Compliant Asymmetric Authenticated Encryption Scheme for JPEG2000 Code-streams
نویسندگان
چکیده
The JPEG2000 syntax requires that any two consecutive bytes in the encrypted packet body should not be larger than 0xFF8F. This stringent requirement has plagued researchers for a few years. In this paper, we present a novel secure encryption and authentication scheme for JPEG2000 code-streams, which does not introduce superfluous JPEG2000 markers in the protected code-stream. The scheme achieves nearly 99.6% of the information protection for data confidentiality and it is computational efficiency. We develop a new public key method. It also provides source authentication without appending additional bits into the raw JPEG2000 code-streams, thus the compliant authenticated encryption is achieved.
منابع مشابه
An encryption scheme for JPEG2000 codestream based on packets header information and data encryption for confidentential medical images transmission
In this paper, a novel selective encryption scheme for JPEG2000 codestream is proposed. Many of proposals format compliant encryption schemes for JPEG2000 that have been made encrypt packet body data, but leave header packet in plaintext. Our proposed scheme encrypts code-blocks data corresponding to some sensitive precincts. This encryption is combined to a cyclic permutation of all packets he...
متن کاملSelective Encryption Techniques of JPEG2000 Codestream for Medical Images Transmission
In this paper, novel selective encryption image schemes based on JPEG2000 are proposed. The first one encrypts only the code-blocks corresponding to some sensitive precincts. In order to improve the security level we introduce the permutation of codeblocks contributing in the selected precincts. The idea of combining permutation and selective encryption is used in order to minimize the amount o...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملFormat-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters
JPEG2000 encryption has become a widely discussed topic and quite a number of contributions have been made. However, little is known about JPEG2000 compression parameters and their influence on the security and performance of format, compliant encryption schemes. In this work, a thorough analysis of this topic is presented with a focus on format-compliant packet body encryption as sketched in t...
متن کاملUnconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender’s anonymity play important roles in many applications. However, they will be meaningless if cryptographic primitives containing his identity is carelessly used during the transmission. The main contribution of this paper is to study the security primitives for the above problem. In this paper, we first define unconditionally secur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006