Outline
Jeremy Malcolm
e.org
Introduction
Some of the proposals for the JPEG Privacy & Security
Jeremy Malcolm
e.org
Introduction
Some of the proposals for the JPEG Privacy & Security
Jeremy Malcolm
e.org
Introduction
Some of the proposals for the JPEG Privacy & Security
Jeremy Malcolm
e.org
Jeremy Malcolm
e.org
Jeremy Malcolm
e.org
Jeremy Malcolm
e.org
Jeremy Malcolm
e.org
Jeremy Malcolm
e.org
10
Jeremy Malcolm
e.org
11
Jeremy Malcolm
e.org
12
source tools.
Make interoperability more dicult to engineer.
Expose coders and researchers to additional legal risk.
Extend a bad precedent for the extension of DRM to
Jeremy Malcolm
e.org
13
source tools.
Make interoperability more dicult to engineer.
Expose coders and researchers to additional legal risk.
Extend a bad precedent for the extension of DRM to
Jeremy Malcolm
e.org
14
Jeremy Malcolm
e.org
15
Jeremy Malcolm
e.org
16
Jeremy Malcolm
e.org
17
Jeremy Malcolm
e.org
18
Jeremy Malcolm
e.org
19
Jeremy Malcolm
e.org
20
Jeremy Malcolm
e.org
21
Jeremy Malcolm
e.org
22
Jeremy Malcolm
e.org
23
Jeremy Malcolm
e.org
24
Jeremy Malcolm
e.org
25
Cryptography
Many use cases for JPEG Privacy & Security only require
Jeremy Malcolm
e.org
26
Jeremy Malcolm
e.org
27
Jeremy Malcolm
e.org
28
Jeremy Malcolm
e.org
29
Licensing
Jeremy Malcolm
e.org
30
Recommendations.
Jeremy Malcolm
e.org
31
Recommendations.
Jeremy Malcolm
e.org
32
Recommendations.
Jeremy Malcolm
e.org
33
Recommendations.
Jeremy Malcolm
e.org
34
Summary
JPEG Privacy & Security has some worthwhile aims
Validating (not preserving) image and metadata integrity
Encrypting plain text metadata for protection of privacy
Jeremy Malcolm
e.org
35
Questions?
Jeremy Malcolm
jmalcolm@e.org
Jeremy Malcolm
e.org
36