JPEG2000 Security standard / recommendations 

http://www.jpeg.org/jpeg2000/j2kpart8.html?langsel=en


JPEG2000 - JPEG 2000 Security (Part 8 - JPSEC)
(as of July 2003)

The development of the web and the advances in computer technology have
produced a proliferation of digital media content which can be efficiently
copied, processed and distributed at negligible cost, both for licit and
illicit use.
Security issues are therefore very important features in many imaging
applications targeted by JPEG 2000. 

To address this issue, JPEG 2000 Secured (JPSEC) or Part 8 of the standard
is standardising tools and solutions in terms of specifications in order to
ensure the security of transaction, protection of contents (IPR), and
protection of technologies (IP), and to allow applications to generate,
consume, and exchange JPEG 2000 Secured bitstreams.. 

Applications addressed by JPSEC include the following examples, to mention a
few: 

Encryption: 
JPSEC will provide a flexible mechanism to allow for encryption of image
content and metadata. This includes partial encryption of the latter, or
encryption with different strengths. 

Source authentication: 
JPSEC allow for verification of authenticity of the source. 

Data integrity: 
JPSEC will allow for data integrity verification. This includes semi-robust
integrity verification, as well as mechanisms to optionally identify
locations in the image content where the integrity is put into question. 

Conditional access: 
JPSEC will allow for conditional access to portions of an image or its
associated metadata. For instance, a user could be allowed to view a low
resolution (preview) of an image without being able to visualize a higher
resolution. 

Ownership  protection:  
JPSEC will allow for protection of the content owner rights (copyright).
This includes ownership identification mechanisms robust to malicious
attacks and non malicious processing of the JPEG 2000 bitstream and/or the
image it represent.
The underlying techniques to protect the content include digital signatures,
watermarking, encryption, scrambling, and key generation and management.
These techniques will be enabled in JPSEC by means of a registration
authority. More specifically, all techniques have to be previously
registered in a central repository, the registration authority, which
uniquely identify these techniques.



IL Thomas
GeoSciSoft - Perth, Australia
_______________________________________________
MapInfo-L mailing list
MapInfo-L@lists.directionsmag.com
http://www.directionsmag.com/mailman/listinfo/mapinfo-l

Reply via email to