Open Access

Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability

EURASIP Journal on Information Security20082007:056365

DOI: 10.1155/2007/56365

Received: 29 June 2007

Accepted: 23 November 2007

Published: 21 February 2008

Abstract

A novel syntax-compliant encryption primitive and an efficient syntax-compliant JPEG 2000 encryption scheme are presented in this paper. The syntax-compliant encryption primitive takes, as input, syntax-compliant plaintext and produces syntax-compliant ciphertext. It is faster than all the other syntax-compliant encryption primitives we know. Our JPEG 2000 encryption scheme encrypts independently either each codeblock segment (normal mode) or each intersection of a codeblock segment and a codeblock contribution to a packet (in situ mode). Truncation-invariant parameters uniquely identifying each independently encrypted data block are combined with a global initialization vector to generate on the fly an initialization vector (IV) used to encrypt the data block. These IVs can be correctly regenerated even when the encrypted codestream is truncated. Encrypted codestreams are syntax-compliant. The original granularity of scalability is fully preserved after encryption so that an encrypted codestream can be truncated to adapt to different representations without decryption. Our JPEG 2000 encryption scheme is fast, error-resilient, and has negligible file-size overhead.

[12345678910111213141516171819202122232425]

Authors’ Affiliations

(1)
Department of Electrical Engineering and Information Science, University of Science and Technology of China
(2)
Microsoft Research Asia

References

  1. ISO/IEC : Information Technology—JPEG 2000 Image Coding System, Part 1: Core Coding System. 2000. ISO/IEC 15444-1:2000 (ISO/IEC JTC/SC 29/WG 1 N1646RGoogle Scholar
  2. ISO/IEC : JPEG2000 verification model 8.5 (technical description). 2000. ISO/IEC JTC 1/SC 29/WG 1 N187Google Scholar
  3. ISO/IEC : JPSEC commission draft 2.0. 2004. ISO/IEC/JTC 1/SC29/WG 1, N339Google Scholar
  4. Dufaux F, Wee S, Apostolopoulos J, Ebrahimi T: JPSEC for secure imaging in JPEG 2000. Applications of Digital Image Processing XXVII, August 2004, Denver, Colo, USA, Proceedings of SPIE 5558: 319-330.View ArticleGoogle Scholar
  5. Zhu BB, Swanson MD, Li S: Encryption and authentication for scalable multimedia: current state of the art and challenges. Internet Multimedia Management Systems V, October 2004, Philadelphia, Pa, USA, Proceedings of SPIE 5601: 157-170.View ArticleGoogle Scholar
  6. Zhu BB: Multimedia encryption. In Multimedia Security Technologies for Digital Rights Management. Edited by: Zeng W, Yu H, Lin C-Y. Elsevier, London, UK; 2006: chapter 75-109. chapterView ArticleGoogle Scholar
  7. Dang PP, Chau PM: Image encryption for secure Internet multimedia applications. IEEE Transactions on Consumer Electronics 2000, 46(3):395-403. 10.1109/30.883383View ArticleGoogle Scholar
  8. National Bureau of Standards : Data Encryption Standard. 1977. NBS FIPS Pub. 4Google Scholar
  9. Grosbois R, Gerbelot P, Ebrahimi T: Authentication and access control in the JPEG 2000 compressed domain. Applications of Digital Image Processing XXIV, July 2001, San Diego, Calif, USA, Proceedings of SPIE 4472: 95-104.View ArticleGoogle Scholar
  10. Wee S, Apostolopoulos J: Secure scalable streaming and secure transcoding with JPEG-2000. Proceedings of IEEE International Conference on Image Processing (ICIP '03), September 2003, Barcelona, Spain 1: 205-208.Google Scholar
  11. Wu H, Ma D: Efficient and secure encryption schemes for JPEG2000. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '04), May 2004, Montreal, Quebec, Canada 5: 869-872.MathSciNetGoogle Scholar
  12. Wu Y, Deng RH: Compliant encryption of JPEG2000 codestreams. Proceedings of the International Conference on Image Processing (ICIP '04), October 2004, Singapore 5: 3439-3442.Google Scholar
  13. Watanabe O, Nakazaki A, Kiya H: A scalable encryption method allowing backward compatibility with JPEG2000 images. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '05), May 2005, Kobe, Japan 6: 6324-6327.Google Scholar
  14. Fang J, Sun J: Compliant encryption scheme for JPEG 2000 image code streams. Journal of Electronic Imaging 2006, 15(4):4 pages.View ArticleGoogle Scholar
  15. Zhu BB, Yang Y, Li S: JPEG 2000 encryption enabling fine granularity scalability without decryption. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '05), May 2005, Kobe, Japan 6: 6304-6307.View ArticleGoogle Scholar
  16. Zhu BB, Yang Y, Li S: JPEG 2000 syntax-compliant encryption preserving full scalability. Proceedings of IEEE International Conference on Image Processing (ICIP '05), September 2005, Genova, Italy 3: 636-639.Google Scholar
  17. Zhu BB, Yang Y, Chen CW, Li S: Fine granularity scalability encryption of MPEG-4 FGS bitstreams. Proceedings of 7th IEEE Workshop on Multimedia Signal Processing (MMSP '05), October 2005, Shanghai, China 1-4.Google Scholar
  18. Taubman DS: High performance scalable image compression with EBCOT. Proceedings of International Conference on Image Processing (ICIP '99), October 1999, Kobe, Japan 3: 344-348.View ArticleGoogle Scholar
  19. Taubman DS: JPEG2000 Image Compression: Fundamentals, Standards and Practice. Kluwer Academic, Dordrecht, The Netherlands; 2001.Google Scholar
  20. Acharya T, Tsai PS: JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures. John Wiley & Sons, New York, NY, USA; 2005.View ArticleGoogle Scholar
  21. A C++ implementation of the Ciphertext Switching Encryption (CSE), http://research.microsoft.com/~binzhu/codes/CSE/
  22. Bellare M, Rogaway P: Introduction to Modern Cryptography. chapter 4, Symmetric Encryption, http://www.cse.ucsd.edu/~mihir/cse207/classnotes.html
  23. JasPer http://www.ece.uvic.ca/~mdadams/jasper/
  24. Crypto++ http://www.eskimo.com/~weidai/cryptlib.html
  25. Schneier B: Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd edition. John Wiley & Sons, New York, NY, USA; 1996.MATHGoogle Scholar

Copyright

© Yang Yang et al. 2007

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.