Skip to main content

Scalable Tamper Detection and Localization Scheme for JPEG2000 Codestreams

  • Conference paper
  • First Online:
Advances in Multimedia Information Processing -- PCM 2015 (PCM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9315))

Included in the following conference series:

  • 1782 Accesses

Abstract

We propose an efficient tamper detection scheme for JPEG2000 codestreams. The proposed scheme embeds information while maintaining the scalability function of JPEG2000 and can detect tampered layers or tampered resolution levels for each decoded image quality level. Marker codes that delimit a JPEG2000 codestream must not be generated in the body data that possesses the image information. We can prevent new marker codes from being generated when embedding information into the JPEG2000 codestream. The experimental results show that our scheme can preserve the high quality of the embedded images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wu, Y., Ma, D., Deng, R.H.: Progressive protection of JPEG2000 codestreams. In: Proceedings of IEEE ICIP, pp. V-3447–V-3450 (2004)

    Google Scholar 

  2. Schneider, M., Chang, S.-F.: Robust content based digital signature for image authentication. In: Proceedings of IEEE ICIP, pp. III-227–III-230 (1996)

    Google Scholar 

  3. Han, S., Fujiyoshi, M., Kiya, H.: A Reversible image authentication method without memorization of hiding parameters. IEICE Trans. Fundam. E92–A(10), 2572–2579 (2009)

    Article  Google Scholar 

  4. Jin, H.L., Fujiyoshi, M., Kiya, H.: Lossless data hiding in the spatial domain for high quality images. IEICE Trans. Fundam. E90–A(4), 771–777 (2007)

    Article  Google Scholar 

  5. Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  6. Tsai, C.-L., Chiang, H.-F., Fan, K.-C., Chung, C.-D.: Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Patten Recognit. 38(11), 1993–2006 (2005)

    Article  Google Scholar 

  7. Information Technology – JPEG 2000 Image Coding System - Part1: Code Coding System ISO/IEC IS-15444-1 (2004)

    Google Scholar 

  8. Taubman, D.S., Marcellin, M.W.: JPEG2000: Image Compression Fundamentals. Standards and Practice. Kluwer Academic Publishers, Norwell (2002)

    Book  Google Scholar 

  9. Ando, K., Kobayashi, H., Kiya, H.: A method for embedding binary data into JPEG2000 bit streams based on the layer structure. In: Proceedings of EURASIP EUSIPCO, pp. III-89–III-92 (2002)

    Google Scholar 

  10. Suhail, M.A., Obaidat, M.S.: On the digital watermarking in JPEG2000. In: Proceedings of IEEE ICECS, pp. II-871–II-874 (2001)

    Google Scholar 

  11. Chen, T.-S., Chen, J., Chen, J.-G.: A simple and efficient watermark technique based on JPEG 2000 Codec. Multimedi. Syst. 10(1), 16–26 (2004)

    Article  Google Scholar 

  12. Sun, Q., Chang, S.F.: A secure and robust digital signature scheme for JPEG2000 image authentication. IEEE Trans. 7(3), 480–494 (2005)

    Google Scholar 

  13. Ikeda, H., Iwamura, K.: Selective encryption scheme and mode to avoid generating marker codes in JPEG2000 code streams with block cipher. In: Proceedings of IEEE WAINA, pp. 593–600 (2011)

    Google Scholar 

  14. Kiya, H., Imaizumi, S.: Partial-scrambling of image encoded using JPEG2000 without generating marker codes. In: Proceedings of IEEE ICIP, pp. III-205–III-208 (2003)

    Google Scholar 

  15. Wu, H., Ma, D.: Efficient and sucure encryption schemes for JPEG2000. In: Proceedings of IEEE ICASSP, pp. V-869–V-872 (2004)

    Google Scholar 

  16. IHC standard images. http://www.ieice.org/iss/emm/ihc/en/image/image.php

  17. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by JSPS KAKENHI Grant Number 26820138.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Takeshi Ogasawara .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ogasawara, T., Imaizumi, S., Aoki, N. (2015). Scalable Tamper Detection and Localization Scheme for JPEG2000 Codestreams. In: Ho, YS., Sang, J., Ro, Y., Kim, J., Wu, F. (eds) Advances in Multimedia Information Processing -- PCM 2015. PCM 2015. Lecture Notes in Computer Science(), vol 9315. Springer, Cham. https://doi.org/10.1007/978-3-319-24078-7_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24078-7_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24077-0

  • Online ISBN: 978-3-319-24078-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics