Digital watermarking
Error-Correction Coding for Digital Communications
Error-Correction Coding for Digital Communications
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Computer Networks: A Systems Approach, 3rd Edition
Computer Networks: A Systems Approach, 3rd Edition
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
A fragile watermarking scheme for 3D meshes
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Tamper proofing 3d motion data streams
MMM'07 Proceedings of the 13th international conference on Multimedia Modeling - Volume Part I
IEEE Transactions on Information Theory
IEEE Transactions on Consumer Electronics
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Hi-index | 0.00 |
Repositories of motion captured (Mocap) data can be reused for human motion analysis in physical medicine, biomechanics, and animation related entertainment industry. Mocap data expressed as a matrix can be subject to tampering from shuffling of its elements or change in element values due to motion editing operations. Tampering of the archival system intentionally or due to machine/human errors, may result in loss of research, money and effort. In order to detect and correct errors induced due to tampering; this paper proposes a tamper proofing methodology that combines hash function and watermarking based methods. These patterns (fingerprints) resulting from hash functions help in error detection by identifying the type of attack such as row shuffling, column shuffling, row element shuffling, column element shuffling and their combinations. Random attacks that change data element values are detected by change in watermarks embedded in data elements. Finger prints help in solving the attacks reversal such as column shuffling and element shuffling, whereas watermarking helps in reversing attacks such as column element or row element shuffling. As compared to other attacks, random attacks cannot be reversed, and can be improved using interpolation. Analysis shows that the proposed method uses O(n) space to detect and correct errors, and the time complexity for correction varying from o(n log n) to O(n!).