CAN CSA-ISO IEC 15444-8A-2013 Information technology - JPEG 2000 image coding system Secure JPEG 2000 AMENDMENT 1 File format security.pdf

上传人:赵齐羽 文档编号:590639 上传时间:2018-12-15 格式:PDF 页数:42 大小:1.30MB
下载 相关 举报
CAN CSA-ISO IEC 15444-8A-2013 Information technology - JPEG 2000 image coding system Secure JPEG 2000 AMENDMENT 1 File format security.pdf_第1页
第1页 / 共42页
CAN CSA-ISO IEC 15444-8A-2013 Information technology - JPEG 2000 image coding system Secure JPEG 2000 AMENDMENT 1 File format security.pdf_第2页
第2页 / 共42页
CAN CSA-ISO IEC 15444-8A-2013 Information technology - JPEG 2000 image coding system Secure JPEG 2000 AMENDMENT 1 File format security.pdf_第3页
第3页 / 共42页
CAN CSA-ISO IEC 15444-8A-2013 Information technology - JPEG 2000 image coding system Secure JPEG 2000 AMENDMENT 1 File format security.pdf_第4页
第4页 / 共42页
CAN CSA-ISO IEC 15444-8A-2013 Information technology - JPEG 2000 image coding system Secure JPEG 2000 AMENDMENT 1 File format security.pdf_第5页
第5页 / 共42页
亲,该文档总共42页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、Information technology JPEG 2000 image coding system: Secure JPEG 2000AMENDMENT 1: File format securityAmendment 1:2013 (IDT) toNational Standard of CanadaCAN/CSA-ISO/IEC 15444-8-08(ISO/IEC 15444-8:2007, IDT)NOT FOR RESALE. / PUBLICATION NON DESTINE LA REVENTE.Standards Update ServiceAmendment 1:201

2、3 toCAN/CSA-ISO/IEC 15444-8-08January 2013Title:Information technology JPEG 2000 im age coding system: Secure JPEG 2000AMENDMENT 1: File format securityPagination:35 pages (iv preliminary and 31 text)To register for e-mail notification about any updates to this publicationgo to shop.csa.caclick on C

3、SA Update ServiceThe List ID that you will need to register for updates to this publication is 2422258.If you require assistance, please e-mail techsupportcsagroup.org or call 416-747-2233.Visit CSA Groups policy on privacy at csagroup.org/legal to find out how we protect your personal information.R

4、eference numberISO/IEC 15444-8:2007/Amd.1:2008(E)ISO/IEC 2008INTERNATIONAL STANDARD ISO/IEC15444-8First edition2007-04-15AMENDMENT 12008-12-15Information technology JPEG 2000 image coding system: Secure JPEG 2000AMENDMENT 1: File format security Technologies de linformation Systme de codage dimages

5、JPEG 2000: JPEG 2000 scuris AMENDEMENT 1: Scurit de format de fichier Amendment 1:2013 to CAN/CSA-ISO/IEC 15444-8-08ISO/IEC 15444-8:2007/Amd.1:2008(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall

6、 not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. A

7、dobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by IS

8、O member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2008 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any

9、 form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749

10、 09 47 E-mail copyrightiso.org Web www.iso.org Published by ISO in 2009 ii ISO/IEC 2008 All rights reservedAmendment 1:2013 to CAN/CSA-ISO/IEC 15444-8-08ISO/IEC 15444-8:2007/Amd.1:2008(E) ISO/IEC 2008 All rights reserved iiiCONTENTS Page 1) Clause 2: Normative references . 1 2) Clause 3: Terms and d

11、efinitions. 1 3) Annex E: File format security . 3 Annex E File Format Security 3 E.1 Scope 3 E.2 Introduction . 3 E.3 Extension to ISO base media file format 5 E.4 Elementary stream and sample definitions 14 E.5 Protection at file format level 16 E.6 Examples (Informative) 18 E.7 Boxes defined in I

12、SO/IEC 15444-12 (informative) 28 Amendment 1:2013 to CAN/CSA-ISO/IEC 15444-8-08ISO/IEC 15444-8:2007/Amd.1:2008(E) iv ISO/IEC 2008 All rights reservedForeword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system f

13、or worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collab

14、orate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards

15、are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as

16、an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent r

17、ights. Amendment 1 to ISO/IEC 15444-8:2007 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 29, Coding of audio, picture, multimedia and hypermedia information in collaboration with ITU-T. The identical text is published as ITU-T Rec. T.807 (05/2006)/A

18、md.1(E). Amendment 1:2013 to CAN/CSA-ISO/IEC 15444-8-08ISO/IEC 15444-8:2007/Amd.1:2008 (E) Rec. ITU-T T.807 (2006)/Amd.1 (03/2008) 1 INTERNATIONAL STANDARD ISO/IEC 15444-8 RECOMMENDATION ITU-T T.807 Information technology JPEG 2000 image coding system: Secure JPEG 2000 Amendment 1 File format securi

19、ty 1) Clause 2: Normative references Add the following references: Recommendation ITU-T T.803 (2002) | ISO/IEC 15444-4:2004, Information technology JPEG 2000 image coding system: Conformance testing. ISO/IEC 13818-11:2004, Information technology Generic coding of moving pictures and associated audio

20、 information Part 11: IPMP on MPEG-2 systems. ISO/IEC 15444-6:2003, Information technology JPEG 2000 image coding system Part 6: Compound image file format. ISO/IEC 15444-12:2005, Information technology JPEG 2000 image coding system Part 12: ISO base media file format (technically identical to ISO/I

21、EC 14496-12). 2) Clause 3: Terms and definitions a) Rewrite the first paragraph as follows (with the changes underlined): For the purposes of this Recommendation | International Standard, the following definitions apply. The definitions defined in ITU-T Rec. T.800 | ISO/IEC 15444-1 clause 3 and ISO/

22、IEC 15444-12:2005 clause 3 apply to this Recommendation | International Standard. b) Add the following terms and definitions: Normal decoder Standard decoder is a process to decode a codestream that is fully compliant with the normative part of coding standard. Its behaviour is not defined if it tri

23、es to decode a non-compliant codestream. Adaptive-format decoder Adaptive-format decoder is a process to decode a codestream which is not fully compliant with the normative part of the coding standard. It shall reconstruct the media (possibly with low quality or resolution) even if the codestream ha

24、s missing packets or inconsistent packet headers. For example, an adaptive-format decoder is able to understand a simply-transcoded codestream, such as the one that has its highest resolution packets removed. Elementary Stream (ES) Elementary streaming contains a sequence of samples, where each samp

25、le could be a video frame or a contiguous section of audio data. A sample in ES contains media data, ByteData structure, pointer structure, container structure, or any mixture of the above. Self-Contained ES Self-contained ES contains only media data, whose format is not defined in this amendment. T

26、he self-contained ES could be stored in MDAT box co-located with the file format specified in this amendment, or be stored in a separate file whose format is not specified by this amendment. Amendment 1:2013 to CAN/CSA-ISO/IEC 15444-8-08ISO/IEC 15444-8:2007/Amd.1:2008 (E) 2 Rec. ITU-T T.807 (2006)/A

27、md.1 (03/2008) Composed ES Composed ES may contain a mixture of ByteData, pointer and container structures, that is, its samples are composed with data from other elementary streams. A composed ES can either copy (using ByteData structure) or reference (using pointer) data from other ESes. Scalable

28、Composed ES Scalable composed ES is made up of samples that may not be decodable by themselves. It may need to be combined with other scalable composed ESes to form a fully decodable codestream. Scalable composed ES is designed to support scalability, i.e., to make media data “thinable“. For example

29、, for a motion JPEG 2000 codestream where each picture has three layers, it can be divided into 3 scalable composed ESes: the first one consists of all layer 0 data, the second one consists of all layer 1 data and the third one consists of all layer 2 data. Decodable Composed ES Decodable composed E

30、S is made up of samples that are decodable by themselves. It is designed for simple adaptation where the adaptor just needs to retrieve data pointed by pointer structure and remove the wrapper to form a fully scalable codestream. For example, for a motion JPEG 2000 codestream where each picture has

31、three layers, it can form 3 decodable composed ESes: the first one consists of layer 0 data, the second one consists of layer 0 and layer 1 data and the third one consists of layer 0, 1 and 2 data. Adaptor/transcoder Adaptor/transcoder is a process to transform media data to lower scalability level,

32、 like lower resolution or lower quality or bit-rate, by removing portions of the file. The adaptor/transcoder can transform media data based on the information specified in this amendment. An adaptor/transcoder shall update byte offset values in file format parameters that are impacted by the proces

33、s. Secure adaptor/transcoder Secure adaptor/transcoder is a process to transform encrypted or authenticated media data without necessity to decrypt or regenerate the MAC or signature. Thus, end-to-end security remains for the transcoded media data. JPEG 2000-aware adaptor/transcoder JPEG 2000-aware

34、adaptor/transcoder combines one or more scalable composed ESes to form a fully decodable media codestream. It should have the capability to generate the headers and markers of media codestream and modify the packet index, such that the adapted codestream can be decoded by a normal decoder. It may al

35、so add empty packets to replace the removed ones, or it may insert POC marker. Simple adaptor/transcoder Simple adaptor/transcoder is able to transform data based on information specified by this amendment. It may not be capable of generating media headers or modifying packet indices. It simply retr

36、ieves data pointed by pointer structure and removes the wrappers, and the resulting codestream can be decoded by adaptive-format decoder, which can cope with missing packets and inconsistent headers. Authentication adaptor/transcoder An authentication adaptor/transcoder removes data that is not veri

37、fiable with the available media data and authentication data. For example, in a streaming system, some media packets may be lost during transmission. A file format receiver may reconstruct the received data to the best of its ability based on the available data. Then, an authentication adaptor/trans

38、coder can determine which data can be verified, and then remove the packets that are not verified. The resulting file only contains the decodable, verified data. Container Container structure is used to wrap a sample in a composed ES. It might contain any number of ByteData or pointer structures, bu

39、t is not allowed to contain another container structure. Pointer Pointer structure is used to reference a data segment in another ES. It must be contained inside a container structure. Amendment 1:2013 to CAN/CSA-ISO/IEC 15444-8-08ISO/IEC 15444-8:2007/Amd.1:2008 (E) Rec. ITU-T T.807 (2006)/Amd.1 (03

40、/2008) 3 ByteData ByteData structure is used to wrap a data segment which is physically located in a composed ES. It must be contained inside a container structure. 4CC Code 4CC code is a 32-bit identifier, normally 4 printable characters. A 4CC code can be used to indicate the file type, the type o

41、f file format box, type of a file format track, type of a file format sample description and type of file format track reference. A 4CC code must be registered with a registration authority. 3) Annex E: File format security Create a new annex and add the following text: Annex E File Format Security

42、(This annex forms an integral part of this Recommendation | International Standard) E.1 Scope This annex specifies JPSEC file format derived from the ISO base file format and modifications to JPEG family file format (including JP2, JPX and JPM) for protection and secure adaptation of scalable pictur

43、es, which is possibly encrypted and/or authenticated by the owner. The pictures could be either static pictures or time-sequenced pictures. In particular, this annex provides functionality to do the following: To store coded media data corresponding to different scalability levels. Elementary stream

44、 (ES) is used for this purpose. There are three types of ESes, self-contained ES, scalable composed ES and decodable composed ES. To define tracks describing the characteristics of the coded media data stored in ES. For example, the track should be able to indicate scalability level (resolution, lay

45、er, region, etc.) and the rate-distortion hints of the coded media data in order to facilitate easy and secure adaptation. To define new file format boxes to signal protection tools and parameters applied to coded media data or metadata. The protection tools can be applied to either static JPEG 2000

46、 pictures or time-sequenced JPEG 2000 pictures. The protection tools defined in this amendment can be applied to JPEG family file formats including JP2, JPX and JPM and ISO-derived file formats such as MJ2 for motion JPEG. E.2 Introduction E.2.1 Security protection at file format level This annex de

47、scribes a JPSEC file format derived from the ISO base file format and modifications to JPEG family file format, to add security protection to JPEG 2000 pictures at the file format level. The protection applied at the file format level can be classified into two types: item-based protection and sampl

48、e-based protection, both structures are defined by the ISO base file format. The item-based protection is designed to protect any byte ranges (including coded media data and metadata) while the sample-based protection is designed to protect time-sequenced media including JPEG 2000 pictures. When the

49、 security tools applied change the data length, it shall update all pointers and length fields in all boxes, to ensure correct parsing by the reader. E.2.2 Item-based protection This annex describes two item-based protection schemes in the ISO base file format, by leveraging the syntax and structures specified by the JPSEC standard. Specifically, it describes schemes for decryption and authentication. Each item in the ItemLocationBox is protected by one or more protection schemes in the ItemProtectionBox. When multip

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1