{"id":514568,"date":"2024-11-05T14:30:24","date_gmt":"2024-11-05T14:30:24","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/can-csa-iso-iec-15444-8-08-r2018\/"},"modified":"2024-11-05T14:30:24","modified_gmt":"2024-11-05T14:30:24","slug":"can-csa-iso-iec-15444-8-08-r2018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/can-csa-iso-iec-15444-8-08-r2018\/","title":{"rendered":"CAN\/CSA-ISO\/IEC 15444-8-08 (R2018)"},"content":{"rendered":"

CSA Preface<\/strong><\/p>\n

<\/p>\n

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO\/IEC Joint Technical Committee 1 on Information Technology (ISO\/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).<\/p>\n

<\/p>\n

Scope<\/strong><\/p>\n

<\/p>\n

This Recommendation | International Standard specifies the framework, concepts, and methodology for securing JPEG 2000 codestream. The scope of this Recommendation International Standard is to define:<\/p>\n

<\/p>\n

1) a normative codestream syntax containing information for interpreting secure image data;<\/p>\n

<\/p>\n

2) a normative process for registering JPSEC tools with a registration authority delivering a unique identifier;<\/p>\n

<\/p>\n

3) informative examples of JPSEC tools in typical use cases;<\/p>\n

<\/p>\n

4) informative guidelines on how to implement security services and related metadata.<\/p>\n

<\/p>\n

The scope of this Recommendation | International Standard is not to describe specific secure imaging applications or to limit secure imaging to specific techniques, but to create a framework that enables future extensions as secure imaging techniques evolve.<\/p>\n","protected":false},"excerpt":{"rendered":"

Information technology – JPEG 2000 image coding system – Part 8: Secure JPEG 2000<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
CSA<\/b><\/a><\/td>\n2008-09-01<\/td>\n116<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":514580,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[657,2674],"product_tag":[],"class_list":{"0":"post-514568","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040","7":"product_cat-csa","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/514568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/514580"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=514568"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=514568"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=514568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}