Advertisement

Multimedia Systems

, Volume 11, Issue 1, pp 60–67 | Cite as

Scalable trusted online dissemination of JPEG2000 images

  • Robert H. DengEmail author
  • Di Ma
  • Weizhong Shao
  • Yongdong Wu
Article

Abstract

An important aspect of JPEG2000 is its “compress once, decompress many ways” property [1], i.e., it allows users with different preferences, privileges or capabilities to extract various sub-images all from a single compressed image code-stream. In this paper, we present a flexible and scalable scheme to authenticate JPEG2000 images disseminated by a untrusted third-party server over open networks. The proposed scheme is fully compatible with JPEG2000 and possesses a “sign once, verify many ways” property, i.e., it allows users to verify the authenticity and integrity of different sub-images extracted from a single compressed code-stream protected with a single digital signature. Furthermore, the use of aggregated digital signatures reduces both computation and communication overhead on the user side for batch image authentication.

Keywords

Authentication Digital signatures JPEG2000 Merkle hash tree 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Taubman, D.S., Marcellin, M.W.: JPEG2000 – Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Drodrecht (2000)Google Scholar
  2. 2.
    Rabbani, M., Joshi, R.: An overview of the JPEG 2000 still image compression standard. Signal Process. Image Commun. 17(1), 3–48 (2002)CrossRefGoogle Scholar
  3. 3.
    ISO 154447ITU-T Recommendation T.800, http://www.jpeg.org
  4. 4.
    Schneier, B.: Applied Cryptography. Wiley, New York (1996)Google Scholar
  5. 5.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)Google Scholar
  6. 6.
    Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG 2000 compressed domain. In: Proceedings of the SPIE 46th Annual Meeting, Applications of Digital Image Processing XXIV, vol. 4472, pp. 95–104 (2001)Google Scholar
  7. 7.
    Lin, C.Y., Chang, S.F.: Semi-fragile watermarking for authenticating JPEG visual content. In: SPIE Security and Watermarking of Multimedia Contents II EI '00 (2000)Google Scholar
  8. 8.
    Merkle, R.C.: A certified digital signature. In: Proceedings of Advances in Cryptology – Crypto '89. Lecture Notes on Computer Science, vol. 0435, pp. 218–238. Spriner-Verlag, Berlin Heidelberg New York (1989)Google Scholar
  9. 9.
    Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) Advances in Cryptology – EUROCRYPT'2003, International Association for Cryptologic Research. Lecture Notes in Computer Science 2656, pp. 401–415. Springer-Verlag, Berlin, Germany (2003)Google Scholar
  10. 10.
    Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G., Stubblebine, G.: Flexible authentication of XML documents. In: Proceedings of the 8th ACM conference on Computer and Communication Security, pp. 136–145 (2001)Google Scholar
  11. 11.
    Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proceedings of the 7th USENIX Security Symposium, pp. 217–230 (1999)Google Scholar
  12. 12.
    Goodrich, M.T., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: Proceedings of DISCEX II'01, vol. 2, pp. 1068–1083 (2001)Google Scholar
  13. 13.
    Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic third-party data publication. In: Proceedings of the 14th IFIP WG11.3 Working Conference in Database Security. IFIP Conference Proceedings, vol. 201, pp. 101–112. Kluwer Academic Publishers, Drodrecht (2001)Google Scholar
  14. 14.
    National Institure of Standards and Technology, Secure Hash Standard (SHS), FIPS Publication 180-1 (1995)Google Scholar
  15. 15.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)CrossRefMathSciNetGoogle Scholar
  16. 16.
    National Institure of Standards and Technology: Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register, vol. 56, no. 169, pp. 42980–42982 (1991)Google Scholar
  17. 17.
    Peng, C., Deng, R.H., Wu, Y., Shao, W.: A flexible and scalable authentication scheme for JPEG2000 image codestreams. In: Proceedings of the ACM Multimedia, pp. 433–441 (2003)Google Scholar
  18. 18.
    Rivest, R., Shamir, A.: Payword and Micromint: Two simple micropayment schemes. In: Proceedings of Security Protocols Workshop, pp. 69–87 (1996)Google Scholar
  19. 19.
    Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. NDSS 2004 (2004)Google Scholar

Copyright information

© Springer-Verlag 2005

Authors and Affiliations

  • Robert H. Deng
    • 1
    Email author
  • Di Ma
    • 2
  • Weizhong Shao
    • 3
  • Yongdong Wu
    • 2
  1. 1.School of Information SystemsSingapore Management UniversitySingapore
  2. 2.Institute for Infocomm ResearchSingapore
  3. 3.Department of Computer Science and TechnologyPeking UniversityP.R. China

Personalised recommendations