This disclosure describes techniques to verify the authenticity of digital images using digital signatures. A secure element on a client device generates a public-private key pair and the public key is uploaded to a server. When a new image is captured by the client device, the device hashes the image and signs the hashed result using the private key to form a digital signature. Both the original image and digital signature are uploaded to the server. The server hashes the original image and compares it to the digital signature that has been decrypted using the appropriate stored public key. A match indicates a verified image and the server provides an indication of the verified status of the image to a requesting device along with the image. The described techniques thus enable images to be authenticated as to source and content.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.