Skip to main content

Abstract

JPEG2000 is an emerging international standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. Part 8 of the standard, named JPSEC, is concerned with all the security aspects of JPEG2000 image code-streams, with emphasis presently on access control and authentication. An important aspect of JPEG2000 is its “compress once, decompress many ways” property [Taubman and Marcellin, 2000], i. e., it allows extraction of transcoded sub-images (e.g., images with various resolutions, pixel fidelities, tiles and components) from a single compressed image code-stream.

This paper presents our proposals to the JPSEC Working Group on an authentication scheme and an access control scheme for JPEG2000 image code-streams. Both schemes are fully compatible with the core part of the JPEG2000 standard. The authentication scheme possesses the so called “sign once, verify many ways” property. That is, it allows users to verify the authenticity and integrity of any transcoded sub-images extracted from a single code-stream protected with a single signature. The access control has the “encrypt once, access many ways” property. That is, it allows users access to transcoded sub-images from a single encrypted JPEG2000 code-stream.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. S. Taubman and M. W. Marcellin, (2000)., JPEG2000 — Image Compression Fundamentals, Standards and Practice, Kluwer Academic Publishers.

    Google Scholar 

  2. M. Rabbani and R. Joshi, (2002). An overview of the JPEG 2000 still image compression standard, Signal Processing: Image Communication, Vol. 17, No. 1, pages 3–48, Elsevier.

    Article  Google Scholar 

  3. ISO 154447 ITU-T Recommendation T.800, http://www.jpeg.org

    Google Scholar 

  4. R. S. Sandhu, (1988). Cryptographic implementation of a tree hierarchy for access control, Information Processing Letters, 27(2), pages 95–98.

    Article  Google Scholar 

  5. E. Bertino, S. Jajodia, and P. Samarati, (1993). Access Controls in Object-Oriented Database Systems — Some Approaches and Issues, in Advanced Database Systems, N. R. Adam and B. Bhargava, eds., Springer-Verlag Lecture Notes in Computer Science, Vol. 759, pages 17–44.

    Google Scholar 

  6. R. S. Sandhu and P. Samarati, (1994). Access control: principle and practice, IEEE Communications Magazine, Vol. 32, No. 9, pages 40–48.

    Article  Google Scholar 

  7. S. G. Akl and P. D. Taylor, (1983). Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, 1(3), pages 239–248.

    Article  Google Scholar 

  8. G. C. Chick and S. E. Tavares, (1990). Flexible access control with master keys, In G. Brassard, editor, Advances in Cryptology: Proceedings of Crypto'89, LNCS 435, pages 316–322, Springer-Verlag.

    Google Scholar 

  9. L. Harn and H. Y. Lin, (1990). A cryptographic key generation scheme for multi-level data security, Journal of Computer and Security, 9(6), pages 539–546.

    Article  Google Scholar 

  10. S. J. MacKinnon, P. D. Taylor, H. Meijer and S. G. Akl, (1985). An optimal algorithm for assigning cryptographic keys to access control in a hierarchy, IEEE Transactions on Computers, C-34(9), pages 797–802.

    Google Scholar 

  11. K. Ohta, T. Okamoto and K. Koyama, (1991) Membership authentication for hierarchical multigroup using the extended Fiat-Shamir scheme, In I. B. Damgard, editor, Advances in Cryptology: Proceedings of Eurpcrypt'90, LNCS 473, pages 316–322, Springer-Verlag.

    Google Scholar 

  12. R. L. Rivest, A. Shamir and L. Adleman, (1978). A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2m pages 637–647.

    MathSciNet  Google Scholar 

  13. [Grosbois et al., 2001] R. Grosbois, P. Gerbelot and T. Ebrahimi, (2001). Authentication and Access Control in the JPEG 2000 Compressed Domain, Proc. of the SPIE 46th Annual Meeting, Applications of Digital Image Processing XXIV, Vol. 4472, pages 95–104.

    Google Scholar 

  14. Y. Wu and R. H. Deng, (2003). A method for JPEG2000 access control, ISO/IEC JTC 29/WG1/N2810, January 23rd.

    Google Scholar 

  15. R. Prandolini, S. Houchin, G. Colyer (JPIP Editors), (2002). JPEG2000 image coding system — Part 9: Interactivity tools, APIs and protocols — Working Draft version 2.0, ISO/IEC JTC 1/SC 29/WG1/N2790, 24 October.

    Google Scholar 

  16. R. Mori and M. Kawahara, (1990). Superdistribution: the concept and the architecture, IEIEC Transactions, Vol. E73, No. 7, July.

    Google Scholar 

  17. R. S. Sandhu, (1993). Lattice-based access control models, IEEE Computer, Vol. 26, No. 11, pages 9–19, Nov.

    Google Scholar 

  18. I. Ray, I Ray and N. Narasimhamurthi, (2002). A cryptographic solution to implement access control in a hierarchy and more, Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pages 65–73.

    Google Scholar 

  19. National Institute of Standards and Technology, (1995). Secure hash standard (SHS), FIPS Publication 180-1, 1995.

    Google Scholar 

  20. R. Rivest, (1992). The MD5 message digest algorithms, IETF RFC 1321.

    Google Scholar 

  21. R. C. Merkle, (1989). A certified digital signature, Proc. of Advances in Cryptology-Crypto '89, Lecture Notes on Computer Science, Vol. 0435, pages 218–238, Spriner-Verlag.

    Google Scholar 

  22. R. L. Rivest, (1992). The RC4 encryption algorithm, RSA Data Security, Inc., March 12, (Properiety).

    Google Scholar 

  23. B. Schneier, (1996). Applied Cryptography, John Wiley & Sons.

    Google Scholar 

  24. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, (1996). Handbook of Applied Cryptography, CRC Press.

    Google Scholar 

  25. C. Y. Lin and S. F. Chang, (2000). Semi-Fragile Watermarking for Authenticating JPEG Visual Content, SPIE Security and Watermarking of Multimedia Contents II EI '00.

    Google Scholar 

  26. [Devanbu et al., 2001a] P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls and G. Stubblebine, (2001). Flexible authentication of XML documents, Proc. of the 8th ACM conference on Computer and Communication Security, pages 136–145.

    Google Scholar 

  27. [Goodrich et al., 2001] M. T. Goodrich, R. Tamassia, and A. Schwerin, (2001). Implementation of an Authenticated Dictionary with Skip Lists and Commutative Hashing, Proc. of DISCEX II'01, Vol. 2, pages 1068–1083.

    Google Scholar 

  28. M. Naor and K. Nissim. (1999). Certificate Revocation and Certificate Update, Proc. of the 7th USENIX Security Symposium, pages 217–230.

    Google Scholar 

  29. P. Devanbu, M. Gertz, C. Martel and S. Stubblebine, (2001). Authentic Third-party Data Publication, Proc. of the 14th IFIP WG 1.3 Working Conference in Database Security, IFIP Conference Proceedings, Vol. 201, pages 101–112, Kluwer.

    Google Scholar 

  30. C. Peng, R.H. Deng, Y. Wu and W. Shao, (2003). A flexible and scalable authentication scheme for JPEG2000 image codestreams, to appear in the Proceedings of the ACM Multimedia 2003, pages 433–441, San Franciso.

    Google Scholar 

  31. T. Fukuhara and D. Singer, (2003). 15444-3 amendment 2, Motion JPEG2000, Motion JPEG2000 version 2, MJP derived from ISO media file format, ISO/IEC JTC 1/SC 29/WG1 N2780F, January.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Deng, R.H., Wu, Y., Ma, D. (2005). Securing JPEG2000 Code-Streams. In: Lee, D.T., Shieh, S.P., Tygar, J.D. (eds) Computer Security in the 21st Century. Springer, Boston, MA. https://doi.org/10.1007/0-387-24006-3_13

Download citation

  • DOI: https://doi.org/10.1007/0-387-24006-3_13

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-24005-3

  • Online ISBN: 978-0-387-24006-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics