The Joint Photographic Experts Group (JPEG), which is a Working Group of ISO/IEC, the International Organisation for Standardization / International Electrotechnical Commission, (ISO/IEC JTC 1/SC 29/WG 1) and of the International Telecommunication Union (ITU-T SG16), has been actively developing a standard for realizing secure image information sharing which is capable of ensuring privacy, maintaining data integrity, and protecting intellectual property rights (IPR). This standard, called JPEG Privacy & Security (JPEG P&S), will explore ways on how to design and implement the necessary features without significantly impacting coding performance while ensuring scalability, interoperability, and also forward and backward compatibility with current JPEG standard frameworks.
Currently, a draft Call for Proposals for JPEG P&S has been issued and the JPEG committee invites interested parties to contribute to this standardisation activity in JPEG Systems. This was defined after three successful workshops organized in previous JPEG meetings that strongly influenced to define the main aims and issues of the new standard.
The call addresses protection mechanisms and technologies such as handling hierarchical levels of access and multiple protection levels for metadata and image protection, checking integrity of image data and embedded metadata, and supporting backward and forward compatibility with JPEG coding technologies.
As it is obvious, de-identification models, that are the aim of COST Action IC1206, are of the upmost importance, making any interaction of this action with the JPEG P&S a positive input. Although the action is close to the end, a possible collaboration can be established through the participation on the definition of the final version of the JPEG P&S Call for Proposals that is expected at the 75th JPEG meeting located in Sydney, Australia.
In this work the links with JPEG P&S and COST Action IC1206 framework were identified, namely in the domain of interaction between, 1) De-Identification methods and their integration on the JPEG P&S standard, and 2) protection tools and their interaction with the security mechanisms provided by JPEG P&S.