Like, how is this any different than having each camera equipped with a vendor controlled key and then having it sign every photo?
If you can spoof the sensor enough to reuse the key, couldn't you spoof the sensor enough to fool a verifier into believing your false proof?
Nyquist–Shannon sampling theorem.
But, if the sony sensor also measures depth information, this attack vector will fall flat. Pun intended.
Like, how is this any different than having each camera equipped with a vendor controlled key and then having it sign every photo?
If you can spoof the sensor enough to reuse the key, couldn't you spoof the sensor enough to fool a verifier into believing your false proof?