A game-theoretic framework for the security system of visible watermarking

被引:7
|
作者
Tsai, Min-Jen [1 ]
Liu, Jung [1 ]
Wang, Chen-Sheng [1 ]
机构
[1] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu 300, Taiwan
关键词
Copyright protection; Game theory; Nash equilibrium; Digital watermarking; Wavelet;
D O I
10.1016/j.eswa.2010.10.058
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Perfect digital watermarking systems are contained two characteristics. One is the robustness that it need be resistant to geometric attacks in addition to common image processing tasks, such as JPEG compression. The other one is to preserve the image quality after embedding. However, the requirement of robustness and quality for watermark are conflicted with each other. How to determine the equilibrium of optimal security strategies between encoder and attacker and the optimal tradeoff between the intensity of embedded watermark and the perceptual translucence for visible watermark is still remained as one of the most challenging research topics in image watermarking. Therefore, in order to achieve the best tradeoff between the embedding energy of watermark, the quality of perceptual watermark translucence and the image fidelity after attacks, we propose a system architecture which is based on the game-theoretic approach that provides an optimum solution for the decision maker by studying the intensity and perceptual efficiency. The game-theoretic approach determines the transmission strategy using utility optimization according to the fluctuation of watermark states. The watermark embedding problem is formulated as a dynamic non-cooperative game with complete information while the optimal strategy is defined by the Nash equilibrium of the game. The experimental results demonstrate the feasibility of the proposed approach which allows the watermark encoder to obtain the best adaptive watermarking strategy in the different texture under attacks. Additionally, we demonstrate that the proposed system could help each user to choose the optimal transmission power to maximize its utility based on other constant parameters and resolve security issue of visual communication. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:5748 / 5754
页数:7
相关论文
共 50 条
  • [1] Imperceptible watermark for a game-theoretic watermarking system
    Vaidya, S. Prasanth
    Mouli, P. V. S. S. R. Chandra
    Santosh, K. C.
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2019, 10 (06) : 1323 - 1339
  • [2] Imperceptible watermark for a game-theoretic watermarking system
    S. Prasanth Vaidya
    P. V. S. S. R. Chandra Mouli
    K. C. Santosh
    International Journal of Machine Learning and Cybernetics, 2019, 10 : 1323 - 1339
  • [3] A game-theoretic architecture for visible watermarking system of ACOCOA (adaptive content and contrast aware) technique
    Tsai, Min-Jen
    Liu, Jung
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2011,
  • [4] A game-theoretic architecture for visible watermarking system of ACOCOA (adaptive content and contrast aware) technique
    Min-Jen Tsai
    Jung Liu
    EURASIP Journal on Advances in Signal Processing, 2011
  • [5] Game-theoretic Analysis to Parameterized Reversible Watermarking
    Wu, Hanzhou
    Zhang, Xinpeng
    IETE TECHNICAL REVIEW, 2021, 38 (01) : 26 - 35
  • [6] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [7] A game-theoretic security framework for quantum cryptography: Performance analysis and application
    Songyang Han
    Walter O. Krawec
    Fei Miao
    Quantum Information Processing, 2020, 19
  • [8] A game-theoretic security framework for quantum cryptography: Performance analysis and application
    Han, Songyang
    Krawec, Walter O.
    Miao, Fei
    QUANTUM INFORMATION PROCESSING, 2020, 19 (10)
  • [9] On Game-Theoretic Network Security Provisioning
    Stefan Rass
    Journal of Network and Systems Management, 2013, 21 : 47 - 64
  • [10] On Game-Theoretic Network Security Provisioning
    Rass, Stefan
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (01) : 47 - 64