EP-4738153-A1 - SYSTEM FOR VERIFYING ORIGINAL AND SOURCE OF SECURITY IMAGE
Abstract
The proposed invention relates to a technology for a system including a camera device that reliably manages an original of image data at an initial generation time point at which the image data is generated by the camera device, wherein the camera device includes a first authentication block information generation commands set, and the first authentication block information generation commands set generates first authentication block information including first authentication information, which is obtained by encrypting a first hashing code generated by hashing at least a portion of security image data requested from a client terminal connected through a network with a private key of the camera device, and unique identification information of the camera device.
Inventors
- LEE, SANG HOON
- LIM, IN TAEK
- PARK, JIN HUI
Assignees
- Idis Co., Ltd.
Dates
- Publication Date
- 20260506
- Application Date
- 20250717
Claims (15)
- A camera system for verifying an original and source of a security image, comprising one or more camera devices, wherein the camera device includes an image capturing element, a first communication element connected to a client terminal through a network, a first memory element that stores an executable first program and security image data, and a first computing element that executes the first program, and the first program includes a first authentication block information generation commands set that generates first authentication block information including first authentication information, which is obtained by hashing at least a portion of the security image data requested from the client terminal connected through the network and encrypting a first hashing code recorded in frames of the security image data with a private key of the camera device, and unique identification information of the camera device.
- The camera system of claim 1, wherein the first program further includes a first image clip service commands set that extracts the security image data requested from the client terminal from the first memory element, adds first image clip authentication information to the security image data including the first authentication block information generated by the first authentication block information generation commands set to generate an image clip, and transmits the image clip including the first image clip authentication information to the client terminal, and the first image clip authentication information is information obtained by encrypting a hashing code that is obtained by hashing the first hashing code with the private key of the camera device.
- The camera system of claim 1, further comprising one or more image recording devices, wherein the image recording device further includes a second communication element connected to the client terminal and the camera device through the network, a second memory element that stores an executable second program and the security image data, and a second computing element that executes the second program, and the second program includes a second authentication block information generation commands set that generates second authentication block information including second authentication information, which is obtained by hashing at least a portion of the security image data requested from the client terminal and encrypting a second hashing code recorded in the frames of the security image data with a private key of the image recording device, and unique identification information of the image recording device.
- The camera system of claim 3, wherein the second program further includes a second image clip service commands set that extracts the security image data requested from the client terminal from the second memory element, adds second image clip authentication information to the security image data including the second authentication block information generated by the second authentication block information generation commands set to generate an image clip, and transmits the image clip including the second image clip authentication information to the client terminal, and the second image clip authentication information is information obtained by encrypting a hashing code that is obtained by hashing the first hashing code or the second hashing code with the private key of the image recording device.
- The camera system of claim 3, further comprising a key management server configured to register, integrate, and manage the unique identification information and public keys of the camera devices or the unique identification information and public keys of the image recording devices.
- The camera system of claim 5, further comprising an original and source verification service server including a third communication element connected to the client terminal, the key management server, and the camera devices through the network, a third memory element that stores an executable third program, and a third computing element that executes the third program, wherein the third program receives the public key corresponding to the unique identification information of the camera device included in the image clip from the key management server in response to a request for security image verification of the client terminal, decrypts the first authentication information with the public key of the camera device, and compares the decrypted first authentication information with the first hashing code to verify the original and source of the image clip or provides the public key of the camera device to the client terminal to enable a client to verify the original and source of the image clip.
- The camera system of claim 5, further comprising an original and source verification service server including a third communication element connected to the client terminal, the key management server, and the image recording device through the network, a third memory element that stores an executable third program, and a third computing element that executes the third program, wherein the third program receives the public key corresponding to the unique identification information of the image recording device included in the image clip from the key management server in response to the request for security image verification of the client terminal, decrypts the second authentication information with the public key of the image recording device, and compares the decrypted second authentication information with the second hashing code to verify the original and source of the image clip or provides the public keys of the camera device and the image recording device to the client terminal to enable the client to verify the original and source of the image clip.
- The camera system of claim 1, wherein the image clip includes a plurality of frames including a frame header and a frame body, and the first authentication information and the unique identification information of the camera device are included in the frame header.
- The camera system of claim 8, wherein image clip authentication block information is stored in the header of the image clip, and the image clip authentication block information further includes image clip source unique identification information.
- A method (S100) of verifying an original and source of a security image, comprising: an image clip transmission request receiving operation (S10) of receiving a request for transmission of an image clip including security image data from a client terminal through a network; a camera device information generation and management operation (S20) of generating, integrating, and managing private keys, unique identification information, and public keys of camera devices; and a first authentication block information generation operation (S30) of generating first authentication block information including first authentication information, which is obtained by hashing at least a portion of the security image data requested from the client terminal connected through the network and encrypting a first hashing code recorded in frames of the security image data with the private key of the camera device, and unique identification information of the camera device.
- The method (S1000) of claim 10, further comprising a camera device image clip generation operation (S40) of adding first image clip authentication information to the security image data including the first authentication block information and generating the image clip, wherein the first image clip authentication information is information obtained by encrypting a hashing code that is obtained by hashing the first hashing code with the private key of the camera device.
- The method (S1000) of claim 10, further comprising an image recording device information generation and management operation (S50) of generating, integrating, and managing private keys, unique identification information, and public keys of image recording devices.
- The method (S1000) of claim 10, further comprising a second authentication block information generation operation (S60) of generating second authentication block information including second authentication information, which is obtained by hashing at least a portion of the security image data and encrypting a second hashing code recorded in the frames of the security image data with a private key of the image recording device, and unique identification information of the image recording device.
- The method (S1000) of claim 13, further comprising: an image recording device image clip generation operation (S70) of adding second image clip authentication information to the security image data including the first authentication block information or second authentication block information and generating the image clip; and an image clip transmission operation (S80) of transmitting the image clip to the client terminal, wherein the second image clip authentication information is information obtained by encrypting a hashing code that is obtained by hashing the first hashing code or the second hashing code with the private key of the image recording device.
- The method (S1000) of claim 14, further comprising: an image clip verification request receiving operation (S90) of receiving a request for image clip verification from the client terminal through the network; a public key provision operation (S100) of providing the public key to the client terminal or the original and source verification service server; and an image clip verification operation (S110) of decrypting, by the client terminal or the original and source verification service serve, first image clip authentication information or second image clip authentication information with the public key and comparing the decrypted first image clip authentication information or second image clip authentication information with a first image clip hashing code or a second image clip hashing code to verify the source of the image clip, or decrypting the first authentication information or the second authentication information and comparing the decrypted first authentication information or second authentication information with the first hashing code or the second hashing code to verify the original of the image clip.
Description
CROSS-REFERENCE TO RELATED APPLICATION This application claims priority to and the benefit of Korean Patent Application No. 10-2024-0152080, filed on October 31, 2024, the disclosure of which is incorporated herein by reference in its entirety. BACKGROUND 1. Field of the Invention The proposed invention relates to a security image verification technology having a function of verifying whether an image is forged or tampered and a source thereof. 2. Discussion of Related Art As artificial intelligence and deep learning technologies develop, technologies for generation, edition, or synthesis of images or voices are also developing significantly. For example, activities of generating photographs or images obtained by elaborately manipulating existing photos or images using an artificial intelligence learning technology called a generative adversarial network (GAN) is becoming popular among individuals or companies. Accordingly, efforts are emerging to legally punish harmful deepfake acts to reduce damage to individuals and institutions caused by misinformation or hate speech. Generally, a deepfake is a portmanteau of deep learning and fake and refers to human image synthesis technology based on artificial intelligence. In Korean Patent (Registration No. 10-1628720, "Copied image evidence management system for verifying authenticity and integrity"), a copied image evidence management system that can confirm that a copied image has been altered from an original image even when an image storage device generates the original image and adds a hash value thereof to the generated original image to copy the original image using an image collection device is disclosed. However, in the case of a security image, an original at a time point image or voice data is generated by a camera device is important, and thus it is necessary to manage an original of the image or voice data at an initial generation time point. Meanwhile, in the broadcasting field, there is a technology to encrypt information of an original author or editor into his or her work for copyright management. However, in the field of image security, a location of a camera device that has generated an original image and a time of photographing are more important factors than the copyright management, and thus identification of a device including the camera device and generation of information on a generation time point are required. SUMMARY OF THE INVENTION The proposed invention is directed to providing a system technology with a camera device that reliably manages an original image at an initial generation time point when an image is generated by the camera device. The proposed invention is also directed to providing a system technology for verifying an original and source of a reliable security image. According to an aspect of the proposed invention, there is provided a system including a camera device, wherein the camera device includes a first authentication block information generation commands set, and the first authentication block information generation commands set generates first authentication block information including first authentication information, which is obtained by encrypting a first hashing code generated by hashing at least a portion of security image data requested from a client terminal connected through a network with a private key of the camera device, and unique identification information of the camera device. According to one embodiment, the system may include an original and source verification service server, wherein the original and source verification service server may receive the first authentication information included in the image clip and the unique identification information of the camera device in response to a request for security image verification of the client terminal, and decrypt the first authentication information with a public key to verify an original and source of the image clip. According to another embodiment, the system may provide the public key of the client terminal to a client so that the client may decrypt the first authentication information to verify the original and source of the image clip. BRIEF DESCRIPTION OF THE DRAWINGS The above and other objects, features and advantages of the present invention will become more apparent to those of ordinary skill in the art by describing exemplary embodiments thereof in detail with reference to the accompanying drawings, in which: FIG. 1 illustrates a configuration of a camera system for verifying an original and source of a security image according to one embodiment;FIG. 2 illustrates a configuration of a camera device according to one embodiment;FIG. 3 illustrates a configuration of an image recording device according to one embodiment;FIG. 4 illustrates a configuration of an original and source verification server according to one embodiment;FIG. 5 illustrates a structure of an image clip generated by a camera device according to one embodiment;FIG. 6 il