skip to main content
article

Robust content-based MPEG-4 XMT scene structure authentication and multimedia content location

Published: 01 August 2007 Publication History

Abstract

For the past decade, there have been numerous research works focusing on the protection of digital images, audio, video, 3D virtual scenes, and software data from unauthorized use and distribution. With the emerging technology of the MPEG-4 standard, MPEG-4 scenes that may include images, video, audio, and 3D objects can easily be built using the text-based MPEG-4 XMT standard. XMT allows content authors to exchange their content with other authors, tools, or service providers and facilitates interoperability with MPEG-4, X3D, and SMIL. In order for owners and designers to protect and/or authenticate their work, some form of security needs to be applied into the MPEG-4 XMT structure and its media content. Unlike images or videos, watermarking an XMT structure is not an easy task, since the structure contains no noise components to embed the watermark. This article is the first one proposing a novel robust algorithm for the authentication of a given MPEG-4 XMT structured scene and the location of its multimedia content.

References

[1]
Babai, L. and Luks, E. 1983. Canonical labeling of graphs. In 15th Annual ACM Symposium on Theory of Computing. 171--183.
[2]
Balakrishnan, R., Selvam, A., and Yegnanaravanan, V. 1996. On felicitous labelings of graphs. In Proceedings of the National Workshop on Graph Theory and its Applications. 47--61.
[3]
Ball, J. R., Spittle, A. H., and Liu H. T. 1975. High-Speed m-sequence generation: A further note. Electron. Lett. 11, 107--108.
[4]
Beard, J. T. B. 1974. Computing in GF(q). Math. Comput. 28, 1159--1166.
[5]
Berlekamp, E. R. 1968. Algebraic Coding Theory. McGraw-Hill, New York.
[6]
Carter, D. E. 1974. On the generation of pseudo-noise codes. IEEE Trans. Aerospace Electron. Syst. 10, 898--899.
[7]
Cumming, I. G. 1967. Autocorrelation function and spectrum of a filtered, pseudorandom binary sequence. In Proc. Inst. Elect. Eng. 114, 1360--1362.
[8]
Darlagiannis, V. and Georganas, N. D. 2000. Virtual collaboration and media sharing using COSMOS. In Proceedings of the 4th World Multiconference on Circuits, Systems, Communications and Computers (CSCC) (Greece).
[9]
Deretsky, T., Lee, S. M., and Mitchem, J. 1991. On vertex prime labelings of graphs. In Graph Theory Combinatorics and Applications, vol. 1. Wiley, NewYork. 359--369.
[10]
Fredricsson, S. 1975. Pseudo-Randomness properties of binary shift register sequences. IEEE Trans. Inf. Theory 21, 115--120.
[11]
Golomb, S. W. 1972. How to number a graph. In Graph Theory and Computing. Academic Press, New York, 23--37.
[12]
Harvey, J. T. 1974. High-Speed m-sequence generation. Electron. Lett. 10, 480--481.
[13]
Hosseini, M. and Georganas, N. D. 2001. Suitability of MPEG4's BIFS for development of collaborative virtual environments. In IEEE International Workshop on Enabling Technologies for Collaborative Enterprises (WET ICE) (Cambridge, MA).
[14]
Inoue, S., Makino, K., Murase I., Takizawa, O., Matsumoto, T., and Nakagawa, H. 2002. A proposal on steganography methods using XML. In Proceedings of the Symposium on Cryptography and Information Security (Jan.) 301--306.
[15]
Inoue, S., Makino, K., Murase, I., Takizawa, O., Matsumoto, T., and Nakagawa, H. 2001. A proposal on information hiding method using XML. In the 1st Workshop on NLP and XML (Nov.).
[16]
ISO/IEC 14496-1. 1999. Information technology---Coding of audio-visual objects, Part 1: Systems (Jan.), section 9.2.1.1.
[17]
ISO/IEC 14772-1. 1997. Information technology---Computer graphics and image processing---The virtual reality modeling language (VRML)---Part 1: Functional specification and UTF-8 encoding.
[18]
Jinnah, M. I. and Singh, G. S. 1991. A note on arithmetic numberings of graphs. In Proceedings of the Symposium on Graphs and Combinatorics. 83--87.
[19]
Kim, M., Wood, S., and Cheok, L. 2000. Extensible MPEG-4 Textual Format (XMT). In Proceedings of the ACM Multimedia (Los Angeles, CA). 71--74.
[20]
Lang, A., Thiemert, S., Hauer, E., Liu, H., and Petitcolas, F. 2003. Authentication of MPEG-4 data: Risks and solutions. In Proceedings of the ISQT SPIE 17th Annual Symposium on Electronic Imaging Science and Technology, vol. 5020, 452--461.
[21]
Ma, X. 1988. A graceful numbering of a class of graphs. J. Math. Res. Expo. 215--216.
[22]
Petriu, E., Sakr, Z., Spoelder, H. J. W., and Moica, A. 2000. Object recognition using pseudorandom color encoded structured light. In Proceedings of the 17th Instrumentation and Measurment Technology Conference (Baltimore, MD, May). 1237--1241.
[23]
Roberts, P. D. and Davis, R. H. 1966. Statistical properties of smoothed maximal-length linear binary sequences. In Proc. Inst. Elec. Eng. 113, 190--196.
[24]
Sakr, Z. and Georganas, N. D. 2004a. A MPEG-4 XMT scene structure algorithm for authentication and copyright protection. In Proceedings of the IEEE 14th International Workshop on Research Issues on Data Engineering (RIDE WS-ECEG). (Mar.). 48--55.
[25]
Sakr, Z. and Georganas, N. D. 2004b. A MPEG-4 XMT algorithm for scene structure authentication and content location. In Proceedings of the Canadian Conference on Electrical and Computer Engineering (Niagara Falls, Canada, May).
[26]
Sion, R., Atallah, M., and Prabhakar, S. 2001. On watermarking semi-structures. Tech. Rep. CERIAS TR 2001-54.
[27]
SMIL. 1998. Synchronized multimedia integration language (SMIL) 1.0 specificatioin. W3C Recommendation (June). http://www.w3.org/TR/REC-smil/.
[28]
VRML-MPEG4 WG. 1998. Main differences between MPEG-4 and VRML97. http://www.web3d.org/WorkingGroups/vrml-mpeg4/differences.html.
[29]
Walsh, A. E. and Bourges-Sevenier, M. 2002. MPEG-4 jump start. Prentice-Hall, Upper Saddle River, NJ.
[30]
XML. 2001. Extensible Markup Language (XML) 1.0, 2nd ed. http://www.w3.org/TR/REC-xml.

Cited By

View all
  • (2021)Privacy-preserving Secure Media Streaming for Multi-user Smart EnvironmentsACM Transactions on Internet Technology10.1145/342304722:2(1-21)Online publication date: 22-Oct-2021
  • (2011)VRML animated model watermarking scheme using geometry and interpolator nodesComputer-Aided Design10.1016/j.cad.2011.03.00343:8(1056-1073)Online publication date: Aug-2011
  • (2009)MP4Stego: steganography in MPEG-4 videosInternational Journal of Advanced Media and Communication10.1504/IJAMC.2009.0287123:4(440-460)Online publication date: 1-Sep-2009
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 3, Issue 3
August 2007
155 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/1236471
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 2007
Published in TOMM Volume 3, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. MPEG-4
  2. Multimedia
  3. VRML
  4. XML
  5. XMT
  6. polynomial
  7. pseudorandom sequences
  8. steganography
  9. watermarking

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Privacy-preserving Secure Media Streaming for Multi-user Smart EnvironmentsACM Transactions on Internet Technology10.1145/342304722:2(1-21)Online publication date: 22-Oct-2021
  • (2011)VRML animated model watermarking scheme using geometry and interpolator nodesComputer-Aided Design10.1016/j.cad.2011.03.00343:8(1056-1073)Online publication date: Aug-2011
  • (2009)MP4Stego: steganography in MPEG-4 videosInternational Journal of Advanced Media and Communication10.1504/IJAMC.2009.0287123:4(440-460)Online publication date: 1-Sep-2009
  • (2008)MP4StegoProceedings of the 14th Brazilian Symposium on Multimedia and the Web10.1145/1666091.1666118(154-161)Online publication date: 26-Oct-2008
  • (2008)Video steganography for confidential documentsProceedings of the 26th annual ACM international conference on Design of communication10.1145/1456536.1456578(199-206)Online publication date: 22-Sep-2008

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media