A game-theoretic framework for the security system of visible watermarking

被引:7
|
作者
Tsai, Min-Jen [1 ]
Liu, Jung [1 ]
Wang, Chen-Sheng [1 ]
机构
[1] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu 300, Taiwan
关键词
Copyright protection; Game theory; Nash equilibrium; Digital watermarking; Wavelet;
D O I
10.1016/j.eswa.2010.10.058
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Perfect digital watermarking systems are contained two characteristics. One is the robustness that it need be resistant to geometric attacks in addition to common image processing tasks, such as JPEG compression. The other one is to preserve the image quality after embedding. However, the requirement of robustness and quality for watermark are conflicted with each other. How to determine the equilibrium of optimal security strategies between encoder and attacker and the optimal tradeoff between the intensity of embedded watermark and the perceptual translucence for visible watermark is still remained as one of the most challenging research topics in image watermarking. Therefore, in order to achieve the best tradeoff between the embedding energy of watermark, the quality of perceptual watermark translucence and the image fidelity after attacks, we propose a system architecture which is based on the game-theoretic approach that provides an optimum solution for the decision maker by studying the intensity and perceptual efficiency. The game-theoretic approach determines the transmission strategy using utility optimization according to the fluctuation of watermark states. The watermark embedding problem is formulated as a dynamic non-cooperative game with complete information while the optimal strategy is defined by the Nash equilibrium of the game. The experimental results demonstrate the feasibility of the proposed approach which allows the watermark encoder to obtain the best adaptive watermarking strategy in the different texture under attacks. Additionally, we demonstrate that the proposed system could help each user to choose the optimal transmission power to maximize its utility based on other constant parameters and resolve security issue of visual communication. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:5748 / 5754
页数:7
相关论文
共 50 条
  • [41] A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (03) : 854 - 867
  • [42] Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM
    Zhang, Zhiyong
    Pei, Qingqi
    Ma, Jianfeng
    Yang, Lin
    Fan, Kefeng
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1133 - +
  • [43] Towards a Game-Theoretic Security Analysis of Off-Chain Protocols
    Rain, Sophie
    Avarikioti, Georgia
    Kovacs, Laura
    Maffei, Matteo
    2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, : 107 - 122
  • [44] Information sharing and security investment for substitutable firms: A game-theoretic analysis
    Gao, Xing
    Gong, Siyu
    Wang, Ying
    Zhang, Yanfang
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2024, 75 (04) : 799 - 820
  • [45] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    M. Pilz
    F. Baghaei Naeini
    K. Grammont
    C. Smagghe
    M. Davis
    J.-C. Nebel
    L. Al-Fagih
    E. Pfluegel
    International Journal of Information Security, 2020, 19 : 427 - 443
  • [46] UAV SECaaS: Game-Theoretic Formulation for Security as a Service in UAV Swarms
    Bansal, Gaurang
    Chamola, Vinay
    Sikdar, Biplab
    Yu, Fei Richard
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6209 - 6218
  • [47] Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach
    Jin, Richeng
    He, Xiaofan
    Dai, Huaiyu
    Dutta, Rudra
    Ning, Peng
    2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 72 - 83
  • [48] Game-Theoretic Security of Commitment Protocols under a Realistic Cost Model
    Komatsubara, Tsuyoshi
    Manabe, Yoshifumi
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 776 - 783
  • [49] A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications
    Abdalzaher, Mohamed S.
    Muta, Osamu
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11): : 11250 - 11261
  • [50] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    Pilz, M.
    Naeini, F. Baghaei
    Grammont, K.
    Smagghe, C.
    Davis, M.
    Nebel, J. -C.
    Al-Fagih, L.
    Pfluegel, E.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) : 427 - 443