364 research outputs found

    Emergency TeleOrthoPaedics m-health system for wireless communication links

    Get PDF
    For the first time, a complete wireless and mobile emergency TeleOrthoPaedics system with field trials and expert opinion is presented. The system enables doctors in a remote area to obtain a second opinion from doctors in the hospital using secured wireless telecommunication networks. Doctors can exchange securely medical images and video as well as other important data, and thus perform remote consultations, fast and accurately using a user friendly interface, via a reliable and secure telemedicine system of low cost. The quality of the transmitted compressed (JPEG2000) images was measured using different metrics and doctors opinions. The results have shown that all metrics were within acceptable limits. The performance of the system was evaluated successfully under different wireless communication links based on real data

    Space and Planetary Imaging using JPEG2000

    Get PDF
    The raising demand for Digital content Rights Management (DRM), protection and security, enabling effective on-line access, exchange and trading of all types of digital media items (ranging from a simple text file to a large space or planetary image) and, at the same time, supporting global interoperability of customer devices and traded items, can only be met by a good mix of open architectures and proprietary technologies. In this paper, we present a novel integrated architecture that supports the secure handling of large remote sensing ISO JPEG2000 coded images, obtained from satellite. This effort is within the scope of further developments and new extensions for this standard, namely: - Trans-coding of proprietary digital image formats used in satellite imagery, to the new JPEG2000 format; - Inexpensive network clusters for parallel computing to improve the algorithmic process of coding very large digital images obtained from satellites. - Coding of multi-component and multi-spectral images as well as volumetric images (JP3D); - Exploration of interactive on-line image satellite catalogues (JPIP); - Secure transmission, and protection of the image content based in OpenSDRM (JPSEC)

    A method for protecting and controlling access to JPEG2000 images

    Get PDF
    The image compression standard JPEG2000 brings not only powerful compression performance but also new functionality unavailable in previous standards (such as region of interest, scalability and random access to image data, through flexible code stream description of the image). ISO/IEC JTC1/SC29/WG1, which is the ISO Committee working group for JPEG2000 standardization is currently defining additional parts to the standard that will allow extended functionalities. One of these extensions is Part 8 JPSEC - JPEG2000 security, which deals with the protection and access control of JPEG2000 code-stream. This paper reports the JPSEC activities detailing with the three core experiments which are in progress to supply the JPEG2000 ISO Committee, with the appropriate protection technology. These core experiments are focusing on the protection of the code-stream itself and on the overall security infrastructure that is needed to manage the access rights of users and applications to that protected code-stream. Regarding the encryption/scrambling process, this one deals with the JPEG2000 code stream in such a way that only the packets, which contain image data information are encrypted. All the other code-stream data will be in clear mode. Ibis paper will also advance details of one of the JPSEC proposed solutions for the security infrastructure - OpenSDRM (Open and Secure Digital Rights Management) [16], which provides security and rights management from the content provider to the content final user. A use case where this security infrastructure was successfully used will also be provided.info:eu-repo/semantics/acceptedVersio

    A digital signature and watermarking based authentication system for JPEG2000 images

    Get PDF
    In this thesis, digital signature based authentication system was introduced, which is able to protect JPEG2000 images in different flavors, including fragile authentication and semi-fragile authentication. The fragile authentication is to protect the image at code-stream level, and the semi-fragile is to protect the image at the content level. The semi-fragile can be further classified into lossy and lossless authentication. With lossless authentication, the original image can be recovered after verification. The lossless authentication and the new image compression standard, JPEG2000 is mainly discussed in this thesis

    Embedding Authentication and DistortionConcealment in Images – A Noisy Channel Perspective

    Get PDF
    In multimedia communication, compression of data is essential to improve transmission rate, and minimize storage space. At the same time, authentication of transmitted data is equally important to justify all these activities. The drawback of compression is that the compressed data are vulnerable to channel noise. In this paper, error concealment methodologies with ability of error detection and concealment are investigated for integration with image authentication in JPEG2000.The image authentication includes digital signature extraction and its diffusion as a watermark. To tackle noise, the error concealment technologies are modified to include edge information of the original image.This edge_image is transmitted along with JPEG2000 compressed image to determine corrupted coefficients and regions. The simulation results are conducted on test images for different values of bit error rate to judge confidence in noise reduction within the received images

    Envisat products secure browsing in mobile clients using JPEG2000 interactivity protocol

    Get PDF
    Taking advantage of the mobile platforms to interact with the HICOD2000 system has been the motivation for the work described in this paper. Regardless of the limited resources available in mobile platforms the authors demonstrate that using the features of the HICOD2000 system the mobile device might be of major assistance in the field where satellite imagery may have an important and useful role. This paper describes an extension of the HICOD2000 system, available to the public through the ESA Service Support Environment. The EO JPEG2000 compressed products have achieved good compression ratios, minimizing both storage space and bandwidth. Regarding security to sensitive data the system enforces user access rights via a digital rights management platform called OpenSDRM. The mobile device has been endowed with the implementation of the JPIP protocol to optimize network bandwidth as well as the necessary components to interface with the OpenSDRM platform and decode JPSEC protected images: the OpenSDRM wallet and the protection tool.info:eu-repo/semantics/publishedVersio

    Introducing keytagging, a novel technique for the protection of medical image-based tests

    Get PDF
    This paper introduces keytagging, a novel technique to protect medical image-based tests by implementing image authentication, integrity control and location of tampered areas, private captioning with role-based access control, traceability and copyright protection. It relies on the association of tags (binary data strings) to stable, semistable or volatile features of the image, whose access keys (called keytags) depend on both the image and the tag content. Unlike watermarking, this technique can associate information to the most stable features of the image without distortion. Thus, this method preserves the clinical content of the image without the need for assessment, prevents eavesdropping and collusion attacks, and obtains a substantial capacity-robustness tradeoff with simple operations. The evaluation of this technique, involving images of different sizes from various acquisition modalities and image modifications that are typical in the medical context, demonstrates that all the aforementioned security measures can be implemented simultaneously and that the algorithm presents good scalability. In addition to this, keytags can be protected with standard Cryptographic Message Syntax and the keytagging process can be easily combined with JPEG2000 compression since both share the same wavelet transform. This reduces the delays for associating keytags and retrieving the corresponding tags to implement the aforementioned measures to only ¿30 and ¿90. ms respectively. As a result, keytags can be seamlessly integrated within DICOM, reducing delays and bandwidth when the image test is updated and shared in secure architectures where different users cooperate, e.g. physicians who interpret the test, clinicians caring for the patient and researchers

    QUALITY-DRIVEN CROSS LAYER DESIGN FOR MULTIMEDIA SECURITY OVER RESOURCE CONSTRAINED WIRELESS SENSOR NETWORKS

    Get PDF
    The strong need for security guarantee, e.g., integrity and authenticity, as well as privacy and confidentiality in wireless multimedia services has driven the development of an emerging research area in low cost Wireless Multimedia Sensor Networks (WMSNs). Unfortunately, those conventional encryption and authentication techniques cannot be applied directly to WMSNs due to inborn challenges such as extremely limited energy, computing and bandwidth resources. This dissertation provides a quality-driven security design and resource allocation framework for WMSNs. The contribution of this dissertation bridges the inter-disciplinary research gap between high layer multimedia signal processing and low layer computer networking. It formulates the generic problem of quality-driven multimedia resource allocation in WMSNs and proposes a cross layer solution. The fundamental methodologies of multimedia selective encryption and stream authentication, and their application to digital image or video compression standards are presented. New multimedia selective encryption and stream authentication schemes are proposed at application layer, which significantly reduces encryption/authentication complexity. In addition, network resource allocation methodologies at low layers are extensively studied. An unequal error protection-based network resource allocation scheme is proposed to achieve the best effort media quality with integrity and energy efficiency guarantee. Performance evaluation results show that this cross layer framework achieves considerable energy-quality-security gain by jointly designing multimedia selective encryption/multimedia stream authentication and communication resource allocation
    corecore