The JPEG 2000 Suite


The JPEG 2000 Suite provides a comprehensive overview of the baseline JPEG 2000 standard and its extensions. The first part of the book sets out the core coding system, additions to the standard and reference software. The second part discusses the successful deployment of JPEG 2000 in application domains such as video surveillance, digital cinema, digital television, medical imaging, defence imaging, security, geographic imaging and remote sensing, digital culture imaging and 3D graphics. The book also presents ...
See more details below
Other sellers (Hardcover)
  • All (5) from $118.24   
  • New (4) from $118.24   
  • Used (1) from $146.66   
Sending request ...


The JPEG 2000 Suite provides a comprehensive overview of the baseline JPEG 2000 standard and its extensions. The first part of the book sets out the core coding system, additions to the standard and reference software. The second part discusses the successful deployment of JPEG 2000 in application domains such as video surveillance, digital cinema, digital television, medical imaging, defence imaging, security, geographic imaging and remote sensing, digital culture imaging and 3D graphics. The book also presents implementation strategies accompanied by existing software and hardware solutions.
  • Describes secure JPEG 2000 (JPSEC), interactivity protocols (JPIP), volumetric image data compression (JP3D) and image compression in wireless environments (JPWL), amongst others.
  • Uses a structure which allows for easy cross-reference with the components of the standard.
  • Sets out practical implementation examples and results.
  • Examines strategies for future image compression techniques, including Advanced Image Coding and JPEG XR. 
  • Includes contributions from international specialists in industry and academia who have worked on the development of the JPEG 2000 standard.
  • Additional material can be found at

The JPEG 2000 Suite is an excellent introduction to the JPEG 2000 standard and is of great appeal to practising electronics engineers, researchers, and hardware and software developers using and developing image coding techniques. Graduate students taking courses on image compression, digital archiving, and data storage techniques will also find the book useful, as will graphic designers, artists, and decision makers in industries developing digital applications.

Read More Show Less

Product Details

Table of Contents

Contributor Biographies.


Series Editor’s Preface.



List of Acronyms.

Part A.

1 JPEG 2000 Core Coding System (Part 1) (Majid Rabbani, Rajan L. Joshi, and Paul W. Jones).

1.1 Introduction.

1.2 JPEG 2000 Fundamental Building Blocks.

1.3 JPEG 2000 Bit-Stream Organization.

1.4 JPEG 2000 Rate Control. 

1.5 Performance Comparison of the JPEG 2000 Encoder Options.

1.6 Additional Features of JPEG 2000 Part 1.



2 JPEG 2000 Extensions (Part 2) (Margaret Lepley, J. Scott Houchin, James Kasner, and Michael Marcellin).

2.1 Introduction.

2.2 Variable DC Offset.

2.3 Variable Scalar Quantization.

2.4 Trellis-Coded Quantization.

2.5 Precinct-Dependent Quantization.

2.6 Extended Visual Masking.

2.7 Arbitrary Decomposition.

2.8 Arbitrary Wavelet Transforms.

2.9 Multiple-Component Transform Extensions.

2.10 Nonlinear Point Transform.

2.11 Geometric Manipulation via a Code-Block Anchor Point (CBAP).

2.12 Single-Sample Overlap.

2.13 Region of Interest.

2.14 Extended File Format: JPX.

2.15 Extended Capabilities Signaling.



3 Motion JPEG 2000 and ISO Base Media File Format (Parts 3 and 12) (Joerg Mohr).

3.1 Introduction.

3.2 Motion JPEG 2000 and ISO Base Media File Format.

3.3 ISO Base Media File Format.

3.4 Motion JPEG 2000.


4 Compound Image File Format (Part 6) (Frederik Temmermans, Tim Bruylants, Simon McPartlin, and Louis Sharpe).

4.1 Introduction.

4.2 The JPM File Format.

4.3 Mixed Raster Content Model (MRC).

4.4 Streaming JPM Files.

4.5 Referencing JPM Files.

4.6 Metadata.

4.7 Boxes.

4.8 Profiles.

4.9 Conclusions.


5 JPSEC: Securing JPEG 2000 Files (Part 8) (Susie Wee and Zhishou Zhang).

5.1 Introduction.

5.2 JPSEC Security Services.

5.3 JPSEC Architecture.

5.4 JPSEC Framework.

5.5 What: JPSEC Security Services.

5.6 Where: Zone of Influence (ZOI).

5.7 How: Processing Domain and Granularity.

5.8 JPSEC Examples.

5.9 Summary.


6 JPIP – Interactivity Tools, APIs, and Protocols (Part 9) (Robert Prandolini).

6.1 Introduction.

6.2 Data-Bins.

6.3 JPIP Basics.

6.4 Client Request–Server Response.

6.5 Advanced Topics.

6.6 Conclusions.



7 JP3D – Extensions for Three-Dimensional Data (Part 10) (Tim Bruylants, Peter Schelkens, and Alexis Tzannes).

7.1 Introduction.

7.2 JP3D: Going Volumetric.

7.3 Bit-Stream Organization.

7.4 Additional Features of JP3D.

7.5 Compression performances: JPEG 2000 Part 1 versus JP3D.

7.6 Implications for Other Parts of JPEG 2000.



8 JPWL – JPEG 2000 Wireless (Part 11) (Frédéric Dufaux).

8.1 Introduction.

8.2 Background.

8.3 JPWL Overview.

8.4 Normative Parts.

8.5 Informative Parts.

8.6 Summary.



Part B.

9 JPEG 2000 for Digital Cinema (Siegfried Fößel).

9.1 Introduction.

9.2 General Requirements for Digital Cinema.

9.3 Distribution of Digital Cinema Content.

9.4 Archiving of Digital Movies.

9.5 Future Use of JPEG 2000 within Digital Cinema.

9.6 Conclusions.



10 Security Applications for JPEG 2000 Imagery (John Apostolopoulos, Frédéric Dufaux, and Qibin Sun).

10.1 Introduction.

10.2 Secure Transcoding and Secure Streaming.

10.3 Multilevel Access Control.

10.4 Selective or Partial Encryption of Image Content.

10.5 Image Authentication.

10.6 Summary.



11 Video Surveillance and Defense Imaging (Touradj Ebrahimi and Frédéric Dufaux).

11.1 Introduction.

11.2 Scrambling.

11.3 Overview of a Typical Video Surveillance System.

11.4 Overview of a Video Surveillance System Based on JPEG 2000 and ROI Scrambling.

12 JPEG 2000 Application in GIS and Remote Sensing (Bernard Brower, Robert Fiete, and Roddy Shuler).

12.1 Introduction.

12.2 Geographic Information Systems.

12.3 Recommendations for JPEG 2000 Encoding.

12.4 Other JPEG 2000 Parts to Consider.


13 Medical Imaging (Alexis Tzannes and Ron Gut).

13.1 Introduction.

13.2 Background.

13.3 DICOM and JPEG 2000 Part 1.

13.4 DICOM and JPEG 2000 Part 2.

13.5 Example Results.

13.6 Image Streaming, DICOM, and JPIP.


14 Digital Culture Imaging (Greg Colyer, Robert Buckley, and Athanassios Skodras).

14.1 Introduction.

14.2 The Digital Culture Context.

14.3 Digital Culture and JPEG 2000.

14.4 Application – National Digital Newspaper Program.



15 Broadcast Applications (Hans Hoffman, Adi Kouadio, and Luk Overmeire).

15.1 Introduction – From Tape-Based to File-Based Production.

15.2 Broadcast Production Chain Reference Model.

15.3 Codec Requirements for Broadcasting Applications.

15.4 Overview of State-of-the-Art HD Compression Schemes.

15.5 JPEG 2000 Applications.

15.6 Multigeneration Production Processes.

15.7 JPEG 2000 Comparison with SVC.

15.8 Conclusion.


16 JPEG 2000 in 3-D Graphics Terrain Rendering (Gauthier Lafruit, Wolfgang Van Raemdonck, Klaas Tack, and Eric Delfosse).

16.1 Introduction.

16.2 Tiling: The Straightforward Solution to Texture Streaming.

16.3 View-Dependent JPEG 2000 Texture Streaming and Mipmapping.

16.4 JPEG 2000 Quality and Decoding Time Scalability for Optimal Quality–Workload Tradeoff.

16.5 Conclusion.


17 Conformance Testing, Reference Software, and Implementations (Peter Schelkens, Yiannis Andreopoulos, and Joeri Barbarien).

17.1 Introduction.

17.2 Part 4 – Conformance Testing.

17.3 Part 5 – Reference Software.

17.4 Implementation of the Discrete Wavelet Transform as Suggested by the JPEG 2000 Standard.

17.5 JPEG 2000 Hardware and Software Implementations.

17.6 Conclusions.



18 Ongoing Standardization Efforts (Touradj Ebrahimi, Athanassios Skodras, and Peter Schelkens).

18.1 Introduction.

18.2 JPSearch.

18.3 JPEG XR.

18.4 Advanced Image Coding and Evaluation Methodologies (AIC).



Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)