A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams

  • Yang Ou
  • Chul Sur
  • Kyung Hyune Rhee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5371)

Abstract

Direct encryption for the JPEG2000 code-streams by using a conventional block cipher needs an additional processing time, whereas the joint compression and encryption schemes increase the coding efficiency but with some sacrifices in security. In this paper, a Dually Randomized MQ coder (DRMQ) is presented to support both compression and encryption functionalities, and to achieve tradeoff between security and efficiency. The proposed DRMQ coder avoids the permutations of input/output bits to enhance security. It makes use of a dual randomization to provide more protected results. Furthermore, we show that the DRMQ coder can be combined with a format compliant header encryption algorithm to achieve a fast and full protection of JPEG2000 code-streams. The experimental results confirm the efficiency and encryption performance of our scheme.

Keywords

JPEG2000 Joint Compression and Encryption Arithmetic Coding Packet Header Encryption 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Engel, D., Stütz, T., Uhl, A.: Format-compliant JPEG2000 Encryption in JPSEC: Security, Applicability and the Impact of Compression Parameters. EURASIP Journal on Information Security, Article ID 94565 (2007)Google Scholar
  2. 2.
    Engel, D., Stütz, T., Uhl, A.: Format-Compliant JPEG2000 Encryption with Combined Packet Header and Packet Body Protection. In: Multimedia and Security Workshop, ACM Multimedia, pp. 87–95 (2007)Google Scholar
  3. 3.
    Grangetto, M., Magli, E., Olmo, G.: Multimedia Selective Encryption by Means of Randomized Arithmetic Coding. IEEE Transactions on Multimedia 8(5), 905–917 (2006)CrossRefGoogle Scholar
  4. 4.
    Grangetto, M., Magli, E., Olmo, G.: A Syntax-preserving Error Resilience Tool for JPEG2000 Based on Error Correcting Arithmetic Coding. IEEE Transactions on Image processing 15(4), 807–818 (2006)CrossRefGoogle Scholar
  5. 5.
    Jakimoski, G., Subbalakshmi, K.P.: Cryptanalysis of Some Multimedia Encryption Schemes. IEEE Transactions on Multimedia 10(3), 330–338 (2008)CrossRefGoogle Scholar
  6. 6.
    Kim, H., Wen, J., Villasenor, J.D.: Secure Arithmetic Coding. IEEE Transactions on Signal processing 55(5), 2263–2272 (2007)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Lian, S., Sun, J., Zhang, D., Wang, Z.: A Selective Image Encryption Scheme Based on JPEG2000 Codec. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3332, pp. 65–72. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Norcen, R., Uhl, A.: Selective Encryption of the JPEG2000 Bitstream. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 194–204. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. 9.
    Said, A.: Measuring the Strength of Partial Encryption Schemes. In: IEEE International Conference on Image Processing (ICIP), pp. 1126–1129 (2005)Google Scholar
  10. 10.
    Taubman, D., Marcellin, M.: JPEG2000 Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Boston (2002)CrossRefGoogle Scholar
  11. 11.
    Wen, J., Kim, H., Villasenor, J.D.: Binary Arithmetic Coding with Key-based Interval Splitting. IEEE Signal Processing Letters 13(2), 69–72 (2006)CrossRefGoogle Scholar
  12. 12.
    Wu, Y., Deng, R.H.: Compliant Encryption of JPEG2000 Codestreams. In: IEEE International Conference on Image Processing, pp. 3439–3442 (2004)Google Scholar
  13. 13.
    Wu, C.P., Kuo, C.C.J.: Design of Integrated Multimedia Compression and Encryption Systems. IEEE Transactions on Multimedia 7(5), 828–839 (2005)CrossRefGoogle Scholar
  14. 14.
    JJ2000-Java Implementation of JPEG2000, http://jpeg2000.epfl.ch/

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Yang Ou
    • 1
  • Chul Sur
    • 2
  • Kyung Hyune Rhee
    • 3
  1. 1.Department of Information SecurityPukyong National UniversityBusanRepublic of Korea
  2. 2.Department of Computer SciencePukyong National UniversitySouth Korea
  3. 3.Division of Electronic, Computer and Telecommunication EngineeringPukyong National UniversitySouth Korea

Personalised recommendations