A game-theoretic framework for the security system of visible watermarking

被引:7
作者
Tsai, Min-Jen [1 ]
Liu, Jung [1 ]
Wang, Chen-Sheng [1 ]
机构
[1] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu 300, Taiwan
关键词
Copyright protection; Game theory; Nash equilibrium; Digital watermarking; Wavelet;
D O I
10.1016/j.eswa.2010.10.058
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Perfect digital watermarking systems are contained two characteristics. One is the robustness that it need be resistant to geometric attacks in addition to common image processing tasks, such as JPEG compression. The other one is to preserve the image quality after embedding. However, the requirement of robustness and quality for watermark are conflicted with each other. How to determine the equilibrium of optimal security strategies between encoder and attacker and the optimal tradeoff between the intensity of embedded watermark and the perceptual translucence for visible watermark is still remained as one of the most challenging research topics in image watermarking. Therefore, in order to achieve the best tradeoff between the embedding energy of watermark, the quality of perceptual watermark translucence and the image fidelity after attacks, we propose a system architecture which is based on the game-theoretic approach that provides an optimum solution for the decision maker by studying the intensity and perceptual efficiency. The game-theoretic approach determines the transmission strategy using utility optimization according to the fluctuation of watermark states. The watermark embedding problem is formulated as a dynamic non-cooperative game with complete information while the optimal strategy is defined by the Nash equilibrium of the game. The experimental results demonstrate the feasibility of the proposed approach which allows the watermark encoder to obtain the best adaptive watermarking strategy in the different texture under attacks. Additionally, we demonstrate that the proposed system could help each user to choose the optimal transmission power to maximize its utility based on other constant parameters and resolve security issue of visual communication. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:5748 / 5754
页数:7
相关论文
共 10 条
[1]  
[Anonymous], 2003, An Introduction to Game Theory
[2]  
Chen PM, 2000, 2000 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I-III, P910, DOI 10.1109/ICOSP.2000.891668
[3]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[4]  
Cox Ingemar, 2007, Digital watermarking and steganography
[5]   A contrast-sensitive visible watermarking scheme [J].
Huang, BB ;
Tang, SX .
IEEE MULTIMEDIA, 2006, 13 (02) :60-66
[6]   Special issue on enabling security technologies, for digital rights management [J].
Kundur, D ;
Lin, CY ;
Macq, B ;
Yu, H .
PROCEEDINGS OF THE IEEE, 2004, 92 (06) :879-882
[7]  
Mohanty SP, 2000, 2000 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, PROCEEDINGS VOLS I-III, P1029, DOI 10.1109/ICME.2000.871535
[8]   A visible watermarking algorithm based on the content and contrast aware (COCOA) technique [J].
Tsai, Min-Jen .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2009, 20 (05) :323-338
[9]  
TSAI MJ, 2010, MULTIMEDIA FORENSICS
[10]  
*USC SIPI, USC SIPI IMAG DAT