Skip to main content


Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability

Article metrics

  • 1293 Accesses


A novel syntax-compliant encryption primitive and an efficient syntax-compliant JPEG 2000 encryption scheme are presented in this paper. The syntax-compliant encryption primitive takes, as input, syntax-compliant plaintext and produces syntax-compliant ciphertext. It is faster than all the other syntax-compliant encryption primitives we know. Our JPEG 2000 encryption scheme encrypts independently either each codeblock segment (normal mode) or each intersection of a codeblock segment and a codeblock contribution to a packet (in situ mode). Truncation-invariant parameters uniquely identifying each independently encrypted data block are combined with a global initialization vector to generate on the fly an initialization vector (IV) used to encrypt the data block. These IVs can be correctly regenerated even when the encrypted codestream is truncated. Encrypted codestreams are syntax-compliant. The original granularity of scalability is fully preserved after encryption so that an encrypted codestream can be truncated to adapt to different representations without decryption. Our JPEG 2000 encryption scheme is fast, error-resilient, and has negligible file-size overhead.



  1. 1.

    ISO/IEC : Information Technology—JPEG 2000 Image Coding System, Part 1: Core Coding System. 2000. ISO/IEC 15444-1:2000 (ISO/IEC JTC/SC 29/WG 1 N1646R

  2. 2.

    ISO/IEC : JPEG2000 verification model 8.5 (technical description). 2000. ISO/IEC JTC 1/SC 29/WG 1 N187

  3. 3.

    ISO/IEC : JPSEC commission draft 2.0. 2004. ISO/IEC/JTC 1/SC29/WG 1, N339

  4. 4.

    Dufaux F, Wee S, Apostolopoulos J, Ebrahimi T: JPSEC for secure imaging in JPEG 2000. Applications of Digital Image Processing XXVII, August 2004, Denver, Colo, USA, Proceedings of SPIE 5558: 319-330.

  5. 5.

    Zhu BB, Swanson MD, Li S: Encryption and authentication for scalable multimedia: current state of the art and challenges. Internet Multimedia Management Systems V, October 2004, Philadelphia, Pa, USA, Proceedings of SPIE 5601: 157-170.

  6. 6.

    Zhu BB: Multimedia encryption. In Multimedia Security Technologies for Digital Rights Management. Edited by: Zeng W, Yu H, Lin C-Y. Elsevier, London, UK; 2006: chapter 75-109. chapter

  7. 7.

    Dang PP, Chau PM: Image encryption for secure Internet multimedia applications. IEEE Transactions on Consumer Electronics 2000, 46(3):395-403. 10.1109/30.883383

  8. 8.

    National Bureau of Standards : Data Encryption Standard. 1977. NBS FIPS Pub. 4

  9. 9.

    Grosbois R, Gerbelot P, Ebrahimi T: Authentication and access control in the JPEG 2000 compressed domain. Applications of Digital Image Processing XXIV, July 2001, San Diego, Calif, USA, Proceedings of SPIE 4472: 95-104.

  10. 10.

    Wee S, Apostolopoulos J: Secure scalable streaming and secure transcoding with JPEG-2000. Proceedings of IEEE International Conference on Image Processing (ICIP '03), September 2003, Barcelona, Spain 1: 205-208.

  11. 11.

    Wu H, Ma D: Efficient and secure encryption schemes for JPEG2000. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '04), May 2004, Montreal, Quebec, Canada 5: 869-872.

  12. 12.

    Wu Y, Deng RH: Compliant encryption of JPEG2000 codestreams. Proceedings of the International Conference on Image Processing (ICIP '04), October 2004, Singapore 5: 3439-3442.

  13. 13.

    Watanabe O, Nakazaki A, Kiya H: A scalable encryption method allowing backward compatibility with JPEG2000 images. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '05), May 2005, Kobe, Japan 6: 6324-6327.

  14. 14.

    Fang J, Sun J: Compliant encryption scheme for JPEG 2000 image code streams. Journal of Electronic Imaging 2006, 15(4):4 pages.

  15. 15.

    Zhu BB, Yang Y, Li S: JPEG 2000 encryption enabling fine granularity scalability without decryption. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '05), May 2005, Kobe, Japan 6: 6304-6307.

  16. 16.

    Zhu BB, Yang Y, Li S: JPEG 2000 syntax-compliant encryption preserving full scalability. Proceedings of IEEE International Conference on Image Processing (ICIP '05), September 2005, Genova, Italy 3: 636-639.

  17. 17.

    Zhu BB, Yang Y, Chen CW, Li S: Fine granularity scalability encryption of MPEG-4 FGS bitstreams. Proceedings of 7th IEEE Workshop on Multimedia Signal Processing (MMSP '05), October 2005, Shanghai, China 1-4.

  18. 18.

    Taubman DS: High performance scalable image compression with EBCOT. Proceedings of International Conference on Image Processing (ICIP '99), October 1999, Kobe, Japan 3: 344-348.

  19. 19.

    Taubman DS: JPEG2000 Image Compression: Fundamentals, Standards and Practice. Kluwer Academic, Dordrecht, The Netherlands; 2001.

  20. 20.

    Acharya T, Tsai PS: JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures. John Wiley & Sons, New York, NY, USA; 2005.

  21. 21.

    A C++ implementation of the Ciphertext Switching Encryption (CSE),

  22. 22.

    Bellare M, Rogaway P: Introduction to Modern Cryptography. chapter 4, Symmetric Encryption,

  23. 23.


  24. 24.


  25. 25.

    Schneier B: Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd edition. John Wiley & Sons, New York, NY, USA; 1996.

Download references

Author information

Correspondence to Yang Yang or Bin B. Zhu.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and Permissions

About this article


  • Normal Mode
  • Encryption Scheme
  • Data Block
  • Data Security
  • Initialization Vector