Svd-based Tamper Proofing of Multi-attribute Motion Data
نویسندگان
چکیده
Repositories of motion captured (MoCap) data can be reused for human motion analysis in physical medicine, biomechanics and animation related entertainment industry. MoCap data expressed as a matrix Mm x n can be subject to tampering from shuffling of its elements or change in element values due to motion editing operations. Tampering of archived motion data intentionally or due to machine/human errors, may result in loss of research, money and effort. The paper proposes singular value decomposition (SVD) based methodology for tamper proofing motion data. This tamper proofing methodology extracts reference patterns in the form of right and left singular vectors of motion data matrix M. These patterns are used to verify and trace the pattern of tampering. The use of first Eigen vectors for tamper detection reduces storage and computation complexities to O (m + n) and makes the solution scalable.
منابع مشابه
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermarks are embedded using clusters points, where a bit is encoded in each cluster. The four point encoding mechanism uses a combination of one point encoding and three point encoding schemes. Using these schemes it is poss...
متن کاملTowards a Telltale Watermarking Technique for Tamper-Proofing - Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on
In this paper we present a novel fragile watermarking scheme for the tamper-proofing of multimedia signals. Unlike previously proposed techniques, the novel approach provides spatial and frequency domain information on how the signal is modified. We call such a technique a telltale tamper-proofing method. Our design embeds a fragile watermark in the discrete wavelet domain of the signal by quan...
متن کاملH Function based Tamper-proofing Software Watermarking Scheme
A novel constant tamper-proofing software watermark technique based on H encryption function is presented. First we split the watermark into smaller pieces before encoding them using CLOC scheme. With the watermark pieces, a many-to-one function (H function) as the decoding function is constructed in order to avoid the pattern-matching or reverse engineering attack. The results of the function ...
متن کاملA Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against...
متن کاملPermutation-Based Semi-Fragile Watermark Scheme
Tamper proofing is a crucial problem in the watermarking application. Aiming at the credibility of multimedia, we present a semi-fragile watermark based on the image permutation. Watermarking detection is performed without resorting to the host image and it is only controlled by secrete keys, thus the whole scheme does not have certain security gaps. The simulation experiments show that it can ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006