2009
DOI: 10.1007/s00530-008-0150-0
|View full text |Cite
|
Sign up to set email alerts
|

A survey on JPEG2000 encryption

Abstract: Image and video encryption has become a widely discussed topic; especially for the fully featured JPEG2000 compression standard numerous approaches have been proposed. A comprehensive survey of state-of-the-art JPEG2000 encryption is given. JPEG2000 encryption schemes are assessed in terms of security, runtime and compression performance and their suitability for a wide range of application scenarios.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0
3

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 45 publications
(36 citation statements)
references
References 55 publications
0
33
0
3
Order By: Relevance
“…For an overview of selective encryption and attacks see Engel et al [7] for JPEG2000, and Lookabaugh et al [15] for MPEG-2. Specifically there are attacks which copy structurally similar symbols from one part of the bitstream to another or inject a forged version into the bitstream.…”
Section: Resultsmentioning
confidence: 99%
“…For an overview of selective encryption and attacks see Engel et al [7] for JPEG2000, and Lookabaugh et al [15] for MPEG-2. Specifically there are attacks which copy structurally similar symbols from one part of the bitstream to another or inject a forged version into the bitstream.…”
Section: Resultsmentioning
confidence: 99%
“…The results are averages of hundred trials. Additionally we need to determine the complexity of AES encryption, which is given in Table 3 [11]. These results enable us to determine the complexity in dependence of a varying bit-rate, which is shown in Figure 4.…”
Section: Experimental Performance Evaluationmentioning
confidence: 99%
“…An adversary, who tries to break a multimedia encryption system, is successful if she can efficiently compute a "high quality" reconstruction of the original multimedia datum. Which quality constitutes a security threat highly depends on the targeted application scenario [11]. In [42] this multimedia-specific security notion is termed MQ-security (message quality), similar concepts can be found in the multimedia encryption literature [43,44].…”
Section: Security Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The fully format-compliant encryption of the NALUs with simple encryption algorithms, e.g., comparable to packet body encryption in JPEG2000 [15], is not possible due to the violation of syntactical and semantical requirements. In JPEG2000, the encryption of packet body data is possible as only fractional bitplane data is coded, i.e., every decoded bit sequence can be interpreted as fractional bitplane data, while H.264 arithmetically encodes a multitude of syntax elements, not all syntax element values are always possible.…”
Section: ) Nalu [Encryption]mentioning
confidence: 99%