method for extracting information from image
JP2001309158A (en) Electronic mail system
US20030005298A1 (en) Method and apparatus for authenticating people using business cards
JP2009009416A (en) Document management system and document management method
JPH11194709A (en) Method of electronic authentication and system thereof
Superyir FACULTY OF GRADUATE STUDIES
Kaur et al. REVIEW ON VARIOUS VIDEO STEGNOGRAPHY AND COMPRESSION TECHNIQUES
KR20160124053A (en) Smart phone having certificationdd funstion of smart phone screen capture image and method thereof

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: CA

122 Ep: pct application non-entry in european phase