Abstract
Why did we want to look at digital cameras, what was the thing that made this interesting? The first thing was the link to our previous work: what we’ve done is an application of what Bruce talked about two years ago, linking bit patterns to real world entities. In this case the bit pattern is the image which has been produced by the digital camera, and the camera itself is the real world entity. Not so much audit trails, but certainly auditing the fact that this image came from this camera, that’s the key thing that we want to establish.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Malcolm, J.A. (2000). Pictures Can’t Lie under Oath. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 1999. Lecture Notes in Computer Science, vol 1796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10720107_29
Download citation
DOI: https://doi.org/10.1007/10720107_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67381-1
Online ISBN: 978-3-540-45570-7
eBook Packages: Springer Book Archive