Skip to main content

Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability

Abstract

A novel syntax-compliant encryption primitive and an efficient syntax-compliant JPEG 2000 encryption scheme are presented in this paper. The syntax-compliant encryption primitive takes, as input, syntax-compliant plaintext and produces syntax-compliant ciphertext. It is faster than all the other syntax-compliant encryption primitives we know. Our JPEG 2000 encryption scheme encrypts independently either each codeblock segment (normal mode) or each intersection of a codeblock segment and a codeblock contribution to a packet (in situ mode). Truncation-invariant parameters uniquely identifying each independently encrypted data block are combined with a global initialization vector to generate on the fly an initialization vector (IV) used to encrypt the data block. These IVs can be correctly regenerated even when the encrypted codestream is truncated. Encrypted codestreams are syntax-compliant. The original granularity of scalability is fully preserved after encryption so that an encrypted codestream can be truncated to adapt to different representations without decryption. Our JPEG 2000 encryption scheme is fast, error-resilient, and has negligible file-size overhead.

[12345678910111213141516171819202122232425]

References

  1. ISO/IEC : Information Technology—JPEG 2000 Image Coding System, Part 1: Core Coding System. 2000. ISO/IEC 15444-1:2000 (ISO/IEC JTC/SC 29/WG 1 N1646R

  2. ISO/IEC : JPEG2000 verification model 8.5 (technical description). 2000. ISO/IEC JTC 1/SC 29/WG 1 N187

  3. ISO/IEC : JPSEC commission draft 2.0. 2004. ISO/IEC/JTC 1/SC29/WG 1, N339

  4. Dufaux F, Wee S, Apostolopoulos J, Ebrahimi T: JPSEC for secure imaging in JPEG 2000. Applications of Digital Image Processing XXVII, August 2004, Denver, Colo, USA, Proceedings of SPIE 5558: 319-330.

    Article  Google Scholar 

  5. Zhu BB, Swanson MD, Li S: Encryption and authentication for scalable multimedia: current state of the art and challenges. Internet Multimedia Management Systems V, October 2004, Philadelphia, Pa, USA, Proceedings of SPIE 5601: 157-170.

    Article  Google Scholar 

  6. Zhu BB: Multimedia encryption. In Multimedia Security Technologies for Digital Rights Management. Edited by: Zeng W, Yu H, Lin C-Y. Elsevier, London, UK; 2006: chapter 75-109. chapter

    Chapter  Google Scholar 

  7. Dang PP, Chau PM: Image encryption for secure Internet multimedia applications. IEEE Transactions on Consumer Electronics 2000, 46(3):395-403. 10.1109/30.883383

    Article  Google Scholar 

  8. National Bureau of Standards : Data Encryption Standard. 1977. NBS FIPS Pub. 4

    Google Scholar 

  9. Grosbois R, Gerbelot P, Ebrahimi T: Authentication and access control in the JPEG 2000 compressed domain. Applications of Digital Image Processing XXIV, July 2001, San Diego, Calif, USA, Proceedings of SPIE 4472: 95-104.

    Article  Google Scholar 

  10. Wee S, Apostolopoulos J: Secure scalable streaming and secure transcoding with JPEG-2000. Proceedings of IEEE International Conference on Image Processing (ICIP '03), September 2003, Barcelona, Spain 1: 205-208.

    Google Scholar 

  11. Wu H, Ma D: Efficient and secure encryption schemes for JPEG2000. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '04), May 2004, Montreal, Quebec, Canada 5: 869-872.

    MathSciNet  Google Scholar 

  12. Wu Y, Deng RH: Compliant encryption of JPEG2000 codestreams. Proceedings of the International Conference on Image Processing (ICIP '04), October 2004, Singapore 5: 3439-3442.

    Google Scholar 

  13. Watanabe O, Nakazaki A, Kiya H: A scalable encryption method allowing backward compatibility with JPEG2000 images. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '05), May 2005, Kobe, Japan 6: 6324-6327.

    Google Scholar 

  14. Fang J, Sun J: Compliant encryption scheme for JPEG 2000 image code streams. Journal of Electronic Imaging 2006, 15(4):4 pages.

    Article  Google Scholar 

  15. Zhu BB, Yang Y, Li S: JPEG 2000 encryption enabling fine granularity scalability without decryption. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '05), May 2005, Kobe, Japan 6: 6304-6307.

    Article  Google Scholar 

  16. Zhu BB, Yang Y, Li S: JPEG 2000 syntax-compliant encryption preserving full scalability. Proceedings of IEEE International Conference on Image Processing (ICIP '05), September 2005, Genova, Italy 3: 636-639.

    Google Scholar 

  17. Zhu BB, Yang Y, Chen CW, Li S: Fine granularity scalability encryption of MPEG-4 FGS bitstreams. Proceedings of 7th IEEE Workshop on Multimedia Signal Processing (MMSP '05), October 2005, Shanghai, China 1-4.

    Google Scholar 

  18. Taubman DS: High performance scalable image compression with EBCOT. Proceedings of International Conference on Image Processing (ICIP '99), October 1999, Kobe, Japan 3: 344-348.

    Article  Google Scholar 

  19. Taubman DS: JPEG2000 Image Compression: Fundamentals, Standards and Practice. Kluwer Academic, Dordrecht, The Netherlands; 2001.

    Google Scholar 

  20. Acharya T, Tsai PS: JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures. John Wiley & Sons, New York, NY, USA; 2005.

    Book  Google Scholar 

  21. A C++ implementation of the Ciphertext Switching Encryption (CSE), http://research.microsoft.com/~binzhu/codes/CSE/

  22. Bellare M, Rogaway P: Introduction to Modern Cryptography. chapter 4, Symmetric Encryption, http://www.cse.ucsd.edu/~mihir/cse207/classnotes.html

  23. JasPer http://www.ece.uvic.ca/~mdadams/jasper/

  24. Crypto++ http://www.eskimo.com/~weidai/cryptlib.html

  25. Schneier B: Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd edition. John Wiley & Sons, New York, NY, USA; 1996.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yang Yang or Bin B. Zhu.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Yang, Y., Zhu, B.B., Li, S. et al. Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability. EURASIP J. on Info. Security 2007, 056365 (2008). https://doi.org/10.1155/2007/56365

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1155/2007/56365

Keywords