A game-theoretic framework for the security system of visible watermarking

被引:7
|
作者
Tsai, Min-Jen [1 ]
Liu, Jung [1 ]
Wang, Chen-Sheng [1 ]
机构
[1] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu 300, Taiwan
关键词
Copyright protection; Game theory; Nash equilibrium; Digital watermarking; Wavelet;
D O I
10.1016/j.eswa.2010.10.058
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Perfect digital watermarking systems are contained two characteristics. One is the robustness that it need be resistant to geometric attacks in addition to common image processing tasks, such as JPEG compression. The other one is to preserve the image quality after embedding. However, the requirement of robustness and quality for watermark are conflicted with each other. How to determine the equilibrium of optimal security strategies between encoder and attacker and the optimal tradeoff between the intensity of embedded watermark and the perceptual translucence for visible watermark is still remained as one of the most challenging research topics in image watermarking. Therefore, in order to achieve the best tradeoff between the embedding energy of watermark, the quality of perceptual watermark translucence and the image fidelity after attacks, we propose a system architecture which is based on the game-theoretic approach that provides an optimum solution for the decision maker by studying the intensity and perceptual efficiency. The game-theoretic approach determines the transmission strategy using utility optimization according to the fluctuation of watermark states. The watermark embedding problem is formulated as a dynamic non-cooperative game with complete information while the optimal strategy is defined by the Nash equilibrium of the game. The experimental results demonstrate the feasibility of the proposed approach which allows the watermark encoder to obtain the best adaptive watermarking strategy in the different texture under attacks. Additionally, we demonstrate that the proposed system could help each user to choose the optimal transmission power to maximize its utility based on other constant parameters and resolve security issue of visual communication. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:5748 / 5754
页数:7
相关论文
共 50 条
  • [21] Community detection in networks: a game-theoretic framework
    Yan Chen
    Xuanyu Cao
    K. J. Ray Liu
    EURASIP Journal on Advances in Signal Processing, 2019
  • [22] MODULAR SYSTEM FOR IMAGE-ANALYSIS USING A GAME-THEORETIC FRAMEWORK
    BOZMA, HI
    DUNCAN, JS
    IMAGE AND VISION COMPUTING, 1992, 10 (06) : 431 - 443
  • [23] Community detection in networks: a game-theoretic framework
    Chen, Yan
    Cao, Xuanyu
    Liu, K. J. Ray
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2019, 2019 (01)
  • [24] A Game-Theoretic Approach for Network Security Using Honeypots
    Florea, Razvan
    Craus, Mitica
    FUTURE INTERNET, 2022, 14 (12):
  • [25] A GAME-THEORETIC FRAMEWORK FOR MULTI-USER MULTIMEDIA RATE ALLOCATION
    Chen, Yan
    Wang, Beibei
    Liu, K. J. Ray
    2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 1997 - 2000
  • [26] A new game-theoretic framework for maintenance strategy analysis
    Kim, JH
    Park, JB
    Park, JK
    Kim, BH
    2003 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-4, CONFERENCE PROCEEDINGS, 2003, : 641 - 641
  • [27] A new game-theoretic framework for maintenance strategy analysis
    Kim, JH
    Park, JB
    Park, JK
    Kim, BH
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2003, 18 (02) : 698 - 706
  • [28] A Game-Theoretic Framework for Interpretable Preference and Feature Learning
    Polato, Mirko
    Aiolli, Fabio
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2018, PT I, 2018, 11139 : 659 - 668
  • [29] Decentralized admission control of a queueing system: A game-theoretic model
    Lin, KY
    NAVAL RESEARCH LOGISTICS, 2003, 50 (07) : 702 - 718
  • [30] A Non-cooperative Game-Theoretic Framework for Sponsoring Content in the Internet Market
    Garmani, Hamid
    Omar, Driss Ait
    El Amrani, Mohamed
    Baslam, Mohamed
    Jourhmane, Mostafa
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2020, 16 (04) : 316 - 323