A game-theoretic framework for the security system of visible watermarking

被引:7
|
作者
Tsai, Min-Jen [1 ]
Liu, Jung [1 ]
Wang, Chen-Sheng [1 ]
机构
[1] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu 300, Taiwan
关键词
Copyright protection; Game theory; Nash equilibrium; Digital watermarking; Wavelet;
D O I
10.1016/j.eswa.2010.10.058
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Perfect digital watermarking systems are contained two characteristics. One is the robustness that it need be resistant to geometric attacks in addition to common image processing tasks, such as JPEG compression. The other one is to preserve the image quality after embedding. However, the requirement of robustness and quality for watermark are conflicted with each other. How to determine the equilibrium of optimal security strategies between encoder and attacker and the optimal tradeoff between the intensity of embedded watermark and the perceptual translucence for visible watermark is still remained as one of the most challenging research topics in image watermarking. Therefore, in order to achieve the best tradeoff between the embedding energy of watermark, the quality of perceptual watermark translucence and the image fidelity after attacks, we propose a system architecture which is based on the game-theoretic approach that provides an optimum solution for the decision maker by studying the intensity and perceptual efficiency. The game-theoretic approach determines the transmission strategy using utility optimization according to the fluctuation of watermark states. The watermark embedding problem is formulated as a dynamic non-cooperative game with complete information while the optimal strategy is defined by the Nash equilibrium of the game. The experimental results demonstrate the feasibility of the proposed approach which allows the watermark encoder to obtain the best adaptive watermarking strategy in the different texture under attacks. Additionally, we demonstrate that the proposed system could help each user to choose the optimal transmission power to maximize its utility based on other constant parameters and resolve security issue of visual communication. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:5748 / 5754
页数:7
相关论文
共 50 条
  • [31] A Game-Theoretic Analysis of Adversarial Classification
    Dritsoula, Lemonia
    Loiseau, Patrick
    Musacchio, John
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (12) : 3094 - 3109
  • [32] Strategies in Dialogues: A Game-Theoretic Approach
    Kacprzak, Magdalena
    Dziubinski, Marcin
    Budzynska, Katarzyna
    COMPUTATIONAL MODELS OF ARGUMENT, 2014, 266 : 333 - 344
  • [33] Game Projection and Robustness for Game-Theoretic Autonomous Driving
    Liu, Mushuang
    Tseng, H. Eric
    Filev, Dimitar
    Girard, Anouck
    Kolmanovsky, Ilya
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (03) : 3446 - 3457
  • [34] Game-theoretic mechanism for cryptographic protocol
    Peng, C. (sci.cgpeng@gzu.edu.cn), 1600, Science Press (51): : 344 - 352
  • [35] A non-cooperative game-theoretic framework for resource allocation in network virtualization
    Seddiki, M. Said
    Frikha, Mounir
    Song, Ye-Qiong
    TELECOMMUNICATION SYSTEMS, 2016, 61 (02) : 209 - 219
  • [36] A non-cooperative game-theoretic framework for resource allocation in network virtualization
    M. Said Seddiki
    Mounir Frikha
    Ye-Qiong Song
    Telecommunication Systems, 2016, 61 : 209 - 219
  • [37] A Game-Theoretic Federated Learning Framework for Data Quality Improvement
    Zhang, Lefeng
    Zhu, Tianqing
    Xiong, Ping
    Zhou, Wanlei
    Yu, Philip S.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (11) : 10952 - 10966
  • [38] A Game-Theoretic Framework for Landmark-Based Image Segmentation
    Ibragimov, Bulat
    Likar, Bostjan
    Pernus, Franjo
    Vrtovec, Tomaz
    IEEE TRANSACTIONS ON MEDICAL IMAGING, 2012, 31 (09) : 1761 - 1776
  • [39] A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines
    Abrardo, Andrea
    Barni, Mauro
    Kallas, Kassem
    Tondi, Benedetta
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1333 - 1345
  • [40] An enriched game-theoretic framework for multi-objective clustering
    Badami, Mahsa
    Hamzeh, Ali
    Hashemi, Sattar
    APPLIED SOFT COMPUTING, 2013, 13 (04) : 1853 - 1868