Abstract
An important aspect of JPEG2000 is its “compress once, decompress many ways” property [1], i.e., it allows users with different preferences, privileges or capabilities to extract various sub-images all from a single compressed image code-stream. In this paper, we present a flexible and scalable scheme to authenticate JPEG2000 images disseminated by a untrusted third-party server over open networks. The proposed scheme is fully compatible with JPEG2000 and possesses a “sign once, verify many ways” property, i.e., it allows users to verify the authenticity and integrity of different sub-images extracted from a single compressed code-stream protected with a single digital signature. Furthermore, the use of aggregated digital signatures reduces both computation and communication overhead on the user side for batch image authentication.
Similar content being viewed by others
References
Taubman, D.S., Marcellin, M.W.: JPEG2000 – Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Drodrecht (2000)
Rabbani, M., Joshi, R.: An overview of the JPEG 2000 still image compression standard. Signal Process. Image Commun. 17(1), 3–48 (2002)
ISO 154447ITU-T Recommendation T.800, http://www.jpeg.org
Schneier, B.: Applied Cryptography. Wiley, New York (1996)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Grosbois, R., Gerbelot, P., Ebrahimi, T.: Authentication and access control in the JPEG 2000 compressed domain. In: Proceedings of the SPIE 46th Annual Meeting, Applications of Digital Image Processing XXIV, vol. 4472, pp. 95–104 (2001)
Lin, C.Y., Chang, S.F.: Semi-fragile watermarking for authenticating JPEG visual content. In: SPIE Security and Watermarking of Multimedia Contents II EI '00 (2000)
Merkle, R.C.: A certified digital signature. In: Proceedings of Advances in Cryptology – Crypto '89. Lecture Notes on Computer Science, vol. 0435, pp. 218–238. Spriner-Verlag, Berlin Heidelberg New York (1989)
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) Advances in Cryptology – EUROCRYPT'2003, International Association for Cryptologic Research. Lecture Notes in Computer Science 2656, pp. 401–415. Springer-Verlag, Berlin, Germany (2003)
Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G., Stubblebine, G.: Flexible authentication of XML documents. In: Proceedings of the 8th ACM conference on Computer and Communication Security, pp. 136–145 (2001)
Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proceedings of the 7th USENIX Security Symposium, pp. 217–230 (1999)
Goodrich, M.T., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: Proceedings of DISCEX II'01, vol. 2, pp. 1068–1083 (2001)
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic third-party data publication. In: Proceedings of the 14th IFIP WG11.3 Working Conference in Database Security. IFIP Conference Proceedings, vol. 201, pp. 101–112. Kluwer Academic Publishers, Drodrecht (2001)
National Institure of Standards and Technology, Secure Hash Standard (SHS), FIPS Publication 180-1 (1995)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
National Institure of Standards and Technology: Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register, vol. 56, no. 169, pp. 42980–42982 (1991)
Peng, C., Deng, R.H., Wu, Y., Shao, W.: A flexible and scalable authentication scheme for JPEG2000 image codestreams. In: Proceedings of the ACM Multimedia, pp. 433–441 (2003)
Rivest, R., Shamir, A.: Payword and Micromint: Two simple micropayment schemes. In: Proceedings of Security Protocols Workshop, pp. 69–87 (1996)
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. NDSS 2004 (2004)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Deng, R.H., Ma, D., Shao, W. et al. Scalable trusted online dissemination of JPEG2000 images. Multimedia Systems 11, 60–67 (2005). https://doi.org/10.1007/s00530-005-0190-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-005-0190-7