Fig 6 - uploaded by Shoko Imaizumi
Content may be subject to copyright.
The example of proposed scramble using SNR scalability function and parameter M (scrambling position: Layer 0)  

The example of proposed scramble using SNR scalability function and parameter M (scrambling position: Layer 0)  

Source publication
Conference Paper
Full-text available
A method is described for efficient partial-scrambling of JPEG2000 images that avoids generating marker codes and improves the ability to control the degree, strength, and computational complexity of scrambling. This higher control ability is due to the use of a parameter. This parameter also controls the scrambling time, an important consideration...

Citations

... Several bitstream-based encryption methods have been proposed to solve this issue. [3][4][5][6][7] For JPEG 2000 images, bitstream-based encryption methods can maintain the same file size before and after encryption by considering the generation of special marker codes. 3,4 In contrast, for JPEG images, although bitstream-based encryption methods have also been proposed, but the convention encryption methods cannot maintain the same file size as that of original bitstreams due to the occurrence or disappearance of JPEG marker codes, 5-7 except the method that we proposed. ...
... [3][4][5][6][7] For JPEG 2000 images, bitstream-based encryption methods can maintain the same file size before and after encryption by considering the generation of special marker codes. 3,4 In contrast, for JPEG images, although bitstream-based encryption methods have also been proposed, but the convention encryption methods cannot maintain the same file size as that of original bitstreams due to the occurrence or disappearance of JPEG marker codes, 5-7 except the method that we proposed. 8,9 In those methods, in order to hold the JPEG format, encryption is carried out on the basis of byte stuffing operations, which accidentally generate markers. ...
Preprint
In this paper, we propose a proxy system with JPEG bitstream-based file-size preserving encryption to securely store compressed images in cloud environments. The proposed system, which is settled between client's device and the Internet, allows us not only to have exact the same file size as that of original JPEG streams but also to maintain a predetermined image format. In an experiment, the proposed system is verified to be effective in two cloud photo steams: Google Photo and iCloud Photo.
... The proposed scheme preserves the scalability function of JPEG2000 and can localize the tampered portion in a codestream. Furthermore, our scheme can prevent new marker codes from being generated in a JPEG2000 codestream by processing an image as well as some security techniques for JPEG2000 [13][14][15]. Marker codes that delimit a codestream should not exist within the body data of JPEG2000 packets, which contains image information. If new marker codes are generated in a codestream or existing marker codes are eliminated from a codestream, the JPEG2000 coded image cannot be decoded normally. ...
Conference Paper
Full-text available
We propose an efficient tamper detection scheme for JPEG2000 codestreams. The proposed scheme embeds information while maintaining the scalability function of JPEG2000 and can detect tampered layers or tampered resolution levels for each decoded image quality level. Marker codes that delimit a JPEG2000 codestream must not be generated in the body data that possesses the image information. We can prevent new marker codes from being generated when embedding information into the JPEG2000 codestream. The experimental results show that our scheme can preserve the high quality of the embedded images.
... However, most of the conventional works for ETC systems have no compatibility with the international standards, e.g., JPEG, JPEG 2000, etc [10][11][12][13][14][15][16]. Also, a number of perceptual encryption schemes have been studied for the international standards, but they do not correspond to ETC systems [17][18][19][20][21][22], except for the article [23]. Because of such situations, a new ETC system is proposed under the assumption of the JPEG standard. ...
... The JPEG 2000 [15] is well known as the international standard for image compression. There have been many studies related to the encryption of JPEG 2000 images [16][17][18]; however, most of these were designed for CTE systems. A new ETC system with the assumption of using the JPEG 2000 is proposed in this paper. ...
Conference Paper
Full-text available
A new Encryption-then-Compression (ETC) system for the JPEG 2000 standard is proposed in this paper. An ETC system is known as a system that makes image communication secure and efficient by using perceptual encryption and image compression. The proposed system uses the sign-scrambling and block-shuffling of discrete wavelet transform (DWT) coefficients as perceptual encryption. Unlike conventional ETC systems, the proposed system is compatible with the JPEG 2000 standard because the perceptually encrypted coefficients can be efficiently compressed by the JPEG 2000. The experimental results demonstrated that the proposed system achieved both acceptable compression performance and enough key-space for secure image communication while remaining compatible with the JPEG 2000 standard.
... Moreover, it limits the privacy protection on the image domain. Hence, partial scrambling schemes [3]- [8], in which a secure algorithm is used to scramble only part of the compressed data, has been studied. The partially scrambled images are distributed by providers using different network or storage devices. ...
Conference Paper
Full-text available
We present an efficient hierarchical scrambling scheme for palette-based images. The goal of hierarchical scrambling of a bit stream is to make the entire stream somehow difficult to decrypt. We decompose the original palette-based image into its corresponding binary bits then introduce cyclic shifts to scramble the selected entries and change their colors. The significant parameters (i.e. target pixels and target color components) play an important role in evaluating performance analysis. The scrambling scheme for the target pixels and the target color components were measured through a series of tests to measure the effectiveness of the proposed scheme. We also introduce an efficient key assignment scheme in which a recursive hash chain (RHC) is used to make our scheme secure.
... The visual protection of images has been studied simultaneously with the data hiding in [23]- [26]. The visual protection is combined with the compression in some works [27]- [31]. Furthermore, the combination of three things, i.e., data hiding, compression, and visual protection is desired in future applications, and the data hiding in the encrypted H.264/AVC codestreams was proposed [32] for applications including cloud computing. ...
... Furthermore, the combination of three things, i.e., data hiding, compression, and visual protection is desired in future applications, and the data hiding in the encrypted H.264/AVC codestreams was proposed [32] for applications including cloud computing. These kinds of development are worthy to be considered in particular based on international standardized compression mechanisms [7]- [9], [13], [14], [27]- [32]. ...
Conference Paper
In this paper, an effective data hiding method for encrypted JPEG 2000 codestreams is proposed. By using the property of the discrete wavelet transformation (DWT), an image is visually encrypted: multiplying random signs to the discrete wavelet transformed (DWTed) coefficients of the image, where the image is also compressed in the DWTed domain by JPEG 2000. In addition, data hiding is performed in the DWTed domain as well. It provides a number of possible applications; the hidden data may be extracted and then the original image is recovered, or the codestreams is directly decoded and decrypted to get the image containing the hidden data. Experimental results show that the proposed method is efficient in terms of visual protection, quality of decrypted images containing the hidden data, and hidden data extraction.
... For example, the Digital Cinema Initiative (DCI), an entity created by seven major motion picture studios, has adopted JPEG2000 as the compression standard in their specification for a unified Digital Cinema System [4]. Security techniques specifically tailored to the needs of scalable representation in general and JPEG2000 in particular have been proposed recently, e.g., [5][6][7][8][9][10]. An overview and discussion of the proposed approaches in the context of JPEG2000 can be found in [11]. ...
Article
Full-text available
We analyze and discuss encryption schemes for JPEG2000 based on the wavelet packet transform with a key-dependent subband structure. These schemes have been assumed to reduce the runtime complexity of encryption and compression. In addition to this "lightweight" nature, other advantages like encrypted domain signal processing have been reported. We systematically analyze encryption approaches based on key-dependent subband structures in terms of their impact on compression performance, their computational complexity and the level of security they provide as compared to more classical techniques. Furthermore, we analyze the prerequisites and settings in which the previously reported advantages actually hold and in which settings no advantages can be observed. As a final outcome it has to be stated that the compression integrated encryption approach based on the idea of secret wavelet packets can not be recommended.
... Format-Compliant Encryption of JPEG2000 Codestreams 55 Kiya et al [5] randomly select some bytes from body data and scramble their lower half bytes by bit-shift operation. The scheme is efficient and can output the compliant bitstreams. ...
... Conan et al [6] present a similar algorithm, if any byte has a value less than 0xF0, its four LSBs (Least Significant are encrypted with a block cipher. Apparently the security of the simple schemes [5][6] is weak. ...
Article
In this paper, we propose two format-compliant encryption schemes for JPEG2000, which preserve the syntax of the original codestream and do not introduce superfluous markers into the encrypted bitstream. The proposed efficient scheme randomly encrypts either low or upper half bytes of those randomly selected bytes in Codeblock Contribution to Packets (CCPs). The secure scheme encrypts both low and upper half bytes and can protect the nearly whole codestream except for the header information. The proposed schemes can provide efficient, secure, scalable and completely format-compliant protection of JPEG2000, which is proved by lots of experiments.
... Kiya et al. [35] extend this approach to an even more lightweight and flexible scheme. They propose encrypting only one randomly chosen byte out of m bytes. ...
Article
Full-text available
Image and video encryption has become a widely discussed topic; especially for the fully featured JPEG2000 compression standard numerous approaches have been proposed. A comprehensive survey of state-of-the-art JPEG2000 encryption is given. JPEG2000 encryption schemes are assessed in terms of security, runtime and compression performance and their suitability for a wide range of application scenarios.
... In order to protect the visual data and fulfill application requirements specifically tailored encryption approaches are necessary123. Especially JPEG2000 encryption has been the subject of a considerable amount of research456789101112. Many of the proposed encryption schemes can be applied in a selective / partial way. ...
Conference Paper
In this work, JPEG2000 error resilience options and error concealment strategies are discussed and evaluated. Error resilience options and error concealment strategies have been employed to mimic attacks against selective / partial JPEG2000 encryption schemes. Thus the security evaluation of these selective / partial encryption schemes relies on the proper working of the JPEG2000 error concealment. Recommendations for JPEG2000 encryption given in previous work have to be reassessed on the basis of our results. Improvements to the error concealment code of the JPEG2000 reference software JJ2000 are presented.