Securing JPEG2000 Code-Streams

  • Robert H. Deng
  • Yongdong Wu
  • Di Ma


JPEG2000 is an emerging international standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. Part 8 of the standard, named JPSEC, is concerned with all the security aspects of JPEG2000 image code-streams, with emphasis presently on access control and authentication. An important aspect of JPEG2000 is its “compress once, decompress many ways” property [Taubman and Marcellin, 2000], i. e., it allows extraction of transcoded sub-images (e.g., images with various resolutions, pixel fidelities, tiles and components) from a single compressed image code-stream.

This paper presents our proposals to the JPSEC Working Group on an authentication scheme and an access control scheme for JPEG2000 image code-streams. Both schemes are fully compatible with the core part of the JPEG2000 standard. The authentication scheme possesses the so called “sign once, verify many ways” property. That is, it allows users to verify the authenticity and integrity of any transcoded sub-images extracted from a single code-stream protected with a single signature. The access control has the “encrypt once, access many ways” property. That is, it allows users access to transcoded sub-images from a single encrypted JPEG2000 code-stream.


Access control digital signature JPEG2000 hash function encryption image compression rooted trees 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [Taubman and Marcellin, 2000]
    D. S. Taubman and M. W. Marcellin, (2000)., JPEG2000 — Image Compression Fundamentals, Standards and Practice, Kluwer Academic Publishers.Google Scholar
  2. [Rabbani and Joshi, 2002]
    M. Rabbani and R. Joshi, (2002). An overview of the JPEG 2000 still image compression standard, Signal Processing: Image Communication, Vol. 17, No. 1, pages 3–48, Elsevier.CrossRefGoogle Scholar
  3. [ISO154447]
    ISO 154447 ITU-T Recommendation T.800, http://www.jpeg.orgGoogle Scholar
  4. [Sandhu, 1998]
    R. S. Sandhu, (1988). Cryptographic implementation of a tree hierarchy for access control, Information Processing Letters, 27(2), pages 95–98.CrossRefGoogle Scholar
  5. [Eertino et al., 1993]
    E. Bertino, S. Jajodia, and P. Samarati, (1993). Access Controls in Object-Oriented Database Systems — Some Approaches and Issues, in Advanced Database Systems, N. R. Adam and B. Bhargava, eds., Springer-Verlag Lecture Notes in Computer Science, Vol. 759, pages 17–44.Google Scholar
  6. [Sandhu and Samarati, 1994]
    R. S. Sandhu and P. Samarati, (1994). Access control: principle and practice, IEEE Communications Magazine, Vol. 32, No. 9, pages 40–48.CrossRefGoogle Scholar
  7. [Akl and Taylor, 1983]
    S. G. Akl and P. D. Taylor, (1983). Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, 1(3), pages 239–248.CrossRefGoogle Scholar
  8. [Chick and Tavares, 1990]
    G. C. Chick and S. E. Tavares, (1990). Flexible access control with master keys, In G. Brassard, editor, Advances in Cryptology: Proceedings of Crypto'89, LNCS 435, pages 316–322, Springer-Verlag.Google Scholar
  9. [Harn and Lin, 1990]
    L. Harn and H. Y. Lin, (1990). A cryptographic key generation scheme for multi-level data security, Journal of Computer and Security, 9(6), pages 539–546.CrossRefGoogle Scholar
  10. [MacKinnon et al., 1985]
    S. J. MacKinnon, P. D. Taylor, H. Meijer and S. G. Akl, (1985). An optimal algorithm for assigning cryptographic keys to access control in a hierarchy, IEEE Transactions on Computers, C-34(9), pages 797–802.Google Scholar
  11. [Ohta et al., 1991]
    K. Ohta, T. Okamoto and K. Koyama, (1991) Membership authentication for hierarchical multigroup using the extended Fiat-Shamir scheme, In I. B. Damgard, editor, Advances in Cryptology: Proceedings of Eurpcrypt'90, LNCS 473, pages 316–322, Springer-Verlag.Google Scholar
  12. [Rivest et al., 1978]
    R. L. Rivest, A. Shamir and L. Adleman, (1978). A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2m pages 637–647.MathSciNetGoogle Scholar
  13. [Grosbois et al., 2001]
    [Grosbois et al., 2001] R. Grosbois, P. Gerbelot and T. Ebrahimi, (2001). Authentication and Access Control in the JPEG 2000 Compressed Domain, Proc. of the SPIE 46th Annual Meeting, Applications of Digital Image Processing XXIV, Vol. 4472, pages 95–104.Google Scholar
  14. [Wu and Deng, 2003]
    Y. Wu and R. H. Deng, (2003). A method for JPEG2000 access control, ISO/IEC JTC 29/WG1/N2810, January 23rd.Google Scholar
  15. [Prandolini et al., 2002]
    R. Prandolini, S. Houchin, G. Colyer (JPIP Editors), (2002). JPEG2000 image coding system — Part 9: Interactivity tools, APIs and protocols — Working Draft version 2.0, ISO/IEC JTC 1/SC 29/WG1/N2790, 24 October.Google Scholar
  16. [Mori and Kawahara, 1990]
    R. Mori and M. Kawahara, (1990). Superdistribution: the concept and the architecture, IEIEC Transactions, Vol. E73, No. 7, July.Google Scholar
  17. [Sandhu, 1993]
    R. S. Sandhu, (1993). Lattice-based access control models, IEEE Computer, Vol. 26, No. 11, pages 9–19, Nov.Google Scholar
  18. [Ray and Narasimhamurthi, 2002]
    I. Ray, I Ray and N. Narasimhamurthi, (2002). A cryptographic solution to implement access control in a hierarchy and more, Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pages 65–73.Google Scholar
  19. [NIST, 1995]
    National Institute of Standards and Technology, (1995). Secure hash standard (SHS), FIPS Publication 180-1, 1995.Google Scholar
  20. [Rivest, 1992a]
    R. Rivest, (1992). The MD5 message digest algorithms, IETF RFC 1321.Google Scholar
  21. [Merkle, 1989]
    R. C. Merkle, (1989). A certified digital signature, Proc. of Advances in Cryptology-Crypto '89, Lecture Notes on Computer Science, Vol. 0435, pages 218–238, Spriner-Verlag.Google Scholar
  22. [Rivest, 1992b]
    R. L. Rivest, (1992). The RC4 encryption algorithm, RSA Data Security, Inc., March 12, (Properiety).Google Scholar
  23. [Schneier, 1996]
    B. Schneier, (1996). Applied Cryptography, John Wiley & Sons.Google Scholar
  24. [Menezes et al., 1996]
    A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, (1996). Handbook of Applied Cryptography, CRC Press.Google Scholar
  25. [Lin and Chang, 2000]
    C. Y. Lin and S. F. Chang, (2000). Semi-Fragile Watermarking for Authenticating JPEG Visual Content, SPIE Security and Watermarking of Multimedia Contents II EI '00.Google Scholar
  26. [Devanbu et al., 2001a] P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls and G. Stubblebine, (2001). Flexible authentication of XML documents, Proc. of the 8th ACM conference on Computer and Communication Security, pages 136–145.Google Scholar
  27. [Goodrich et al., 2001]
    [Goodrich et al., 2001] M. T. Goodrich, R. Tamassia, and A. Schwerin, (2001). Implementation of an Authenticated Dictionary with Skip Lists and Commutative Hashing, Proc. of DISCEX II'01, Vol. 2, pages 1068–1083.Google Scholar
  28. [Naor and Nissim, 1999]
    M. Naor and K. Nissim. (1999). Certificate Revocation and Certificate Update, Proc. of the 7th USENIX Security Symposium, pages 217–230.Google Scholar
  29. [Devanbu et al, 2001b]
    P. Devanbu, M. Gertz, C. Martel and S. Stubblebine, (2001). Authentic Third-party Data Publication, Proc. of the 14th IFIP WG 1.3 Working Conference in Database Security, IFIP Conference Proceedings, Vol. 201, pages 101–112, Kluwer.Google Scholar
  30. [Peng et al., 2003]
    C. Peng, R.H. Deng, Y. Wu and W. Shao, (2003). A flexible and scalable authentication scheme for JPEG2000 image codestreams, to appear in the Proceedings of the ACM Multimedia 2003, pages 433–441, San Franciso.Google Scholar
  31. [Fukuhara and Singer, 2003]
    T. Fukuhara and D. Singer, (2003). 15444-3 amendment 2, Motion JPEG2000, Motion JPEG2000 version 2, MJP derived from ISO media file format, ISO/IEC JTC 1/SC 29/WG1 N2780F, January.Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  • Robert H. Deng
    • 1
  • Yongdong Wu
    • 1
  • Di Ma
    • 1
  1. 1.Institute for Infocomm ResearchSingapore

Personalised recommendations