Abstract
JPEG2000 is an emerging international standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. Part 8 of the standard, named JPSEC, is concerned with all the security aspects of JPEG2000 image code-streams, with emphasis presently on access control and authentication. An important aspect of JPEG2000 is its “compress once, decompress many ways” property [Taubman and Marcellin, 2000], i. e., it allows extraction of transcoded sub-images (e.g., images with various resolutions, pixel fidelities, tiles and components) from a single compressed image code-stream.
This paper presents our proposals to the JPSEC Working Group on an authentication scheme and an access control scheme for JPEG2000 image code-streams. Both schemes are fully compatible with the core part of the JPEG2000 standard. The authentication scheme possesses the so called “sign once, verify many ways” property. That is, it allows users to verify the authenticity and integrity of any transcoded sub-images extracted from a single code-stream protected with a single signature. The access control has the “encrypt once, access many ways” property. That is, it allows users access to transcoded sub-images from a single encrypted JPEG2000 code-stream.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. S. Taubman and M. W. Marcellin, (2000)., JPEG2000 — Image Compression Fundamentals, Standards and Practice, Kluwer Academic Publishers.
M. Rabbani and R. Joshi, (2002). An overview of the JPEG 2000 still image compression standard, Signal Processing: Image Communication, Vol. 17, No. 1, pages 3–48, Elsevier.
ISO 154447 ITU-T Recommendation T.800, http://www.jpeg.org
R. S. Sandhu, (1988). Cryptographic implementation of a tree hierarchy for access control, Information Processing Letters, 27(2), pages 95–98.
E. Bertino, S. Jajodia, and P. Samarati, (1993). Access Controls in Object-Oriented Database Systems — Some Approaches and Issues, in Advanced Database Systems, N. R. Adam and B. Bhargava, eds., Springer-Verlag Lecture Notes in Computer Science, Vol. 759, pages 17–44.
R. S. Sandhu and P. Samarati, (1994). Access control: principle and practice, IEEE Communications Magazine, Vol. 32, No. 9, pages 40–48.
S. G. Akl and P. D. Taylor, (1983). Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, 1(3), pages 239–248.
G. C. Chick and S. E. Tavares, (1990). Flexible access control with master keys, In G. Brassard, editor, Advances in Cryptology: Proceedings of Crypto'89, LNCS 435, pages 316–322, Springer-Verlag.
L. Harn and H. Y. Lin, (1990). A cryptographic key generation scheme for multi-level data security, Journal of Computer and Security, 9(6), pages 539–546.
S. J. MacKinnon, P. D. Taylor, H. Meijer and S. G. Akl, (1985). An optimal algorithm for assigning cryptographic keys to access control in a hierarchy, IEEE Transactions on Computers, C-34(9), pages 797–802.
K. Ohta, T. Okamoto and K. Koyama, (1991) Membership authentication for hierarchical multigroup using the extended Fiat-Shamir scheme, In I. B. Damgard, editor, Advances in Cryptology: Proceedings of Eurpcrypt'90, LNCS 473, pages 316–322, Springer-Verlag.
R. L. Rivest, A. Shamir and L. Adleman, (1978). A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2m pages 637–647.
[Grosbois et al., 2001] R. Grosbois, P. Gerbelot and T. Ebrahimi, (2001). Authentication and Access Control in the JPEG 2000 Compressed Domain, Proc. of the SPIE 46th Annual Meeting, Applications of Digital Image Processing XXIV, Vol. 4472, pages 95–104.
Y. Wu and R. H. Deng, (2003). A method for JPEG2000 access control, ISO/IEC JTC 29/WG1/N2810, January 23rd.
R. Prandolini, S. Houchin, G. Colyer (JPIP Editors), (2002). JPEG2000 image coding system — Part 9: Interactivity tools, APIs and protocols — Working Draft version 2.0, ISO/IEC JTC 1/SC 29/WG1/N2790, 24 October.
R. Mori and M. Kawahara, (1990). Superdistribution: the concept and the architecture, IEIEC Transactions, Vol. E73, No. 7, July.
R. S. Sandhu, (1993). Lattice-based access control models, IEEE Computer, Vol. 26, No. 11, pages 9–19, Nov.
I. Ray, I Ray and N. Narasimhamurthi, (2002). A cryptographic solution to implement access control in a hierarchy and more, Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pages 65–73.
National Institute of Standards and Technology, (1995). Secure hash standard (SHS), FIPS Publication 180-1, 1995.
R. Rivest, (1992). The MD5 message digest algorithms, IETF RFC 1321.
R. C. Merkle, (1989). A certified digital signature, Proc. of Advances in Cryptology-Crypto '89, Lecture Notes on Computer Science, Vol. 0435, pages 218–238, Spriner-Verlag.
R. L. Rivest, (1992). The RC4 encryption algorithm, RSA Data Security, Inc., March 12, (Properiety).
B. Schneier, (1996). Applied Cryptography, John Wiley & Sons.
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, (1996). Handbook of Applied Cryptography, CRC Press.
C. Y. Lin and S. F. Chang, (2000). Semi-Fragile Watermarking for Authenticating JPEG Visual Content, SPIE Security and Watermarking of Multimedia Contents II EI '00.
[Devanbu et al., 2001a] P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls and G. Stubblebine, (2001). Flexible authentication of XML documents, Proc. of the 8th ACM conference on Computer and Communication Security, pages 136–145.
[Goodrich et al., 2001] M. T. Goodrich, R. Tamassia, and A. Schwerin, (2001). Implementation of an Authenticated Dictionary with Skip Lists and Commutative Hashing, Proc. of DISCEX II'01, Vol. 2, pages 1068–1083.
M. Naor and K. Nissim. (1999). Certificate Revocation and Certificate Update, Proc. of the 7th USENIX Security Symposium, pages 217–230.
P. Devanbu, M. Gertz, C. Martel and S. Stubblebine, (2001). Authentic Third-party Data Publication, Proc. of the 14th IFIP WG 1.3 Working Conference in Database Security, IFIP Conference Proceedings, Vol. 201, pages 101–112, Kluwer.
C. Peng, R.H. Deng, Y. Wu and W. Shao, (2003). A flexible and scalable authentication scheme for JPEG2000 image codestreams, to appear in the Proceedings of the ACM Multimedia 2003, pages 433–441, San Franciso.
T. Fukuhara and D. Singer, (2003). 15444-3 amendment 2, Motion JPEG2000, Motion JPEG2000 version 2, MJP derived from ISO media file format, ISO/IEC JTC 1/SC 29/WG1 N2780F, January.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Deng, R.H., Wu, Y., Ma, D. (2005). Securing JPEG2000 Code-Streams. In: Lee, D.T., Shieh, S.P., Tygar, J.D. (eds) Computer Security in the 21st Century. Springer, Boston, MA. https://doi.org/10.1007/0-387-24006-3_13
Download citation
DOI: https://doi.org/10.1007/0-387-24006-3_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24005-3
Online ISBN: 978-0-387-24006-0
eBook Packages: Computer ScienceComputer Science (R0)