Authentication in Gemini Digital Surveillance Camera System

Year
1996
Author(s)
Steven P. Kadner - Aquila Technologies Group Inc.
W. Resnik, - Aquila Technologies Group, Inc
R. Sheridan - Aquila Technologies Group, Inc.
G. Ismael - Dycam, inc.
Abstract
Aquila Technologies Group, Inc. has implemented the RSA authentication method on its Gemini Surveillance System. This implementation provides protection of digital image data as it travels between the tamperindicating enclosure components of the Gemini system. Efforts to exchange cameras, inject false dat% or otherwise tamper with surveillance pictures can be catastrophic. Clearly, it is critically important that the photographic surveillance data is accurate and authentic. Public-key signature algorithms developed by RSA are applied to provide authentication for the Gemini Photographic data. Digital signatures utilizing public key encryption methods are impossible to forge and cannot be repudiated. This paper deals with data authentication methods that are incorporated into the Gemini Surveillance System to ensure that the event data log is authentic and secure from unauthorized access.