Selective Encryption Techniques of JPEG2000 Codestream for Medical Images Transmission

نویسندگان

  • ZAHIA BRAHIMI
  • HAMID BESSALAH
  • A. TARABET
  • M. K. KHOLLADI
چکیده

In this paper, novel selective encryption image schemes based on JPEG2000 are proposed. The first one encrypts only the code-blocks corresponding to some sensitive precincts. In order to improve the security level we introduce the permutation of codeblocks contributing in the selected precincts. The idea of combining permutation and selective encryption is used in order to minimize the amount of processed data encryption while ensuring the best possible degradation through the permutation. Many of proposals format compliant encryption schemes for JPEG2000 that have been made encrypt packet body data, but leave header packet in plaintext. The second approach, combines code-blocks data encryption to a cyclic permutation of all packets headers in the bitstream. Actually, in the JPEG2000 codestream, packet header information is specific to the visual content, and it is can be used as a fingerprint of the codestream. Symmetric encryption AES with CFB mode is used to encrypt in the two schemes. The proposed schemes don’t introduce superfluous JPEG2000 markers in the protected codestream, i.e, its format is compliant to JPEG2000 codestream one. It keeps file format and compression ratio unchanged and doesn’t degrade the original error robustness. The proposed scheme works with any standard ciphers and introduces negligible computational cost. Key-Words: Communication system security, JPEG2000 Compression, Selective Encryption, permutation, medical images, Computer applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An encryption scheme for JPEG2000 codestream based on packets header information and data encryption for confidentential medical images transmission

In this paper, a novel selective encryption scheme for JPEG2000 codestream is proposed. Many of proposals format compliant encryption schemes for JPEG2000 that have been made encrypt packet body data, but leave header packet in plaintext. Our proposed scheme encrypts code-blocks data corresponding to some sensitive precincts. This encryption is combined to a cyclic permutation of all packets he...

متن کامل

Enhanced JPEG2000 Quality Scalability through Block-Wise Layer Truncation

Quality scalability is an important feature of image and video coding systems. In JPEG2000, quality scalability is achieved through the use of quality layers that are formed in the encoder through rate-distortion optimization techniques. Quality layers provide optimal rate-distortion representations of the image when the codestream is transmitted and/or decoded at layer boundaries. Nonetheless,...

متن کامل

Architectures of DICOM based PACS for JPEG2000 medical image streaming

Delivering of medical image content to mobile/embedded devices with low storage and processing capabilities and low resolution displays is a challenging, but important task for achieving ubiquitous computing in modern hospital environments. The common approaches in industry and technical literature employ JPEG2000 compression and image streaming. Beside image compression, JPEG2000 facilitates i...

متن کامل

Visually Lossless Compression Based on Jpeg2000 for Efficient Transmission of High Resolution Color Aerial Images

Aerial image collections have experienced exponential growth in size in recent years. These high resolution images are often viewed at a variety of scales. When an image is displayed at reduced scale, maximum quantization step sizes for visually lossless quality become larger. However, previous visually lossless coding algorithms quantize the image with a single set of quantization step sizes, ...

متن کامل

Singular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images

In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008