Tamper proofing mechanisms for motion capture data

Repositories of motion captured (Mocap) data can be reused for human motion analysis in physical medicine, biomechanics, and animation related entertainment industry. Mocap data expressed as a matrix can be subject to tampering from shuffling of its elements or change in element values due to motion editing operations. Tampering of the archival system intentionally or due to machine/human errors, may result in loss of research, money and effort. In order to detect and correct errors induced due to tampering; this paper proposes a tamper proofing methodology that combines hash function and watermarking based methods. These patterns (fingerprints) resulting from hash functions help in error detection by identifying the type of attack such as row shuffling, column shuffling, row element shuffling, column element shuffling and their combinations. Random attacks that change data element values are detected by change in watermarks embedded in data elements. Finger prints help in solving the attacks reversal such as column shuffling and element shuffling, whereas watermarking helps in reversing attacks such as column element or row element shuffling. As compared to other attacks, random attacks cannot be reversed, and can be improved using interpolation. Analysis shows that the proposed method uses O(n) space to detect and correct errors, and the time complexity for correction varying from o(n log n) to O(n!).

[1]  Colin Perkins,et al.  A survey of packet loss recovery techniques for streaming audio , 1998 .

[2]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[3]  Boon-Lock Yeo,et al.  Fragile watermarking of three-dimensional objects , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[4]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[5]  Zixiang Xiong,et al.  Error concealment of MPEG-2 AAC audio using modulo watermarks , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[6]  Hao-Tian Wu,et al.  A fragile watermarking scheme for 3D meshes , 2005, MM&Sec '05.

[7]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[8]  Bruce S. Davie,et al.  Computer Networks: A Systems Approach , 1996 .

[9]  Jaejin Lee,et al.  A watermarking sequence using parities of error control coding for image authentication and correction , 2000, IEEE Trans. Consumer Electron..

[10]  C.-C.J. Kuo,et al.  Fragile speech watermarking for content integrity verification , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[11]  Parag Agarwal,et al.  SVD-based tamper proofing of multi-attribute motion data , 2006 .

[12]  Sushil Jajodia,et al.  Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.

[13]  A. Aydin Alatan,et al.  Error concealment of video sequences by data hiding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[14]  V. Hardman,et al.  A survey of packet loss recovery techniques for streaming audio , 1998, IEEE Network.

[15]  J. Bibb Cain,et al.  Error-Correction Coding for Digital Communications , 1981 .

[16]  Philip Ogunbona,et al.  Fragile Watermark on Critical Points , 2002 .

[17]  Edward J. Delp,et al.  A Review of Fragile Image Watermarks , 2007 .

[18]  Chun-Shien Lu Wireless multimedia error resilience via a data hiding technique , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[19]  Bruce S. Davie,et al.  Computer Networks: A Systems Approach, 3rd Edition , 2003 .

[20]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[21]  B. Prabhakaran,et al.  Tamper Proofing 3D Motion Data Streams , 2007, MMM.

[22]  Hitoshi Kiya,et al.  Error Concealment Using a Digital Watermarking Technique for Interframe Video Coding , 2002 .

[23]  Henri Maitre,et al.  Watermarking 3D triangle meshes for authentication and integrity , 2004 .

[24]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).