A key derivation scheme for hierarchical access control to JPEG 2000 coded images

S Imaizumi, M Fujiyoshi, H Kiya, N Aoki… - Advances in Image and …, 2012 - Springer
S Imaizumi, M Fujiyoshi, H Kiya, N Aoki, H Kobayashi
Advances in Image and Video Technology: 5th Pacific Rim Symposium, PSIVT 2011 …, 2012Springer
This paper proposes a key derivation scheme to control access of JPEG 2000 (JP2) coded
images, which consist of hierarchical scalability such as SNR, resolution levels, and so on.
The proposed scheme simultaneously controls access to each level of scalability. The
proposed scheme derives keys through hash chains, and each JP2 packet is enciphered
with each individual key. By introducing combinations of a cyclic shift and a hash function,
the proposed scheme manages only a single key for a JP2 image; whereas the conventional …
Abstract
This paper proposes a key derivation scheme to control access of JPEG 2000 (JP2) coded images, which consist of hierarchical scalability such as SNR, resolution levels, and so on. The proposed scheme simultaneously controls access to each level of scalability. The proposed scheme derives keys through hash chains, and each JP2 packet is enciphered with each individual key. By introducing combinations of a cyclic shift and a hash function, the proposed scheme manages only a single key for a JP2 image; whereas the conventional access control schemes having the above mentioned features manage multiple keys. The single managed key is not delivered to any user. The proposed scheme is also resilient to collusion attacks. Performance analysis shows the effectiveness of the proposed scheme.
Springer
Showing the best result for this search. See all results