Multimedia Systems

, Volume 15, Issue 4, pp 243–270 | Cite as

A survey on JPEG2000 encryption

Regular Paper

Abstract

Image and video encryption has become a widely discussed topic; especially for the fully featured JPEG2000 compression standard numerous approaches have been proposed. A comprehensive survey of state-of-the-art JPEG2000 encryption is given. JPEG2000 encryption schemes are assessed in terms of security, runtime and compression performance and their suitability for a wide range of application scenarios.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Apostolopoulos, J., Wee, S., Dufaux, F., Ebrahimi, T., Sun, Q., Zhang, Z.: The emerging JPEG2000 security (JPSEC) standard. In: Proceedings of International Symposium on Circuits and Systems, ISCAS’06. IEEE, May 2006Google Scholar
  2. 2.
    Apostolopoulos, J.G., Wee S.J: Supporting secure transcoding in JPSEC. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXVIII, vol. 5909, p. 59090J. SPIE (2005)Google Scholar
  3. 3.
    Blum L., Blum M., Shub M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput. 15(2), 364–383 (1986)MATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Bradley, J.N., Brislawn, C.M., Hopper, T.: The FBI wavelet/scalar quantization standard for gray-scale fingerprint image compression. In: SPIE Proceedings, Visual Information Processing II, vol. 1961, pp. 293–304, Orlando, FL, USA, April (1993)Google Scholar
  5. 5.
    Conan, V., Sadourny, Y., Jean-Marie, K., Chan, C., Wee, S., Apostolopoulos, J.: Study and validation of tools interoperability in JPSEC. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXVIII, vol. 5909, p. 59090H. SPIE (2005)Google Scholar
  6. 6.
    Conan, V., Sadourny, Y., Thomann, S.: Symmetric block cipher based protection: Contribution to JPSEC. ISO/IEC JTC 1/SC 29/WG 1 N 2771 (2003)Google Scholar
  7. 7.
    Daemen J., Rijmen V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Springer, Berlin (2002)MATHGoogle Scholar
  8. 8.
    Digital Cinema Initiatives, LLC (DCI). Digital cinema system specification v1.2. online presentation, March (2008)Google Scholar
  9. 9.
    Dufaux, F., Ebrahimi, T.: Region-based transform-domain video scrambling. In: Proceedings of Visual Communications and Image Processing, VCIP’06. SPIE (2006)Google Scholar
  10. 10.
    Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop, CVPRW ’06. IEEE (2006)Google Scholar
  11. 11.
    Dufaux, F., Ouaret, M., Abdeljaoued, Y., Navarro, A., Vergnenegre, F., Ebrahimi, T.: Privacy enabling technology for video surveillance. In: Proceedings of SPIE, Mobile Multimedia/Image Processing for Military and Security Applications, vol. 6250. SPIE (2006)Google Scholar
  12. 12.
    Dufaux, F., Wee, S., Apostolopoulos J., Ebrahimi T.: JPSEC for secure imaging in JPEG2000. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXVII, vol. 5558, pp. 319–330. SPIE (2004)Google Scholar
  13. 13.
    Dufaux, F., Ebrahimi, T.: Securing JPEG2000 compressed images. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXVI, vol. 5203, pp. 397–406. SPIE (2003)Google Scholar
  14. 14.
    Engel, D., Kutil, R., Uhl, A.: A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. In: Proceedings of ACM Multimedia and Security Workshop, MM-SEC ’06, pp. 202–207, Geneva, Switzerland, September (2006)Google Scholar
  15. 15.
    Engel, D., Stütz, T., Uhl, A.: Format-compliant JPEG2000 encryption in JPSEC: Security, applicability and the impact of compression parameters. EURASIP J. Inform. Secur. (Article ID 94565), 20 (2007). doi:10.1155/2007/94565
  16. 16.
    Engel, D., Stütz, T., Uhl, A.: Efficient transparent JPEG2000 encryption. In: Li, C.-T. (ed.) Multimedia Forensics and Security, pp. 336–359. IGI Global, Hershey, PA, USA (2008)Google Scholar
  17. 17.
    Engel, D., Uhl, A.: Parameterized biorthogonal wavelet lifting for lightweight JPEG2000 transparent encryption. In: Proceedings of ACM Multimedia and Security Workshop, MM-SEC ’05, pp. 63–70, New York, NY, USA, August (2005)Google Scholar
  18. 18.
    Engel, D., Uhl, A.: Security enhancement for lightweight JPEG2000 transparent encryption. In: Proceedings of Fifth International Conference on Information, Communication and Signal Processing, ICICS ’05, pp. 1102–1106, Bangkok, Thailand, December (2005)Google Scholar
  19. 19.
    Engel, D., Uhl, A.: Lightweight JPEG2000 encryption with anisotropic wavelet packets. In: Proceedings of International Conference on Multimedia and Expo, ICME ’06, pp. 2177–2180, Toronto, Canada, July 2006. IEEE (2006)Google Scholar
  20. 20.
    Engel, D., Uhl, A.: Secret wavelet packet decompositions for JPEG2000 lightweight encryption. In: Proceedings of 31st International Conference on Acoustics, Speech, and Signal Processing, ICASSP ’06, vol. V, pp. 465–468, Toulouse, France, May 2006. IEEE (2006)Google Scholar
  21. 21.
    Engel, D., Uhl, A.: An evaluation of lightweight JPEG2000 encryption with anisotropic wavelet packets. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents IX. Proceedings of SPIE, pp. 65051S1–65051S10, San Jose, CA, USA, January 2007. SPIE (2007)Google Scholar
  22. 22.
    Fang, J., Sun, J.: Compliant encryption scheme for JPEG2000 image code streams. J. Electron. Imaging 15(4) (2006)Google Scholar
  23. 23.
    Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton, (2005)Google Scholar
  24. 24.
    Grangetto M., Magli E., Olmo G.: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans. Multimed. 8(5), 905–917 (2006)CrossRefGoogle Scholar
  25. 25.
    Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG2000 compressed domain. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXIV. Proceedings of SPIE, vol. 4472, pp. 95–104, San Diego, CA, USA, July (2001)Google Scholar
  26. 26.
    Hartenstein, F.: Parametrization of discrete finite biorthogonal wavelets with linear phase. In: Proceedings of the 1997 International Conference on Acoustics, Speech and Signal Processing (ICASSP’97), April (1997)Google Scholar
  27. 27.
    Imaizumi, S., Watanabe, O., Fujiyoshi, M., Kiya, H.: Generalized hierarchical encryption of JPEG2000 codestreams for access control. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’05), vol. 2. IEEE, September (2005)Google Scholar
  28. 28.
    Imaizumi, S., Fujiyoshi, M., Abe, Y., Kiya, H.: Collusion attack-resilient hierarchical encryption of JPEG 2000 codestreams with scalable access control. In: Image Processing, 2007. ICIP 2007. IEEE International Conference on, vol. 2, pp. 137–140, September (2007)Google Scholar
  29. 29.
    ISO/IEC 15444-8, Final Committee Draft. Information technology—JPEG2000 image coding system, Part 8: Secure JPEG2000. Technical report, ISO, November (2004)Google Scholar
  30. 30.
    ISO/IEC 15444-1. Information technology—JPEG2000 image coding system, Part 1: Core coding system, December (2000)Google Scholar
  31. 31.
    ISO/IEC 15444-4. Information technology—JPEG2000 image coding system, Part 4: Conformance testing, December (2004)Google Scholar
  32. 32.
    ISO/IEC 15444-8. Information technology—JPEG2000 image coding system, Part 8: Secure JPEG2000, April (2007)Google Scholar
  33. 33.
    ITU-T H.264. Advanced video coding for generic audivisual services, November (2007)Google Scholar
  34. 34.
    ITU-T T.800. Information technology—JPEG2000 image coding system, Part 1: Core coding system, August (2002)Google Scholar
  35. 35.
    Kiya, H., Imaizumi, D., Watanabe O.: Partial-scrambling of image encoded using JPEG2000 without generating marker codes. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’03), vol. III, pp. 205–208, Barcelona, Spain, September (2003)Google Scholar
  36. 36.
    Köckerbauer, T., Kumar, M., Uhl, A.: Lightweight JPEG2000 confidentiality for mobile environments. In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME ’04, Taipei, Taiwan, June (2004)Google Scholar
  37. 37.
    Lian, S., Sun, J., Wang, Z.: Perceptual cryptography on JPEG2000 compressed images or videos. In: 4th International Conference on Computer and Information Technology, Wuhan, China, September 2004. IEEE (2004)Google Scholar
  38. 38.
    Lian, S., Sun, J., Zhang, D., Wang, Z.: A selective image encryption scheme based on JPEG2000 codec. In: Nakamura, Y., Aizawa, K., Satoh, S. (eds.) Proceedings of the 5th Pacific Rim Conference on Multimedia. Lecture Notes in Computer Science, vol. 3332, pp. 65–72. Springer, Berlin (2004)Google Scholar
  39. 39.
    Liu J.-L.: Efficient selective encryption for jpeg 2000 images using private initial table. Pattern Recognit. 39(8), 1509–1517 (2006)MATHCrossRefGoogle Scholar
  40. 40.
    Lo S.-C.B., Li H., Freedman M.T.: Optimization of wavelet decomposition for image compression and feature preservation. IEEE Trans. Med. Imaging 22(9), 1141–1151 (2003)CrossRefGoogle Scholar
  41. 41.
    Macq B.M., Quisquater J.-J.: Cryptology for digital TV broadcasting. Proc. IEEE 83(6), 944–957 (1995)CrossRefGoogle Scholar
  42. 42.
    Mao, Y., Wu, M.: Security evaluation for communication-friendly encryption of multimedia. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’04), Singapore, October 2004. IEEE Signal Processing Society (2004)Google Scholar
  43. 43.
    Norcen, R., Uhl, A.: Encryption of wavelet-coded imagery using random permutations. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’04), Singapore, October 2004. IEEE Signal Processing Society (2004)Google Scholar
  44. 44.
    Norcen, R., Uhl, A.: Performance analysis of block-based permutations in securing JPEG2000 and SPIHT compression. In: Li, S., Pereira, F., Shum ,H.-Y., Tescher, A.G. (eds.) Visual Communications and Image Processing 2005 (VCIP’05). SPIE Proceedings, vol. 5960, pp. 944–952, Beijing, China, July 2005. SPIE (2005)Google Scholar
  45. 45.
    Norcen, R., Uhl, A.: Selective encryption of the JPEG2000 bitstream. In: Lioy, A., Mazzocchi, D. (eds.) Communications and Multimedia Security. Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS ’03. Lecture Notes on Computer Science, vol. 2828, pp. 194–204, Turin, Italy, October 2003. Springer, Berlin (2003)Google Scholar
  46. 46.
    Pommer, A., Uhl, A.: Application scenarios for selective encryption of visual data. In: Dittmann, J., Fridrich, J., Wohlmacher, P. (eds.) Multimedia and Security Workshop, ACM Multimedia, pp. 71–74, Juan-les-Pins, France, December (2002)Google Scholar
  47. 47.
    Pommer, A., Uhl, A.: Selective encryption of wavelet packet subband structures for secure transmission of visual data. In: Dittmann, J., Fridrich, J., Wohlmacher, P. (eds) Multimedia and Security Workshop, ACM Multimedia. pp. 67–70, Juan-les-Pins, France, December (2002)Google Scholar
  48. 48.
    Pommer A., Uhl A.: Selective encryption of wavelet-packet encoded image data—efficiency and security. ACM Multimed. Syst. (Special Issue Multimed. Secur.) 9(3), 279–287 (2003)Google Scholar
  49. 49.
    Said, A.: Measuring the strength of partial encryption schemes. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’05), vol. 2, September (2005)Google Scholar
  50. 50.
    Schneid J., Pittner S.: On the parametrization of the coefficients of dilation equations for compactly supported wavelets. Computing 51, 165–173 (1993)MATHCrossRefMathSciNetGoogle Scholar
  51. 51.
    Schneier B.: Applied cryptography: protocols, algorithms and source code in C, 2nd edn. Wiley, New York (1996)MATHGoogle Scholar
  52. 52.
    Stütz, T., Uhl, A.: On format-compliant iterative encryption of JPEG2000. In: Proceedings of the Eighth IEEE International Symposium on Multimedia (ISM’06), pp. 985–990, San Diego, CA, USA, December 2006. IEEE Computer Society (2006)Google Scholar
  53. 53.
    Stütz, T., Uhl, A.: On efficient transparent JPEG2000 encryption. In Proceedings of ACM Multimedia and Security Workshop, MM-SEC ’07, pp. 97–108, New York, NY, USA, September 2007. ACM PressGoogle Scholar
  54. 54.
    Stütz, T., Uhl, A.: On JPEG2000 error concealment attacks. In: Proceedings of the 3rd Pacific-Rim Symposium on Image and Video Technology, PSIVT ’09, Lecture Notes in Computer Science, Tokyo, Japan, January 2009. Springer, Berlin (2009, to appear)Google Scholar
  55. 55.
    Taubman D.: High performance scalable image compression with EBCOT. IEEE Trans. Image Process. 9(7), 1158–1170 (2000)CrossRefGoogle Scholar
  56. 56.
    Taubman, D., Marcellin, M.W.: JPEG2000—Image Compression Fundamentals, Standards and Practice. Kluwer, Dordrecht (2002)Google Scholar
  57. 57.
    Tolba A.S.: Wavelet packet compression of medical images. Digit. Signal Process. 12(4), 441–470 (2002)CrossRefGoogle Scholar
  58. 58.
    Uhl A.: Image compression using non-stationary and inhomogeneous multiresolution analyses. Image Vis. Comput. 14(5), 365–371 (1996)Google Scholar
  59. 59.
    Uhl, A., Obermair, Ch.: Transparent encryption of JPEG2000 bitstreams. In: Podhradsky, P. et al. (eds.) Proceedings EC-SIP-M 2005 (5th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services), pp 322–327, Smolenice, Slovak Republic (2005)Google Scholar
  60. 60.
    Uhl, A., Pommer, A.: Image and Video Encryption. From Digital Rights Management to Secured Personal Communication. Advances in Information Security, vol. 15. Springer, Berlin (2005)Google Scholar
  61. 61.
    Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4) (2004)Google Scholar
  62. 62.
    Wee, S., Apostolopoulos, J.: Secure transcoding with JPSEC confidentiality and authentication. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’04), Singapore, Singapore, October (2004)Google Scholar
  63. 63.
    Wee, S.J., Apostolopoulos, J.G.: Secure scalable streaming and secure transcoding with JPEG2000. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’03), vol. I, pp. 547–551, Barcelona, Spain, September (2003)Google Scholar
  64. 64.
    Wickerhauser M.V.: Adapted Wavelet Analysis from Theory to Software. A.K. Peters, Wellesley (1994)MATHGoogle Scholar
  65. 65.
    Wu, H., Ma, D.: Efficient and secure encryption schemes for JPEG2000. In: Proceedings of the 2004 International Conference on Acoustics, Speech and Signal Processing (ICASSP 2004), pp. 869–872, May (2004)Google Scholar
  66. 66.
    Wu, M., Mao, V.: Communication-friendly encryption of multimedia. In: Proceedings of the IEEE Multimedia Signal Processing Workshop, MMSP ’02, St. Thomas, Virgin Islands, USA, December (2002)Google Scholar
  67. 67.
    Wu, Y., Deng, R., Ma, D.: Securing JPEG2000 code-streams. In: Lee, D., Shieh, S., Tygar, J., (eds.) Computer Security in the 21st Century, pp. 229–254 (2005)Google Scholar
  68. 68.
    Wu, Y., Deng, R.H.: Compliant encryption of JPEG2000 codestreams. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’04), Singapure, October 2004. IEEE Signal Processing Society (2004)Google Scholar
  69. 69.
    Xu, D., Do, M.N.: Anisotropic 2-D wavelet packets and rectangular tiling: theory and algorithms. In: Unser, M.A., Aldroubi, A., Laine, A.F. (eds.) Proceedings of SPIE Conference on Wavelet Applications in Signal and Image Processing X. SPIE Proceedings, vol. 5207, pp. 619–630, San Diego, CA, USA, August 2003. SPIE (2003)Google Scholar
  70. 70.
    Yang, Y., Zhu, B.B., Yang, Y., Li, S., Yu N.: Efficient and syntax-compliant JPEG2000 encryption preserving original fine granularity of scalability. EURASIP J. Inform. Secur. (2007)Google Scholar
  71. 71.
    Zhong, G., Cheng, L., Chen, H.: A simple 9/7-tap wavelet filter based on lifting scheme. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’01), pp. 249–252, October (2001)Google Scholar
  72. 72.
    Zhu, B., Yang, Y., Li, S.: JPEG2000 syntax-compliant encryption preserving full scalability. In: Proceedings of the IEEE International Conference on Image Processing (ICIP’05), vol. 3, September (2005)Google Scholar

Copyright information

© Springer-Verlag 2009

Authors and Affiliations

  1. 1.Department of Computer SciencesSalzburg UniversitySalzburgAustria

Personalised recommendations