Skip to main content
Log in

Scalable trusted online dissemination of JPEG2000 images

  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

An important aspect of JPEG2000 is its “compress once, decompress many ways” property [1], i.e., it allows users with different preferences, privileges or capabilities to extract various sub-images all from a single compressed image code-stream. In this paper, we present a flexible and scalable scheme to authenticate JPEG2000 images disseminated by a untrusted third-party server over open networks. The proposed scheme is fully compatible with JPEG2000 and possesses a “sign once, verify many ways” property, i.e., it allows users to verify the authenticity and integrity of different sub-images extracted from a single compressed code-stream protected with a single digital signature. Furthermore, the use of aggregated digital signatures reduces both computation and communication overhead on the user side for batch image authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Taubman, D.S., Marcellin, M.W.: JPEG2000 – Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Drodrecht (2000)

    Google Scholar 

  2. Rabbani, M., Joshi, R.: An overview of the JPEG 2000 still image compression standard. Signal Process. Image Commun. 17(1), 3–48 (2002)

    Article  Google Scholar 

  3. ISO 154447ITU-T Recommendation T.800, http://www.jpeg.org

  4. Schneier, B.: Applied Cryptography. Wiley, New York (1996)

    Google Scholar 

  5. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Google Scholar 

  6. Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG 2000 compressed domain. In: Proceedings of the SPIE 46th Annual Meeting, Applications of Digital Image Processing XXIV, vol. 4472, pp. 95–104 (2001)

  7. Lin, C.Y., Chang, S.F.: Semi-fragile watermarking for authenticating JPEG visual content. In: SPIE Security and Watermarking of Multimedia Contents II EI '00 (2000)

  8. Merkle, R.C.: A certified digital signature. In: Proceedings of Advances in Cryptology – Crypto '89. Lecture Notes on Computer Science, vol. 0435, pp. 218–238. Spriner-Verlag, Berlin Heidelberg New York (1989)

    Google Scholar 

  9. Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) Advances in Cryptology – EUROCRYPT'2003, International Association for Cryptologic Research. Lecture Notes in Computer Science 2656, pp. 401–415. Springer-Verlag, Berlin, Germany (2003)

    Google Scholar 

  10. Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G., Stubblebine, G.: Flexible authentication of XML documents. In: Proceedings of the 8th ACM conference on Computer and Communication Security, pp. 136–145 (2001)

  11. Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proceedings of the 7th USENIX Security Symposium, pp. 217–230 (1999)

  12. Goodrich, M.T., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: Proceedings of DISCEX II'01, vol. 2, pp. 1068–1083 (2001)

  13. Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic third-party data publication. In: Proceedings of the 14th IFIP WG11.3 Working Conference in Database Security. IFIP Conference Proceedings, vol. 201, pp. 101–112. Kluwer Academic Publishers, Drodrecht (2001)

  14. National Institure of Standards and Technology, Secure Hash Standard (SHS), FIPS Publication 180-1 (1995)

  15. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  16. National Institure of Standards and Technology: Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register, vol. 56, no. 169, pp. 42980–42982 (1991)

  17. Peng, C., Deng, R.H., Wu, Y., Shao, W.: A flexible and scalable authentication scheme for JPEG2000 image codestreams. In: Proceedings of the ACM Multimedia, pp. 433–441 (2003)

  18. Rivest, R., Shamir, A.: Payword and Micromint: Two simple micropayment schemes. In: Proceedings of Security Protocols Workshop, pp. 69–87 (1996)

  19. Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. NDSS 2004 (2004)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert H. Deng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Deng, R.H., Ma, D., Shao, W. et al. Scalable trusted online dissemination of JPEG2000 images. Multimedia Systems 11, 60–67 (2005). https://doi.org/10.1007/s00530-005-0190-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-005-0190-7

Keywords

Navigation