Abstract: Various systems, methods, and programs embodied in computer-readable mediums are provided for digital authentication using digitally signed images. In one representative embodiment, a method includes extracting a first image portion from an image selected by a first party, where the first image portion including a first encoded part of an second party digital signature, and obtaining a second image portion associated with the first image portion, where the second image portion including a second encoded part of the second party digital signature. The first and second encoded parts of the second party digital signature are decoded and validity of the second party digital signature is confirmed based upon a second party public key.
Abstract: Various systems, methods, and programs embodied in computer-readable mediums are provided for digital authentication using digitally signed images. In one representative embodiment, a method comprising: extracting a first image portion from an image selected by a first party, the first image portion including a first encoded part of an second party digital signature; obtaining a second image portion associated with the first image portion, the second image portion including a second encoded part of the second party digital signature; decoding the first and second encoded parts of the second party digital signature; and confirming validity of the second party digital signature based upon a second party public key.