Imperceptible watermark for a game-theoretic watermarking system

被引:6
|
作者
Vaidya, S. Prasanth [1 ]
Mouli, P. V. S. S. R. Chandra [1 ]
Santosh, K. C. [2 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[2] Univ South Dakota, Dept Comp Sci, 414 E Clark St, Vermillion, SD 57069 USA
关键词
Game theory; Watermarking; Discrete wavelet transform; Iterative elimination of strictly dominant strategies; IMAGE WATERMARKING;
D O I
10.1007/s13042-018-0813-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper advances the game-theoretic approaches to design a robust watermarking scheme for embedding watermark in an image in discrete wavelet transform (DWT) domain. A reliable architecture for imperceptible watermarking system that provides an optimal solution for decision makers is proposed. Using iterative Elimination of strictly dominant strategies (IESDS), an optimal solution is computed to attain the best trade-off between embedding and extraction of the watermark. Under different attacks and strategies, embedder could be able to obtain the best strategy. Experimental results attested the fact that the proposed approach is robust to various signal and image processing attacks.
引用
收藏
页码:1323 / 1339
页数:17
相关论文
共 50 条
  • [31] Game-theoretic integration for image segmentation
    Chakraborty, A
    Duncan, JS
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1999, 21 (01) : 12 - 30
  • [32] A Game-theoretic Approach to Data Interaction
    McCamish, Ben
    Ghadakchi, Vahid
    Termehchy, Arash
    Touri, Behrouz
    Cotilla-Sanchez, Eduardo
    Huang, Liang
    Changpinyo, Soravit
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2020, 45 (01):
  • [33] A Game-theoretic Analysis of Hybrid Threats
    Balcaen, Pieter
    Bois, Cind Du
    Buts, Caroline
    DEFENCE AND PEACE ECONOMICS, 2022, 33 (01) : 26 - 41
  • [34] A Game-Theoretic Framework for Interference Avoidance
    Menon, R.
    MacKenzie, A. B.
    Hicks, J.
    Buehrer, R. M.
    Reed, J. H.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2009, 57 (04) : 1087 - 1098
  • [35] Deception in honeynets: A game-theoretic analysis
    Garg, Nandan
    Grosu, Daniel
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 107 - +
  • [36] Social Eavesdropping: A Game-Theoretic Analysis
    Mike Mesterton-Gibbons
    Tom N. Sherratt
    Bulletin of Mathematical Biology, 2007, 69 : 1255 - 1276
  • [37] Victory displays: a game-theoretic analysis
    Mesterton-Gibbons, Mike
    Sherratt, Tom N.
    BEHAVIORAL ECOLOGY, 2006, 17 (04) : 597 - 605
  • [38] Game Projection and Robustness for Game-Theoretic Autonomous Driving
    Liu, Mushuang
    Tseng, H. Eric
    Filev, Dimitar
    Girard, Anouck
    Kolmanovsky, Ilya
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (03) : 3446 - 3457
  • [39] Game-theoretic mechanism for cryptographic protocol
    Peng, C. (sci.cgpeng@gzu.edu.cn), 1600, Science Press (51): : 344 - 352
  • [40] A graphic measure for game-theoretic robustness
    Grim, Patrick
    Au, Randy
    Louie, Nancy
    Rosenberger, Robert
    Braynen, William
    Selinger, Evan
    Eason, Robb E.
    SYNTHESE, 2008, 163 (02) : 273 - 297