Skip to main content

A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams

  • Conference paper
Book cover Advances in Multimedia Modeling (MMM 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5371))

Included in the following conference series:

Abstract

Direct encryption for the JPEG2000 code-streams by using a conventional block cipher needs an additional processing time, whereas the joint compression and encryption schemes increase the coding efficiency but with some sacrifices in security. In this paper, a Dually Randomized MQ coder (DRMQ) is presented to support both compression and encryption functionalities, and to achieve tradeoff between security and efficiency. The proposed DRMQ coder avoids the permutations of input/output bits to enhance security. It makes use of a dual randomization to provide more protected results. Furthermore, we show that the DRMQ coder can be combined with a format compliant header encryption algorithm to achieve a fast and full protection of JPEG2000 code-streams. The experimental results confirm the efficiency and encryption performance of our scheme.

This work was supported by the Korea Science and Engineering Foundation(KOSEF) grant funded by the Korea government(MOST) (No. R01-2006-00-10260-0).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Engel, D., Stütz, T., Uhl, A.: Format-compliant JPEG2000 Encryption in JPSEC: Security, Applicability and the Impact of Compression Parameters. EURASIP Journal on Information Security, Article ID 94565 (2007)

    Google Scholar 

  2. Engel, D., Stütz, T., Uhl, A.: Format-Compliant JPEG2000 Encryption with Combined Packet Header and Packet Body Protection. In: Multimedia and Security Workshop, ACM Multimedia, pp. 87–95 (2007)

    Google Scholar 

  3. Grangetto, M., Magli, E., Olmo, G.: Multimedia Selective Encryption by Means of Randomized Arithmetic Coding. IEEE Transactions on Multimedia 8(5), 905–917 (2006)

    Article  Google Scholar 

  4. Grangetto, M., Magli, E., Olmo, G.: A Syntax-preserving Error Resilience Tool for JPEG2000 Based on Error Correcting Arithmetic Coding. IEEE Transactions on Image processing 15(4), 807–818 (2006)

    Article  Google Scholar 

  5. Jakimoski, G., Subbalakshmi, K.P.: Cryptanalysis of Some Multimedia Encryption Schemes. IEEE Transactions on Multimedia 10(3), 330–338 (2008)

    Article  Google Scholar 

  6. Kim, H., Wen, J., Villasenor, J.D.: Secure Arithmetic Coding. IEEE Transactions on Signal processing 55(5), 2263–2272 (2007)

    Article  MathSciNet  Google Scholar 

  7. Lian, S., Sun, J., Zhang, D., Wang, Z.: A Selective Image Encryption Scheme Based on JPEG2000 Codec. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3332, pp. 65–72. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Norcen, R., Uhl, A.: Selective Encryption of the JPEG2000 Bitstream. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 194–204. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Said, A.: Measuring the Strength of Partial Encryption Schemes. In: IEEE International Conference on Image Processing (ICIP), pp. 1126–1129 (2005)

    Google Scholar 

  10. Taubman, D., Marcellin, M.: JPEG2000 Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Boston (2002)

    Book  Google Scholar 

  11. Wen, J., Kim, H., Villasenor, J.D.: Binary Arithmetic Coding with Key-based Interval Splitting. IEEE Signal Processing Letters 13(2), 69–72 (2006)

    Article  Google Scholar 

  12. Wu, Y., Deng, R.H.: Compliant Encryption of JPEG2000 Codestreams. In: IEEE International Conference on Image Processing, pp. 3439–3442 (2004)

    Google Scholar 

  13. Wu, C.P., Kuo, C.C.J.: Design of Integrated Multimedia Compression and Encryption Systems. IEEE Transactions on Multimedia 7(5), 828–839 (2005)

    Article  Google Scholar 

  14. JJ2000-Java Implementation of JPEG2000, http://jpeg2000.epfl.ch/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ou, Y., Sur, C., Rhee, K.H. (2009). A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams. In: Huet, B., Smeaton, A., Mayer-Patel, K., Avrithis, Y. (eds) Advances in Multimedia Modeling . MMM 2009. Lecture Notes in Computer Science, vol 5371. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92892-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-92892-8_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-92891-1

  • Online ISBN: 978-3-540-92892-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics