Complete Communications Engineering

The Hash Template uses two 8-bit values , hash function identifier and size of hash value, to convey the parameters used to compute the hash on the JPSEC data. This template is used to detect accidental error or accidental change to the data. The values are specified using the granularity field (G) and list value field (V) in the PIDparameters. The list of available hash functions and their identifier are shown in table 1.

Table 1: JPSEC Hash Function Identifiers

IdentifierHash Function
0Reserved
1SHA-1
2RIPEMD-128
3RIPEMD-160
4MASH-1
5MASH-2
6SHA-224
7SHA-256
8SHA-384
9SHA-512
10Whirlpool
All other values are reserved for ISO use

Further information available here:

JPSEC

JPSEC tools

JPSEC Tool Decryption Template

JPSEC Tool Authentication Template

JPSEC Tool Key Template

JPSEC Registration Authority (RA)
JPSEC Standards available here:

Joint Photographic Experts Group (JPEG) Part 8 – JPSEC: Secure JPEG 2000 Final Committee Draft

ISO/IEC 15444-8:2007 – Information technology — JPEG 2000 image coding system: Secure JPEG 2000

T.807 (05/06) – Information technology — JPEG 2000 image coding system: Secure JPEG 2000