skip to main content
10.1145/1161366.1161407acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Robust blind watermarking mechanism for motion data streams

Published:26 September 2006Publication History

ABSTRACT

The commercial reuse of 3D motion capture (Mocap) data in animation and life sciences raises issues with respect to its copyright. In order to improvise content protection of Mocap data, we devise a substitutive blind watermarking technique. This technique visualizes 3D Mocap data as a series of non-intersecting cluster of triangles. Bits are encoded inside the triangles by using an extended substitutive bit encoder in spatial domain. The encoding supports watermark imperceptibility and develops robustness against affine transforms (rotation, translation, scaling), noise addition, reordering and sample loss attacks. Security of the scheme can be enhanced by adding secret embedding distances between clusters, which are based on a secret key used for watermarking purpose.

References

  1. Motion Builder - AutoDesk, http://www.autodesk.comGoogle ScholarGoogle Scholar
  2. B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. on Information Theory, vol 47, pp. 1423--1443, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Wang, Y. Cheng, "An Efficient Information Hiding Algorithm for Polygon Models", EuroGraphics 2005, Volume 24 Page 591 - September 2005.Google ScholarGoogle Scholar
  4. F. Cayre, O. Devillers, F. Schmitt and H. Maître, Watermarking 3D Triangle Meshes for Authentication and Integrity, INRIA Research Report RR-5223, Jun. 2004.Google ScholarGoogle Scholar
  5. F. Cayre, B. Macq, "Data hiding on 3-D triangle meshes", Signal Processing, IEEE Transactions on, Volume: 51 Issue: 4 Apr 2003, Page(s): 939--949. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller, Digital Watermarking: Principles & Practice (The Morgan Kaufmann Series in Multimedia and Information Systems).Google ScholarGoogle Scholar
  7. I. Cox, J. Kilian, F. Leigton, T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. Image Processing, 1996, vol. 6, pp. 1673--1687.Lamport, L. LaTeX User's Guide and Document Reference Manual. Addison-Wesley, Reading, MA, 1986.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Li C, Peng Zhai, S. Q. Zheng and B. Prabhakaran, Segmentation and Recognition of Multi-Attribute Motion Sequences, Proceedings of the ACM MM'04, New York, NY USA, pp.836--843, October 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Michael Arnold, Stephen D. Wolthusen, Martin Schmucker, 'Techniques and Applications of Digital Watermarking and Content Protection', Artech House Publishers (July 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Shuntaro Yamazaki, "Watermarking Motion Data", In Proc. Pacific Rim Workshop on Digital Steganography (STEG04), pp.177--185, Nov 2004.Google ScholarGoogle Scholar
  11. Tae-hoon Kim, Jehee Lee, Sung yong Shin, Robust Motion Watermarking based on Multiresolution Analysis, Computer Graphics Forum, Vol. 19 No. 3, pp. 189--198, 2000 (Proc. EUROGRAPHICS '2000).Google ScholarGoogle ScholarCross RefCross Ref
  12. Vicon, http://www.vicon.comGoogle ScholarGoogle Scholar

Index Terms

  1. Robust blind watermarking mechanism for motion data streams

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MM&Sec '06: Proceedings of the 8th workshop on Multimedia and security
      September 2006
      244 pages
      ISBN:1595934936
      DOI:10.1145/1161366

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 September 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader