Presentation 2008-04-17
A Hierarchical Encryption Method for JPEG 2000 Coded Images with Sub-Resistance to Collusion Attacks
Noriaki HASHIMOTO, Masaaki FUJIYOSHI, Hitoshi KIYA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) This paper proposes an encryption method to enable hierarchical access controls for JPEG 2000 codestreams. The proposed method provides access control to images of various quality levels that may be different from the quality at encoding, though it uses a single codestream and a single managed key (masterkey). Only one key generated from the masterkey is delivered to a user authorized to access a reserved quality image. This method also takes account into attacks that access superiorquality images by users' collusion. Some conventional methods serve the above features, but those keys are much longer than the keys of the proposed method. The proposed method uses the key whose length does not depend on the hierarchy levels of JP2 codestream by introducing sub-resistance to collusion attacks.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Access control / One-way hash function / Scalability / Collusion attack / Internet
Paper # SIP2008-1,IE2008-1
Date of Issue

Conference Information
Committee SIP
Conference Date 2008/4/10(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Signal Processing (SIP)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Hierarchical Encryption Method for JPEG 2000 Coded Images with Sub-Resistance to Collusion Attacks
Sub Title (in English)
Keyword(1) Access control
Keyword(2) One-way hash function
Keyword(3) Scalability
Keyword(4) Collusion attack
Keyword(5) Internet
1st Author's Name Noriaki HASHIMOTO
1st Author's Affiliation Dept. of Information Processing, Tokyo Institute of Technology()
2nd Author's Name Masaaki FUJIYOSHI
2nd Author's Affiliation Dept. of Information and Communication Systems Engineering, Tokyo Metropolitan University
3rd Author's Name Hitoshi KIYA
3rd Author's Affiliation Dept. of Information and Communication Systems Engineering, Tokyo Metropolitan University
Date 2008-04-17
Paper # SIP2008-1,IE2008-1
Volume (vol) vol.108
Number (no) 3
Page pp.pp.-
#Pages 6
Date of Issue