Imperceptible watermark for a game-theoretic watermarking system

被引:6
|
作者
Vaidya, S. Prasanth [1 ]
Mouli, P. V. S. S. R. Chandra [1 ]
Santosh, K. C. [2 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[2] Univ South Dakota, Dept Comp Sci, 414 E Clark St, Vermillion, SD 57069 USA
关键词
Game theory; Watermarking; Discrete wavelet transform; Iterative elimination of strictly dominant strategies; IMAGE WATERMARKING;
D O I
10.1007/s13042-018-0813-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper advances the game-theoretic approaches to design a robust watermarking scheme for embedding watermark in an image in discrete wavelet transform (DWT) domain. A reliable architecture for imperceptible watermarking system that provides an optimal solution for decision makers is proposed. Using iterative Elimination of strictly dominant strategies (IESDS), an optimal solution is computed to attain the best trade-off between embedding and extraction of the watermark. Under different attacks and strategies, embedder could be able to obtain the best strategy. Experimental results attested the fact that the proposed approach is robust to various signal and image processing attacks.
引用
收藏
页码:1323 / 1339
页数:17
相关论文
共 50 条
  • [31] Counterterrorism - A game-theoretic analysis
    Arce, DG
    Sandler, T
    JOURNAL OF CONFLICT RESOLUTION, 2005, 49 (02) : 183 - 200
  • [32] A game-theoretic analysis of skyscrapers
    Helsley, Robert W.
    Strange, William C.
    JOURNAL OF URBAN ECONOMICS, 2008, 64 (01) : 49 - 64
  • [33] SOME GAME-THEORETIC PROBLEMS
    RATNER, LT
    AMERICAN MATHEMATICAL MONTHLY, 1967, 74 (07): : 902 - &
  • [34] Desuetudo: A Game-Theoretic Approach
    Faroldi, Federico L. G.
    ARCHIV FUR RECHTS- UND SOZIALPHILOSOPHIE, 2021, 107 (02): : 289 - 299
  • [35] A Collaboration Scheme for Controlling Multimanipulator System: A Game-Theoretic Perspective
    Zhang, Jiazheng
    Jin, Long
    Wang, Yang
    Yang, Chenguang
    IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2023, 28 (01) : 128 - 139
  • [36] A Game-Theoretic Approach for Deceiving Remote Operating System Fingerprinting
    Rahman, Mohammad Ashiqur
    Manshaei, Mohammad Hossein
    Al-Shaer, Ehab
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 73 - 81
  • [37] Decentralized admission control of a queueing system: A game-theoretic model
    Lin, KY
    NAVAL RESEARCH LOGISTICS, 2003, 50 (07) : 702 - 718
  • [38] Game-Theoretic System Design for Non-Cooperative Scenarios
    Colombi, John M.
    Donohoo, Benjamin C.
    2023 IEEE INTERNATIONAL SYSTEMS CONFERENCE, SYSCON, 2023,
  • [39] Game-theoretic modeling of the behavior of Domain Name System attacker
    Al Abri, Abdul Aziz
    Al Maashri, Ahmed
    Ould-Khaoua, Mohamed
    Bourdoucen, Hadj
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 87
  • [40] Game-Theoretic Analysis of System of Systems with Inherent Robustness Parameters
    He, Fei
    Rao, Nageswara S. V.
    Ma, Chris Y. T.
    2017 20TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2017, : 1822 - 1830