CONTENTS

1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 JPSEC syntax (normative)
5.1 JPSEC framework overview
5.2 JPSEC security services
5.3 Comments on design and implementation of secure JPSEC systems
5.4 Byte aligned segment (BAS)
5.5 Main security marker (SEC)
5.6 JPSEC tools
5.7 Zone of Influence (ZOI) syntax
5.8 Protection method template syntax (T)
5.9 Processing domain syntax (PD)
5.10 Granularity syntax (G)
5.11 Value list syntax (V)
5.12 Relationships among ZOI, Granularity (G) and Value List (VL)
5.13 In-codestream security marker (INSEC)
6 Normative-syntax usage examples (informative)
6.1 ZOI examples
6.2 Key information template examples
6.3 JPSEC normative tool examples
6.4 Distortion field examples
7 JPSEC registration authority
7.1 General introduction
7.2 Criteria for eligibility of applicants for registration
7.3 Applications for registration
7.4 Review and response to applications
7.5 Rejection of applications
7.6 Assignment of identifiers and recording of object definitions
7.7 Maintenance
7.8 Publication of the register
7.9 Register information requirements
Annex A Guidelines and use cases
A.1 A class of JPSEC applications
Annex B Technology examples
B.1 Introduction
B.2 A flexible access control scheme for JPEG 2000 codestreams
B.3 A unified authentication framework for JPEG 2000 images
B.4 A simple packet-based encryption method for JPEG 2000 codestreams
B.5 Encryption tool for JPEG 2000 access control
B.6 Key generation tool for JPEG 2000 access control
B.7 Wavelet and bitstream domain scrambling for conditional access control
B.8 Progressive access for JPEG 2000 codestream
B.9 Scalable authenticity of JPEG 2000 codestreams
B.10 JPEG 2000 data confidentiality and access control system based on data splitting and luring
B.11 Secure scalable streaming and secure transcoding
Annex C Interoperability
C.1 Part 1
C.2 Part 2
C.3 JPIP
C.4 JPWL
Annex D Patent statements
BIBLIOGRAPHY