Security applications of additive analogue memory

dc.contributor.authorAgnew, B.
dc.contributor.authorSorell, M.
dc.contributor.conference3rd Interdisciplinary Cyber Research Workshop 2017 (ICR2017) (8 Jul 2017 - 8 Jul 2017 : Tallinn, Estonia)
dc.contributor.editorOsula, A.
dc.contributor.editorMaennel, O.
dc.date.issued2017
dc.description.abstractProving the authenticity and source of an image has traditionally been done with a lm negative. However with the shift to digital cameras this proof has been lost. Image manipulation has also become a lot easier to do. This project aims to create a digital negative that is, a digital equivalent of lm nega- tives for proof of authenticity and source. We are aiming to prove that a set of images is a complete set of unaltered images as taken by a digital camera on the day of photography. modern cryptographic techniques such as public key cryptography, cryptographic hashes and blockchains are widely used to prove authenticity however these usually rely on an internet connection to be tamperproof. digital cam- eras o en don’t have an internet connection and when they do there’s no guarantee it will be operating due to network coverage issues.
dc.description.statementofresponsibilityBen Agnew, Dr Matthew Sorell
dc.identifier.citationProceedings of the 3rd Interdisciplinary Cyber Research Workshop, 2017 / Osula, A., Maennel, O. (ed./s), pp.19-20
dc.identifier.isbn978-9949-584-12-3
dc.identifier.orcidSorell, M. [0000-0003-3288-1175]
dc.identifier.urihttp://hdl.handle.net/2440/114563
dc.language.isoen
dc.publisherTallinn University of Technology
dc.publisher.placeTallinn
dc.rightsCopyright status unknown
dc.source.urihttp://cybercentre.cs.ttu.ee/en/icr2017/
dc.subjectMemristor; offline hashchain; proof of authenticity; digital forensics
dc.titleSecurity applications of additive analogue memory
dc.typeConference paper
pubs.publication-statusPublished

Files