Password authentication with insecure communication
Communications of the ACM
One-Way Cross-Trees and Their Applications
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Scalable protection and access control in full scalable video coding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Rate-Distortion-Authentication Optimized Streaming of Authenticated Video
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
This paper proposes a key derivation scheme to control access of JPEG 2000 (JP2) coded images, which consist of hierarchical scalability such as SNR, resolution levels, and so on. The proposed scheme simultaneously controls access to each level of scalability. The proposed scheme derives keys through hash chains, and each JP2 packet is enciphered with each individual key. By introducing combinations of a cyclic shift and a hash function, the proposed scheme manages only a single key for a JP2 image; whereas the conventional access control schemes having the above mentioned features manage multiple keys. The single managed key is not delivered to any user. The proposed scheme is also resilient to collusion attacks. Performance analysis shows the effectiveness of the proposed scheme.