Abstract
This paper proposes a key derivation scheme to control access of JPEG 2000 (JP2) coded images, which consist of hierarchical scalability such as SNR, resolution levels, and so on. The proposed scheme simultaneously controls access to each level of scalability. The proposed scheme derives keys through hash chains, and each JP2 packet is enciphered with each individual key. By introducing combinations of a cyclic shift and a hash function, the proposed scheme manages only a single key for a JP2 image; whereas the conventional access control schemes having the above mentioned features manage multiple keys. The single managed key is not delivered to any user. The proposed scheme is also resilient to collusion attacks. Performance analysis shows the effectiveness of the proposed scheme.
Chapter PDF
Similar content being viewed by others
References
Xie, D., Kuo, C.C.J.: Multimedia data encryption via random rotation in partitioned bit streams. In: Proc. IEEE ISCAS, pp. 5533–5536 (2005)
Zhang, Z., Sun, Q., Wong, W.C., Apostolopoulos, J., Wee, S.: Rate-distortion-authentication optimized streaming of authenticated video. IEEE Trans. Circuits Syst. for Video Technol. 17, 544–557 (2007)
Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG 2000 compressed domain. In: Proc. SPIE, vol. 4472, pp. 95–104 (2001)
Haggag, A., Ghoneim, M., Lu, J., Yahagi, T.: Progressive encryption and controlled access scheme for JPEG 2000 encoded images. In: Proc. IEEE ISPACS, pp. 895–898 (2006)
Shahid, Z., Chaumont, M., Puech, W.: Selective and scalable encryption of enhancement layers for dyadic scalable H.264/AVC by scrambling of scan patterns. In: Proc. IEEE ICIP, pp. 1273–1276 (2009)
Won, Y.G., Bae, T.M., Ro, Y.M.: Scalable Protection and Access Control in Full Scalable Video Coding. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 407–421. Springer, Heidelberg (2006)
Joye, M., Yen, S.M.: One-Way Cross-Trees and Their Applications. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 346–356. Springer, Heidelberg (2002)
Wu, Y., Ma, D., Deng, R.H.: Progressive protection of JPEG 2000 codestreams. In: Proc. IEEE ICIP, pp. 3447–3450 (2004)
Imaizumi, S., Fujiyoshi, M., Kiya, H.: Efficient collusion attack-free access control for multidimensionally hierarchical scalability content. In: Proc. IEEE ISCAS, pp. 505–508 (2009)
Imaizumi, S., Fujiyoshi, M., Abe, Y., Kiya, H.: Collusion attack-resilient hierarchical encryption of JPEG 2000 codestreams with scalable access control. In: Proc. IEEE ICIP, pp. II-137–II-140 (2007)
Information technology — JPEG 2000 image coding system – Part 1: Core coding system. ISO/IEC IS–15444–1 (2004)
Information technology — JPEG 2000 image coding system – Part 8: Secure JPEG 2000. ISO/IEC IS–15444–8 (2007)
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Imaizumi, S., Fujiyoshi, M., Kiya, H., Aoki, N., Kobayashi, H. (2011). A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images. In: Ho, YS. (eds) Advances in Image and Video Technology. PSIVT 2011. Lecture Notes in Computer Science, vol 7088. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25346-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-25346-1_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25345-4
Online ISBN: 978-3-642-25346-1
eBook Packages: Computer ScienceComputer Science (R0)