[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1411328.1411346acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Tamper proofing mechanisms for motion capture data

Published: 22 September 2008 Publication History

Abstract

Repositories of motion captured (Mocap) data can be reused for human motion analysis in physical medicine, biomechanics, and animation related entertainment industry. Mocap data expressed as a matrix can be subject to tampering from shuffling of its elements or change in element values due to motion editing operations. Tampering of the archival system intentionally or due to machine/human errors, may result in loss of research, money and effort. In order to detect and correct errors induced due to tampering; this paper proposes a tamper proofing methodology that combines hash function and watermarking based methods. These patterns (fingerprints) resulting from hash functions help in error detection by identifying the type of attack such as row shuffling, column shuffling, row element shuffling, column element shuffling and their combinations. Random attacks that change data element values are detected by change in watermarks embedded in data elements. Finger prints help in solving the attacks reversal such as column shuffling and element shuffling, whereas watermarking helps in reversing attacks such as column element or row element shuffling. As compared to other attacks, random attacks cannot be reversed, and can be improved using interpolation. Analysis shows that the proposed method uses O(n) space to detect and correct errors, and the time complexity for correction varying from o(n log n) to O(n!).

References

[1]
A. Yilmaz and A. A. Alatan, "Error concealment of video sequences by data hiding," in Proc. Int. Conf. Image Processing, vol. 3, Sept. 2003, pp. 679--682.
[2]
Clark, George C., Jr., and J. Bibb Cain. Error-Correction Coding for Digital Communications. New York: Plenum Press, 1981. ISBN 0-306-40615-2.
[3]
C.-S. Lu, "Wireless multimedia error resilience via a data hiding technique," in Proc. Int. Workshop Multimedia Signal Processing Virgin Islands, Dec. 2002, pp. 316--319.
[4]
C. Perkins, O. Hodson, and V. Hardman, "A survey of packet-loss recovery techniques for streaming audio," IEEE Network Magazine, Sept./Oct. 1999
[5]
C-P Wu, C.-C. Jay Kuo, Fragile Speech Watermarking for Content Integrity Verification (2002), citeseer.ist.psu.edu/wu02fragile.html
[6]
Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. on Information Theory, vol 47, May 2001, pp. 1423--1443
[7]
C. S. Collberg, and C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection," IEEE Trans. Software Eng., Aug. 2002, pp. 735--746.
[8]
C. Kailasanathan, R. Safavi Naini, and P. Ogunbona, "Fragile Watermark on Critical Points", International Workshop on Digital Watermarking Seoul, Korea, (Springer-Verlag), November 21-23, 2002
[9]
D. Kundur and D. Hatzinakos, "Digital watermarking for telltale tamper proofing and authentication", Proceedings of the IEEE, vol. 87, no. 7, pp. 1167--1180, July 1999
[10]
E. T. Lin and E. J. Delp, "A review of fragile image watermarks", in Proc. of ACM Multimedia & Security Workshop, Orlando, 1999, pp. 25--29
[11]
F. Cayre, O. Devillers, F. Schmitt and H. Maître, "Watermarking 3-D Triangle Meshes for Authentication and Integrity", INRIA Research Report RR-5223, Jun. 2004
[12]
H. Golub and C. F. V. Loan. Matrix Computations. The Johns Hopkins University Press, Baltimore, Maryland, 1996
[13]
H. T. Wu and Y. M. Cheung, "A Fragile Watermarking Approach to 3-D Meshes Authentication", Proceedings of the 7th Workshop on Multimedia & Security (ACM '05), pp. 117--123, 2005.
[14]
I. Cox, M. Miller, J. Bloom, "Digital Watermarking: Principles & Practice" (The Morgan Kaufmann Series in Multimedia and Information Systems)
[15]
J. Lee and C. S. Won, "A watermarking sequence using parities of error control coding for image authentification and correction," IEEE Trans. Consum. Electron. vol. 46, no. 2, pp. 313--317, May 2000.
[16]
J. Fridrich, M. Goljan, and A. C. Baldoza, "New fragile authentication watermark for images," in Proc. IEEE Int. Conf. Image Processing, Vancouver, BC, Canada, Sept. 10--13, 2000.
[17]
K. Munadi, M. Kurosaki, and H. Kiya, "Error concealment using digital watermarking technique for interframe video coding," in Proc. Int. Tech. Conf. Circuits/Systems, Computers, and Communications, Jul. 2002, pp. 599--602.
[18]
L. L. Peterson, B. S. Davie, Computer Networks: A Systems Approach, 3rd Edition (The Morgan Kaufmann Series in Networking)
[19]
M. M. Yeung and B.-L. Yeo, "Fragile watermarking of three dimensional objects," Proc. 1998 Int'l Conf. Image Processing, ICIP'98, volume 2, pp. 442--446. IEEE Computer Society, 1998.
[20]
P. Agarwal, K. Adi, B. Prabhakaran, SVD-Based Tamper Proofing Of Multi-Attribute Motion Data", To appear in Proc. of The 12th International conference on Distributed Multimedia Systems (DMS) '06, pp. 46--52
[21]
P. Agarwal, and B.Prabhakaran, "Tamper Proofing of 3D Motion Data Streams", Proc.of Multimedia Modeling Conference, Jan 2007, pp. 731--740
[22]
S. Cheng, H. Yu, and Z. Xiong "Error concealment of MPEG-2 AAC audio using modulo watermarks," Circuits and Systems, 2002. ISCAS 2002. IEEE International Symposium on Publication Date: 2002 Volume: 2, On page(s): II-261--II-264 vol.2.
[23]
S Cheng,; Yu, H. H.; Xiong, Z; Method and apparatus for audio error concealment using data hiding, United States Patent, No. US 7047187B2, May 2006.
[24]
Vicon, http://www.vicon.com
[25]
Yingjiu Li, Vipin Swarup, Sushil Jajodia, "Fingerprinting Relational Databases: Schemes and Specialties," IEEE Transactions on Dependable and Secure Computing, vol. 02, no. 1, pp. 34--45, Jan-Mar, 2005

Cited By

View all
  • (2011)Watermarking space curves2011 IEEE Consumer Communications and Networking Conference (CCNC)10.1109/CCNC.2011.5766435(121-125)Online publication date: Jan-2011
  • (2010)Rights protection of trajectory datasets with nearest-neighbor preservationThe VLDB Journal — The International Journal on Very Large Data Bases10.1007/s00778-010-0178-619:4(531-556)Online publication date: 1-Aug-2010

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security
September 2008
242 pages
ISBN:9781605580586
DOI:10.1145/1411328
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 September 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. blind
  2. decoding
  3. encoding
  4. spatial
  5. watermarking

Qualifiers

  • Research-article

Conference

MM&Sec '08
Sponsor:
MM&Sec '08: Multimedia and Security Workshop
September 22 - 23, 2008
Oxford, United Kingdom

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2011)Watermarking space curves2011 IEEE Consumer Communications and Networking Conference (CCNC)10.1109/CCNC.2011.5766435(121-125)Online publication date: Jan-2011
  • (2010)Rights protection of trajectory datasets with nearest-neighbor preservationThe VLDB Journal — The International Journal on Very Large Data Bases10.1007/s00778-010-0178-619:4(531-556)Online publication date: 1-Aug-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media