Abstract
In this work an efficient format-compliant encryption approach for regular languages is proposed, block-based cycle-walking. The approach can transparently trade-off security for efficiency and can be adjusted to the desired level of security. The relationship between the encryption of regular languages and the encryption of JPEG2000 bitstreams is established. Block-based cycle-walking for the regular language of JPEG2000 bitstreams is compared to the extensive previous work from the multimedia security community and to the previous work from the cryptographic community, which is analyzed and evaluated.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bellare, M., Ristenpart, T.: Format-preserving encryption. In: Proceedings of Selected Areas in Cryptography, SAC ’09, Calgary, Canada, August 2009, Springer, Heidelberg (2009)
Black, J., Rogaway, P.: Ciphers with arbitrary finite domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 185–203. Springer, Heidelberg (2002)
Engel, D., Stütz, T., Uhl, A.: A survey on JPEG2000 encryption. Multimedia Systems 15(4), 243–270 (2009)
Fang, J., Sun, J.: Compliant encryption scheme for JPEG2000 image code streams. Journal of Electronic Imaging 15(4) (2006)
Goldreich, O.: The Foundations of Cryptography. Cambridge University Press, Cambridge (2001)
Hellwagner, H., Kuschnig, R., Stütz, T., Uhl, A.: Efficient in-network adaptation of encrypted H.264/SVC content. Elsevier Journal on Signal Processing: Image Communication 24(9), 740–758 (2009)
ISO/IEC 15444-1. Information technology – JPEG2000 image coding system, Part 1: Core coding system (December 2000)
ISO/IEC 15444-8. Information technology – JPEG2000 image coding system, Part 8: Secure JPEG2000 (April 2007)
Sipser, M.: Introduction to the Theory of Computation. International Thomson Publishing (1996)
Stütz, T., Uhl, A.: On format-compliant iterative encryption of JPEG2000. In: Proceedings of the Eighth IEEE International Symposium on Multimedia (ISM’06), San Diego, CA, USA, December 2006, pp. 985–990. IEEE Computer Society Press, Los Alamitos (2006)
Uhl, A., Pommer, A.: Image and Video Encryption. In: From Digital Rights Management to Secured Personal Communication. Advances in Information Security, vol. 15. Springer, Heidelberg (2005)
Wu, H., Ma, D.: Efficient and secure encryption schemes for JPEG2000. In: Proceedings of the 2004 International Conference on Acoustics, Speech and Signal Processing (ICASSP 2004), pp. 869–872 (May 2004)
Wu, Y., Deng, R.H.: Compliant encryption of JPEG2000 codestreams. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’04), Singapure, October 2004. IEEE Signal Processing Society, Los Alamitos (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stütz, T., Uhl, A. (2010). Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking. In: De Decker, B., Schaumüller-Bichl, I. (eds) Communications and Multimedia Security. CMS 2010. Lecture Notes in Computer Science, vol 6109. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13241-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-13241-4_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13240-7
Online ISBN: 978-3-642-13241-4
eBook Packages: Computer ScienceComputer Science (R0)