Abstract
We propose an efficient tamper detection scheme for JPEG2000 codestreams. The proposed scheme embeds information while maintaining the scalability function of JPEG2000 and can detect tampered layers or tampered resolution levels for each decoded image quality level. Marker codes that delimit a JPEG2000 codestream must not be generated in the body data that possesses the image information. We can prevent new marker codes from being generated when embedding information into the JPEG2000 codestream. The experimental results show that our scheme can preserve the high quality of the embedded images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wu, Y., Ma, D., Deng, R.H.: Progressive protection of JPEG2000 codestreams. In: Proceedings of IEEE ICIP, pp. V-3447–V-3450 (2004)
Schneider, M., Chang, S.-F.: Robust content based digital signature for image authentication. In: Proceedings of IEEE ICIP, pp. III-227–III-230 (1996)
Han, S., Fujiyoshi, M., Kiya, H.: A Reversible image authentication method without memorization of hiding parameters. IEICE Trans. Fundam. E92–A(10), 2572–2579 (2009)
Jin, H.L., Fujiyoshi, M., Kiya, H.: Lossless data hiding in the spatial domain for high quality images. IEICE Trans. Fundam. E90–A(4), 771–777 (2007)
Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)
Tsai, C.-L., Chiang, H.-F., Fan, K.-C., Chung, C.-D.: Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Patten Recognit. 38(11), 1993–2006 (2005)
Information Technology – JPEG 2000 Image Coding System - Part1: Code Coding System ISO/IEC IS-15444-1 (2004)
Taubman, D.S., Marcellin, M.W.: JPEG2000: Image Compression Fundamentals. Standards and Practice. Kluwer Academic Publishers, Norwell (2002)
Ando, K., Kobayashi, H., Kiya, H.: A method for embedding binary data into JPEG2000 bit streams based on the layer structure. In: Proceedings of EURASIP EUSIPCO, pp. III-89–III-92 (2002)
Suhail, M.A., Obaidat, M.S.: On the digital watermarking in JPEG2000. In: Proceedings of IEEE ICECS, pp. II-871–II-874 (2001)
Chen, T.-S., Chen, J., Chen, J.-G.: A simple and efficient watermark technique based on JPEG 2000 Codec. Multimedi. Syst. 10(1), 16–26 (2004)
Sun, Q., Chang, S.F.: A secure and robust digital signature scheme for JPEG2000 image authentication. IEEE Trans. 7(3), 480–494 (2005)
Ikeda, H., Iwamura, K.: Selective encryption scheme and mode to avoid generating marker codes in JPEG2000 code streams with block cipher. In: Proceedings of IEEE WAINA, pp. 593–600 (2011)
Kiya, H., Imaizumi, S.: Partial-scrambling of image encoded using JPEG2000 without generating marker codes. In: Proceedings of IEEE ICIP, pp. III-205–III-208 (2003)
Wu, H., Ma, D.: Efficient and sucure encryption schemes for JPEG2000. In: Proceedings of IEEE ICASSP, pp. V-869–V-872 (2004)
IHC standard images. http://www.ieice.org/iss/emm/ihc/en/image/image.php
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Acknowledgments
This work was supported by JSPS KAKENHI Grant Number 26820138.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ogasawara, T., Imaizumi, S., Aoki, N. (2015). Scalable Tamper Detection and Localization Scheme for JPEG2000 Codestreams. In: Ho, YS., Sang, J., Ro, Y., Kim, J., Wu, F. (eds) Advances in Multimedia Information Processing -- PCM 2015. PCM 2015. Lecture Notes in Computer Science(), vol 9315. Springer, Cham. https://doi.org/10.1007/978-3-319-24078-7_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-24078-7_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24077-0
Online ISBN: 978-3-319-24078-7
eBook Packages: Computer ScienceComputer Science (R0)