Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability
نویسندگان
چکیده
A novel syntax-compliant encryption primitive and an efficient syntax-compliant JPEG 2000 encryption scheme are presented in this paper. The syntax-compliant encryption primitive takes, as input, syntax-compliant plaintext and produces syntax-compliant ciphertext. It is faster than all the other syntax-compliant encryption primitives we know. Our JPEG 2000 encryption scheme encrypts independently either each codeblock segment (normal mode) or each intersection of a codeblock segment and a codeblock contribution to a packet (in situ mode). Truncation-invariant parameters uniquely identifying each independently encrypted data block are combined with a global initialization vector to generate on the fly an initialization vector (IV) used to encrypt the data block. These IVs can be correctly regenerated even when the encrypted codestream is truncated. Encrypted codestreams are syntax-compliant. The original granularity of scalability is fully preserved after encryption so that an encrypted codestream can be truncated to adapt to different representations without decryption. Our JPEG 2000 encryption scheme is fast, error-resilient, and has negligible file-size overhead.
منابع مشابه
Encryption and Authentication for Scalable Multimedia: Current State of the Art and Challenges
Scalable coding is a technology that encodes a multimedia signal in a scalable manner where various representations can be extracted from a single codestream to fit a wide range of applications. Many new scalable coders such as JPEG 2000 and MPEG-4 FGS offer fine granularity scalability to provide near continuous optimal tradeoff between quality and rates in a large range. This fine granularity...
متن کاملCompliant Asymmetric Authenticated Encryption Scheme for JPEG2000 Code-streams
The JPEG2000 syntax requires that any two consecutive bytes in the encrypted packet body should not be larger than 0xFF8F. This stringent requirement has plagued researchers for a few years. In this paper, we present a novel secure encryption and authentication scheme for JPEG2000 code-streams, which does not introduce superfluous JPEG2000 markers in the protected code-stream. The scheme achiev...
متن کاملEfficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking
In this work an efficient format-compliant encryption approach for regular languages is proposed, block-based cycle-walking. The approach can transparently trade-off security for efficiency and can be adjusted to the desired level of security. The relationship between the encryption of regular languages and the encryption of JPEG2000 bitstreams is established. Block-based cycle-walking for the ...
متن کاملAn Efficient Fine Granularity Scalable Coding Scheme Using Adaptive Leaky Prediction
In this paper, we propose a novel method, which makes use of the advantages of bit-plane coding technique of Fine Granularity Scalability (FGS) video coding scheme, and applies adaptive leaky factors for the enhancement layer prediction to further improve the coding efficiency. A flexible method that can dynamically determine the leaky factor values is also presented. Experimental results show ...
متن کاملMerging images in JPEG2000-domain
Compressed images are often understood as static and indivisible objects. With the advent of scalable compression schemes including JPEG2000 and some modes of the JPEG standard, compressed images may be usefully accessed at reduced quality, resolution, or in selected spatial regions. Nevertheless, the original image remains unchanged. In this paper we are concerned with interactively editing sc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Information Security
دوره 2007 شماره
صفحات -
تاریخ انتشار 2007