On JPEG2000 Error Concealment Attacks

  • Thomas Stütz
  • Andreas Uhl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5414)

Abstract

In this work, JPEG2000 error resilience options and error concealment strategies are discussed and evaluated. Error resilience options and error concealment strategies have been employed to mimic attacks against selective / partial JPEG2000 encryption schemes. Thus the security evaluation of these selective / partial encryption schemes relies on the proper working of the JPEG2000 error concealment. Recommendations for JPEG2000 encryption given in previous work have to be reassessed on the basis of our results. Improvements to the error concealment code of the JPEG2000 reference software JJ2000 are presented.

Keywords

Encryption Scheme Predictable Termination Compression Performance Error Concealment Packet Header 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Furht, B., Muharemagic, E., Socek, D.: Multimedia Encryption and Watermarking. Multimedia Systems and Applications, vol. 28. Springer, Heidelberg (2005)MATHGoogle Scholar
  2. 2.
    Uhl, A., Pommer, A.: Image and Video Encryption. From Digital Rights Management to Secured Personal Communication. Advances in Information Security, vol. 15. Springer, Heidelberg (2005)MATHGoogle Scholar
  3. 3.
    ISO/IEC 15444-8: Information technology – JPEG2000 image coding system, Part 8: Secure JPEG2000 (April 2007)Google Scholar
  4. 4.
    Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG2000 compressed domain. In: Tescher, A. (ed.) Applications of Digital Image Processing XXIV, San Diego, CA, USA. Proceedings of SPIE, vol. 4472, pp. 95–104 (July 2001)Google Scholar
  5. 5.
    Kiya, H., Imaizumi, D., Watanabe, O.: Partial-scrambling of image encoded using JPEG2000 without generating marker codes. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2003), Barcelona, Spain, September 2003, vol. III, pp. 205–208 (2003)Google Scholar
  6. 6.
    Wu, Y., Deng, R.H.: Compliant encryption of JPEG2000 codestreams. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2004), Singapore, October 2004, IEEE Computer Society Press, Los Alamitos (2004)Google Scholar
  7. 7.
    Wu, H., Ma, D.: Efficient and secure encryption schemes for JPEG2000. In: Proceedings of the 2004 International Conference on Acoustics, Speech and Signal Processing (ICASSP 2004), pp. 869–872 (May 2004)Google Scholar
  8. 8.
    Zhu, B., Yang, Y., Li, S.: JPEG2000 syntax-compliant encryption preserving full scalability. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2005), vol. 3 (September 2005)Google Scholar
  9. 9.
    Fang, J., Sun, J.: Compliant encryption scheme for JPEG2000 image code streams. Journal of Electronic Imaging 15(4) (2006)Google Scholar
  10. 10.
    Stütz, T., Uhl, A.: On format-compliant iterative encryption of JPEG2000. In: Proceedings of the Eighth IEEE International Symposium on Multimedia (ISM 2006), pp. 985–990. IEEE Computer Society, Los Alamitos (2006)CrossRefGoogle Scholar
  11. 11.
    Engel, D., Stütz, T., Uhl, A.: Format-compliant JPEG2000 encryption in JPSEC: Security, applicability and the impact of compression parameters. EURASIP Journal on Information Security (Article ID 94565), 20 pages (2007), doi:10.1155/2007/94565Google Scholar
  12. 12.
    Yang, Y., Zhu, B.B., Yang, Y., Li, S., Yu, N.: Efficient and syntax-compliant JPEG2000 encryption preserving original fine granularity of scalability. EURASIP Journal on Information Security (2007)Google Scholar
  13. 13.
    Said, A.: Measuring the strength of partial encryption schemes. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2005), vol. 2 (September 2005)Google Scholar
  14. 14.
    Moccagatta, I., Soudagar, S., Liang, J., Chen, H.: Error resilient coding in JPEG2000 and MPEG-4. IEEE Journals of Selected Areas in Communications 18(6) (June 2000)Google Scholar
  15. 15.
    Dufaux, F., Ebrahimi, T.: Error-Resilient Video Coding Performance Analysis of Motion JPEG2000 and MPEG-4. In: Proceedings of Visual Communications and Image Processing, VCIP 2004. Motion analysis and image sequence processing, SPIE (2004)Google Scholar
  16. 16.
    ISO/IEC 15444-5: Information technology – JPEG2000 image coding system, Part 5: Reference software (November 2003)Google Scholar
  17. 17.
    Taubman, D., Marcellin, M.: JPEG2000 — Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Dordrecht (2002)CrossRefGoogle Scholar
  18. 18.
    ISO/IEC 15444-1: Information technology – JPEG2000 image coding system, Part 1: Core coding system (December 2000)Google Scholar
  19. 19.
    Mao, Y., Wu, M.: Security evaluation for communication-friendly encryption of multimedia. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2004), Singapore. IEEE Signal Processing Society, Los Alamitos (October 2004)Google Scholar
  20. 20.
    Dufaux, F., Baruffa, G., Frescura, F., Nicholson, D.: JPWL - an Extension of JPEG2000 for Wireless Imaging. In: Proceedings of IEEE Int. Symp. on Circuits and Systems, ISCAS 2006. IEEE, Los Alamitos (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Thomas Stütz
    • 1
  • Andreas Uhl
    • 1
  1. 1.Department of Computer SciencesUniversity of SalzburgSalzburgAustria

Personalised recommendations