HashShot

by PGS Inc.


Productivity

free



"Hash Shot" uses "hash value" which is said to be the fingerprint of digital data for the first time in the world.It is an application that anyone can easily verify the original proof and falsification.As you know, it is a global issue to protect society from disadvantages and damages caused by falsification of images.We, PGS Co., Ltd. (Minato-ku, Tokyo), are the first company to plan a write-once type "tamper-proof media" that can be written only once, which is currently adopted by the Japanese police, etc. We have developed an application that allows anyone to easily verify that the image is "original" and "whether or not it has been tampered with."This application "Hash Shot" has a function that can determine whether the image has been tampered with by referring to the hash value (SHA256) unique to the image data calculated immediately after shooting. (Patent pending) [overview]Until now, it was extremely difficult to prove that nothing was modified (originality)."Hash Shot" makes the proof more possible by using the hash value as a "data-specific fingerprint".How to use① The image data taken by activating the "Hash Shot" app is stored in the "album" in the app,Hash values ​​are sequentially recorded in index and Hash List, of which album and index can be stored in one folder and exported.②In the folder, the hash value of "index" is also calculated at the same time and saved in a file called "all hash" in the same folder.③ Since the hash value of "all hash" is also recorded in "Hash List", all calculated hash values ​​are also saved in the file "Hash List" in the app.In this way, data is stored in folders, and the hash value (index/all hash) for each folder is also saved in the "Hash List" in the app for proof/verification, and for checking past data. can be used forThis application does not calculate the hash value unless you press the shutter, so you can check all the continuous data.If there are photos that have been tampered with or deleted after output, it is possible to identify them visually.In addition, the app cannot be edited or processed, and it cannot be written from a PC, so it can be self-managed to prevent tampering from the outside.Also, since the original data cannot be restored from the hash value, a third party cannot restore the original image from the saved "Hash List".