G APHIC DIGITAL SIGNATURES
BACKGROUND OF THE INVENTION
With the increased usage of the Internet and other computer networks, it is becoming increasingly important to be able to ensure that an electronic message received over a network is both authentic, i.e., that the sender is who he claims to be, and that the message has not been altered by some third party en route .
Digital signatures have been developed to fill this need. A digital signature is a digital representation of information identifying the author or source of a document which includes but is not limited to a demonstration of knowledge of secret or little-known information
Generally, a sender, using a computer or similar digital means, composes a message he intends to send to one or more recipients. At the sender's request, or automatically, a digital signature is derived based on some aspect of the message. How the digital signatures are actually coded and decoded are beyond the scope of this patent, but see Mitchell, Piper and Wild, "Digital Signatures", Contemporary Cryptology, pp. 325-378, which is incorporated herein by reference .
Digital signatures are typically attached to digital messages which are passed from one computer to another via a network - from small, in-house intranets to the large networks such as the Internet. Current methods represent digital signatures as large blocks of alphanumeric,
hexadecimal or binary characters. For example, a digital signature might be represented in an electronic mail (e- mail) as follows:
iQBFAgUBM0jm3ygmpqV0uJ6VAQFOqwF/emw7/FlwFFe3q00HlQZbtzJI5Y2 RKMgYovXpsOsUgNVAbqHMiyHD2uTDLVxdID76=THEF
Representations such as this are not only aesthetically unpleasing to a human recipient but due to their highly technical appearance may serve to discourage non-technical users from using digital signature technology altogether.
SUMMARY OF THE INVENTION
Representing digital signatures in meaningful and intuitive graphical and audio forms allows non- echnical users to easily understand their purpose. Such users are therefore more likely to use digital signatures. By providing a method for personalizing the display of a digital signature, all users are encouraged to use digital signatures in their own messages .
The present invention provides means for steganographically embedding a digital signature into a more intuitive signature graphic such as is shown at 50 in Fig. 1 or into an audio recording of the sender saying something such as "This document about widget pricing dated May 23, 1997, has been written by me."
In accordance with the present invention, a method of digital communication comprises the steps of providing a digital message that the sender desires to send to one or more recipients; providing a digital signature such as a
private key encrypted hash of the message or a biometric such as a private encryption key or unique biometric information such as a facial picture, a fingerprint, an iris or retinal scan, typing and handwriting patterns, hand or finger geometry or a voice print; providing a user- perceptible attachment such as a picture or audio,- embedding the digital signature into the attachment; attaching the attachment to the message to form a digital communication; and sending the communication.
In a preferred embodiment, the digital signature is embedded into the attachment by substituting bits of the digital signature into selected least significant bits of the attachment. In this manner, the changes to the attachment are virtually undetectable by the recipient . The existence or the state of the attachment itself may alert the recipient to the fact that a digital signature is present. Furthermore, a header may be embedded into the attachment at predetermined locations . This header may serve to identify the existence of the digital signature, or .the header may contain parameters which provide further information about the digital signature, e.g., coding technique, location within the attachment, etc.
The attachment may be modified before embedding the digital signature by any number and manner of transformations. Such modification may be used to alert the recipient that a digital signature is present. Examples of such modification transformations are warping and morphing .
Either the recipient can initiate verification of the digital signature, or such verification can come about
automatically. Generally, when a communication is received, both the message and the attachment are available to the recipient. The recipient may begin the verification process, for example, by selecting the attachment using a computer mouse. Verification comprises extracting the digital signature from the attachment and verifying the validity of the digital signature according to standard digital signature techniques. Finally, the recipient may be notified as to whether the digital signature is valid or not, or the digital signature may be displayed to the recipient. The software that forms those functions may, for example, be incorporated in otherwise conventional e- mail software.
The above and other features of the invention including various novel details of construction and combinations of parts, and other advantages, will now be more particularly described with reference to the accompanying drawings and pointed out in the claims . It will be understood that the particular method and device embodying the invention are shown by way of illustration and not as a limitation of the invention. The principles and features of this invention may be employed in various and numerous embodiments without departing from the scope of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular description of preferred embodiments and the drawings in which like reference characters refer to the same parts throughout the different
views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principals of the invention.
Fig. 1 illustrates a graphic signature as it might appear in an e-mail.
Fig. 2A illustrates a prior art electronic e-mail communication with an alphanumeric representation of a digital signature.
Fig. 2B illustrates an electronic e-mail communication with a graphic in which a digital signature is steganographically embedded.
Fig. 3 is a flowchart showing generally the process of embedding a digital signature.
Fig. 4 is a flowchart showing generally the process of extracting a digital signature and further processing it.
Fig. 5 illustrates a graphic which could be used to notify a recipient of a valid digital signature.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Fig. 2A illustrates an electronic mail (e-mail) communication 100 as it might appear in prior art. The sender has composed a message 102, in this example, consisting of the sentence "Please give Alice Gilbert a master key," followed by a salutation. A digital signature 104 is generated. The digital signature may be based on the message 102 and a key known or provided to the sender' s computer, or it may be independent of the message 102 itself, as in the case where the signature is a fingerprint. The digital signature 104 is appended to the message 102, along with some additional information 106, to form the digital communication, which is transmitted or sent to one or more intended recipients. A non-technical
person receiving this message may not immediately know the purpose of the digital signature 104 and/or how to use it.
Fig. 2B illustrates the equivalent email communication 110 as produced by the present invention. A message 112 consists of some text the sender wishes to convey to the recipient, again, in this example, the sentence "Please give Alice Gilbert a master key," followed by a salutation. In this example, however, a graphic, digitized (not digital) signature 114 of the sender (Sally) is attached to the communication. This graphic 114 has been slightly altered such that it contains the same digital signature as shown in 104 of Fig. 2A.
When the signed email 110 of Fig. 2B arrives at its destination and is selected for reading by the recipient, the recipient is offered the opportunity to verify the signature. If the user decides to verify the signature, for example by selecting a "Verify" button, then the e-mail software extracts the digital signature 104 from the graphic 114 and performs the usual digital signature verification. If the digital signature 114 is verified, i.e., the digital signature supports the claim that the email comes from Sally Green, the software might display an acknowledgment such as "Signature verified as the signature of Sally Green," or a graphic 60 such as that shown in Fig. 5.
Of course it would be understood in the art that the message may be text, audio, graphic, or some other mode of conveying information digitally. Furthermore, it would be understood that the communication is not limited to email. For example, the communication could be a transmittal of a
World Wide Web page or some other means of digitally transmitting a message. Finally the attachment into which the digital signature is embedded may itself be text, audio, graphic, video, etc.
The attachment may be modified before embedding the digital signature. For example, warping and morphing, as well as other transformations, may be applied to a graphic or picture. Similarly, other types of transformations may be applied to audio signals. Such modifications may be used to alert the recipient that a digital signature is present .
Fig. 3 is a flowchart showing generally the process of embedding a digital signature. First, at 200, the sender composes or otherwise provides a message comprising the information he wishes to communicate to the recipients . At 202 an image or audio attachment is provided, and at 204 a digital signature is calculated or otherwise provided. Examples of suitable digital signature algorithms can be found in "Digital Signature Schemes" by Birgit Pfitzmann and published by Springer-Verlag in 1996 (ISBN 3-540-61517- 2) which is herein incorporated by reference.
The attachment can be modified using image processing or audio processing algorithms . The purpose of this transformation is to provide to the recipient an indicator that a digital signature has been included and can be validated. For example, an image may undergo warping 206, morphing 208, and/or other transformations 210. Audio be may subjected to audio-type transforms, for example, filtering .
Warping 206 is typically applied to line-drawing images and comprises bending or moving some of the lines in the image. For example, if the original attachment is an image of a dragonfly and the body of the dragonfly is a long, curved cigar shape, this image can be warped by increasing or decreasing the bending of the body of the dragonfly. In one embodiment of the present invention, the amount of warping is determined based on parameters computed from the document such as a word count .
Morphing algorithms 208 transform one image to another by computing a series of images visually between a beginning image and an ending image. In one embodiment of the present invention, a user chooses an ending image to morph an original "signing" image toward. If some computed value for the message, such as a word count or a digital signature, is n on a scale from 0 to N, then the image that is n/N of the way from the original signing image to the ending image is selected as the attachment in which the digital signature will be embedded. Examples of suitable warping and morphing algorithms can be found in "Digital Image Warping" by George Wolberg and published by the IEEE Computer Society Press in 1990 (ISBN 0-81868944-7) which is herein incorporated by reference.
Referring again to Fig. 3 after the transformations 206, 208, 210 have been applied to the attachment, the digital signature is embedded into the attachment using steganographic techniques 212, described below. The attachment is attached 214 to the message to form a communication, and finally, the communication is transmitted 216 to the intended recipients.
Steganographic algorithms are typically used to hide information in images, although the technique is easily applied to digital audio signals as well. What appears to be an innocent picture actually contains a secret message. The embedding of the text into the picture is deliberately constructed so as to not disturb the image such that a viewer cannot tell that the picture contains a message simply by looking at it. In other words, the embedding does not alter - at least to the human eye or ear - the appearance of the picture or the sound of an audio.
Suppose for example that a black and white photograph exists such that each point (pixel) in the photograph is represented as a 16 -bit number where 0 represents all white, 32,768 represents all black and numbers in between represent shades of gray between white and black. Taking a digital signature as a string of bits, the digital signature can be embedded into the photograph by setting the low-order bit of a pixel (a point in the photograph) of the photograph to 0 when the corresponding bit in the digital signature is 0, and to 1 when the corresponding bit in the digital signature is 1. If the low-order bit in the pixel were originally 0 and it is now set to 1, then the pixel becomes just a little darker, but not enough to be noticeable. Similarly, if the low-order bit in the pixel were originally 1 and it is now set to 0, then the pixel becomes just a little brighter, but again not enough to be noticed. Continuing in this fashion, all of the bits of the digital signature can be embedded into the photograph without visually changing it. Examples of suitable steganographic algorithms can be found in "Information
Hiding: Proceedings of the First International Workshop, U.K. May 30 - June 1, 1996" edited by Ross Andersion and
published by Springer-Verlag in 1996 (ISBN 3-540-61996-8) which is herein incorporated by reference.
In the present invention, it is not the intention to actually hide the digital signature from a recipient, that is prevent a recipient from accessing the embedded digital signature, but rather to use the attachment to "carry" the digital signature in such manner that the attachment is not noticeably altered by the digital signature.
Fig. 4 is a flowchart showing generally the process of extracting and processing the digital signature from the received communication. First, the communication must be received by the recipient or his computer 302. The recipient must be made aware that the communication contains an embedded digital signature. This is done by displaying 304 the graphic attachment so that the recipient can see it, or, in the case of an audio attachment, playing the attachment so that the recipient hears it . Any transformations which have been applied may themselves be the clue to the recipient that a digital signature has been embedded.
The recipient can then ask for validation of the digital signature 306 and the digital signature is extracted from the attachment 308 by reading the bits known to contain the digital signature. In a preferred embodiment, the digital signature is verified 310 and the recipient is notified 312 as to whether the signature is valid or not. Alternatively, the extracted digital signature can be displayed 314 for the recipient's viewing.
While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims .