Đang chuẩn bị liên kết để tải về tài liệu:
Báo cáo hóa học: " Research Article Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters"
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters | Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 2007 Article ID 94565 20 pages doi 10.1155 2007 94565 Research Article Format-Compliant JPEG2000 Encryption in JPSEC Security Applicability and the Impact of Compression Parameters Dominik Engel Thomas Stutz and Andreas Uhl Department of Computer Sciences Salzburg University Jakob-Haringerstr. 2 5020 Salzburg Austria Correspondence should be addressed to Andreas Uhl uhl@cosy.sbg.ac.at Received 30 March 2007 Revised 2 July 2007 Accepted 22 October 2007 Recommended by E. Magli JPEG2000 encryption has become a widely discussed topic and quite a number of contributions have been made. However little is known about JPEG2000 compression parameters and their influence on the security and performance of format compliant encryption schemes. In this work a thorough analysis of this topic is presented with a focus on format-compliant packet body encryption as sketched in the FCD 15444-8 JPSEC . Aproofforthe reversibility of JPSEC format-compliant packet body encryption is given. As format-compliant packet body encryption preserves the JPEG2000 headers which severely compromises the security we additionally discuss packet header encryption with a special focus on format compliance and the influence of compression parameters on these schemes. Copyright 2007 Dominik Engel et al. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. 1. INTRODUCTION The demand for custom encryption methods specifically tailored to fulfill the requirements of a particular multimedia application scenario with respect to security and other functionalities is widely accepted nowadays 1 2 . Besides the aim to reduce the computational effort which is usually achieved by trading off security as it is the case in partial selective or soft encryption schemes maintaining .