Search

KR-20260066752-A - Source data integrity protection

KR20260066752AKR 20260066752 AKR20260066752 AKR 20260066752AKR-20260066752-A

Abstract

The original metadata of a digital media file is stored in source storage, such as JPEG application markers, and as a result, more or appropriate number of metadata edits may be performed while tracking the original metadata or the scope of metadata changes. When a user, program, process, etc., is ready to confirm a revised version of the original digital media file, the record of editable metadata changes made can be derived by comparing the current editable metadata with the original editable metadata stored in source storage. Accordingly, editable metadata changes can be combined and/or signed as a source record of metadata changes, or recorded and signed within a new digital media file, thereby allowing the source of the digital media file to be traced back to the original digital media file.

Inventors

  • 워커 데니스 제임스

Assignees

  • 카메라 비츠, 인코포레이티드

Dates

Publication Date
20260512
Application Date
20240906
Priority Date
20240905

Claims (20)

  1. As a method for managing metadata in signed or unsigned digital media, A step of receiving a digital media file containing one or more metadata elements; A step of determining whether a digital signature associated with the digital media file exists, and if it exists, verifying the digital signature; A step of storing one or more metadata elements in a source storage containing a portion of the received digital media file; A step of receiving at least one new or changed metadata element and storing the at least one new or changed metadata element in the digital media file; and A method for managing metadata in signed or unsigned digital media, comprising the step of creating a newly signed digital media file comprising at least one new or changed metadata element and at least one digitally signed source record regarding one or more differences between the at least one new or changed metadata element and the one or more metadata elements received together with the digital media file.
  2. In paragraph 1, A method for managing metadata in signed or unsigned digital media, wherein at least one digitally signed source record is derived from the difference between a metadata record in the source storage and the stored metadata of the current digital media file.
  3. In paragraph 1, A method for managing metadata in signed or unsigned digital media, wherein one or more of the above metadata elements include at least one of author, copyright, description, keyword, time, date, location, title, subject, rating, one or more other metadata fields such as, or any combination thereof.
  4. In paragraph 1, A method for managing metadata in signed or unsigned digital media, further comprising the step of signing the newly signed digital media file by a public key cryptographic signature.
  5. In paragraph 1, A method for managing metadata in signed or unsigned digital media, wherein at least one digitally signed source record is signed using a public key cryptographic signature.
  6. In paragraph 1, A method for managing metadata in signed or unsigned digital media, wherein the signed or unsigned digital media includes a JPEG image file.
  7. In paragraph 1, The above source storage is a method for managing metadata in signed or unsigned digital media that includes metadata records.
  8. In Paragraph 7, A method for managing metadata in signed or unsigned digital media, wherein the above metadata records include editable metadata within Exif (EXchangeable Image File format) and/or XMP (eXtensible Metadata Platform) records.
  9. In paragraph 6, A method for managing metadata in signed or unsigned digital media in which an image encoded within the above JPEG image file remains unchanged between a received digital media file and a newly signed digital media file.
  10. In paragraph 1, A method for managing metadata in signed or unsigned digital media, wherein the step of creating a newly signed digital media file includes the step of determining at least one modified metadata element stored in said digital media file.
  11. In paragraph 1, A method for managing metadata in signed or unsigned digital media, wherein the step of creating a newly signed digital media file includes the step of saving the newly signed digital media file using a "Save As" action.
  12. In Paragraph 11, A method for managing metadata in signed or unsigned digital media, wherein the signed digital media includes a digital image which is a resized, compressed, and/or cropped version of the received digital media file.
  13. As a device including a computing device, Memory comprising one or more storage devices; and It includes one or more processors connected to the memory, and The above one or more processors execute instructions stored in memory for at least one signed or unsigned digital media file: Receive a digital media file containing one or more metadata elements, and optionally verify a digital signature associated with a digitally signed media file; Storing the one or more metadata elements in a source storage containing a portion of the received digital media file; Receive at least one modified metadata element, and store the at least one modified metadata element in the digital media file; A device comprising a computing device capable of generating a newly signed digital media file, the device comprising at least one modified metadata element and at least one digitally signed source record regarding one or more differences between the at least one modified metadata element and the one or more metadata elements received together with the digital media file.
  14. In Paragraph 13, A device including a computing device, wherein at least one digitally signed source record is derived from the difference between a metadata record within the source storage and the stored metadata of a current digital media file.
  15. In Paragraph 13, The above source storage is a device including a computing device that includes metadata records.
  16. In Paragraph 13, A device comprising a computing device capable of generating a newly signed digital media file, and capable of determining at least one modified metadata element stored in the digital media file.
  17. As a method for restoring original signed or unsigned digital media files, A step of receiving an inoculated digital media file comprising a source storage containing one or more writable metadata elements of the original signed or unsigned digital media file; A step of generating a signed or unsigned digital media file of the original by writing one or more writable metadata elements of the original signed or unsigned digital media file to the inoculated digital media file; and A method for restoring an original signed or unsigned digital media file, comprising the step of saving the original signed or unsigned digital media file generated above.
  18. In Paragraph 17, A method for restoring an original signed or unsigned digital media file, further comprising the step of verifying the digital signature of the original signed or unsigned digital media file.
  19. In Paragraph 17, A method for restoring an original signed or unsigned digital media file, further comprising the step of removing the source storage from the inoculated digital media file to create the original signed or unsigned digital media file.
  20. In Paragraph 17, A method for restoring an original signed or unsigned digital media file, wherein the source storage described above includes one or more metadata records of the inoculated digital media file.

Description

Source data integrity protection Cross-reference regarding related applications The present application claims priority and interest to U.S. Patent Application No. 18/825,951, titled “PROVENANCE DATA INTEGRITY PROTECTION,” filed September 5, 2024, and U.S. Provisional Application No. 63/581,498, titled “DIGITAL MEDIA ASSET AUTHENTICATION,” filed September 8, 2023, the entire contents of which are incorporated herein by reference. The technical field generally relates to the protection of electronic content or data that may include digital media or similar assets, and more specifically, to provenance data integrity protection that may include authentication of digital media or similar assets such as metadata, for example. Digital media or similar assets, such as photos, voice recordings, and videos, continue to evolve and have the potential to surpass or replace their historical analog counterparts. The volume of digital media or similar assets being generated is increasing exponentially due to the rapid proliferation of cameras on smartphones and other technological advancements. For example, media sharing sites like TikTok, YouTube, and Instagram allow anyone to create an account and become a media creator, producing content of a technical quality that was only possible for professionals just 10 or 20 years ago. From news agencies and professional broadcasting teams to bloggers, Instagram models, video channel creators, and influencers, everyone can experience a surge in popularity if their digital media content is sufficiently engaging, which encourages millions of people to create such content every year. The ability to create, modify, or forge such or similar electronic content using commonly available tools is also increasing exponentially at the same time. These tools include ChatGPT for generating generative text, Adobe Photoshop’s Generative Fill which uses Adobe’s Firefly AI engine to create or modify photo content, and DALL-E for generating photorealistic images from simple text prompts. As the performance of these tools continues to advance rapidly, it is becoming increasingly difficult to determine whether an image that appears to be a digital photograph is a real photograph or has been significantly modified to alter its appearance or content. Some tools use digital signatures to allow content creators (e.g., digital cameras) to sign photos, enabling subsequent users to verify their authenticity. Tracking changes to signed or authenticated photos can be a more complex task, often involving storing multiple versions of the same image or creating "sidecar" files—such as Adobe Photoshop XMP files—that save details of image edits and metadata changes made to the original authenticated photo. However, these sidecar files can become very large, and changes may be lost if the sidecar file is separated from the original image file. Furthermore, the process of cryptographically signing image files after editing and metadata changes is a computationally expensive operation and increases the size of the asset. Therefore, there is a need to manage changes to digitally signed or authenticated media assets more efficiently and/or effectively. FIGS. 1a and 1b are flowcharts of a process for iteratively editing metadata within a digital media file before committing or saving a file that has been changed to a new digital signature, according to one embodiment. FIGS. 2a and 2b are block diagrams of a process for managing metadata sources in a signed JPEG file according to one embodiment. FIG. 3 is a block diagram of a process for managing metadata information in an inoculated JPEG file according to one embodiment. FIG. 4 is a block diagram of a process for managing metadata information when restoring an original JPEG from an inoculated JPEG file according to one embodiment. FIG. 5 is a flowchart of a process for storing metadata for a digitally signed digital media file in provenance storage according to one embodiment. FIG. 6 is a flowchart of a process for extracting an original digitally signed digital media file from an inoculated digital media file according to one embodiment. FIG. 7 is an exemplary implementation of an operating or computing environment. The drawings are provided to aid in understanding the various examples provided in the specification and do not limit the scope of the claims or the scope of equivalents. Not all drawings are drawn to scale, and some parts or features may be omitted or enlarged to more clearly illustrate specific features of the illustrated examples. In the following detailed description of the embodiments, specific embodiments are referenced through the drawings and examples. These examples are described in sufficient detail to enable those skilled in the art to carry out what has been described and serve to illustrate how the elements of these examples may be applied to various purposes or embodiments. Other embodiments exist, and logical, mechanical, electrical, and oth