A game-theoretic framework for the security system of visible watermarking

被引:7
|
作者
Tsai, Min-Jen [1 ]
Liu, Jung [1 ]
Wang, Chen-Sheng [1 ]
机构
[1] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu 300, Taiwan
关键词
Copyright protection; Game theory; Nash equilibrium; Digital watermarking; Wavelet;
D O I
10.1016/j.eswa.2010.10.058
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Perfect digital watermarking systems are contained two characteristics. One is the robustness that it need be resistant to geometric attacks in addition to common image processing tasks, such as JPEG compression. The other one is to preserve the image quality after embedding. However, the requirement of robustness and quality for watermark are conflicted with each other. How to determine the equilibrium of optimal security strategies between encoder and attacker and the optimal tradeoff between the intensity of embedded watermark and the perceptual translucence for visible watermark is still remained as one of the most challenging research topics in image watermarking. Therefore, in order to achieve the best tradeoff between the embedding energy of watermark, the quality of perceptual watermark translucence and the image fidelity after attacks, we propose a system architecture which is based on the game-theoretic approach that provides an optimum solution for the decision maker by studying the intensity and perceptual efficiency. The game-theoretic approach determines the transmission strategy using utility optimization according to the fluctuation of watermark states. The watermark embedding problem is formulated as a dynamic non-cooperative game with complete information while the optimal strategy is defined by the Nash equilibrium of the game. The experimental results demonstrate the feasibility of the proposed approach which allows the watermark encoder to obtain the best adaptive watermarking strategy in the different texture under attacks. Additionally, we demonstrate that the proposed system could help each user to choose the optimal transmission power to maximize its utility based on other constant parameters and resolve security issue of visual communication. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:5748 / 5754
页数:7
相关论文
共 50 条
  • [31] Game-Theoretic Approach Towards Network Security A Review
    Tom, Litti
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [32] A game-theoretic approach to stochastic security and dependability evaluation
    Sallhammar, Karin
    Helvik, Bjarne E.
    Knapskog, Sven J.
    DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 61 - +
  • [33] A Game-Theoretic Approach for Network Security Using Honeypots
    Florea, Razvan
    Craus, Mitica
    FUTURE INTERNET, 2022, 14 (12):
  • [34] A Game-theoretic Framework for Revenue Sharing in Edge-Cloud Computing System
    Cao, Zhi
    Zhang, Honggang
    Liu, Benyuan
    Sheng, Bo
    2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2018,
  • [35] Differential Game-Theoretic Framework for a Demand-side Energy Management System
    Arai, Ryohei
    Yamamoto, Koji
    Morikura, Masahiro
    2013 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2013, : 768 - 773
  • [36] Non-Cooperative Operators in a Game-Theoretic Framework
    Bennis, Mehdi
    Lara, Juan
    Tolli, Antti
    2008 IEEE 19TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2008, : 2065 - +
  • [37] An extension of duality and hierarchical decomposition to a game-theoretic framework
    Pavel, Lacra
    2005 44TH IEEE CONFERENCE ON DECISION AND CONTROL & EUROPEAN CONTROL CONFERENCE, VOLS 1-8, 2005, : 5317 - 5323
  • [38] A model of BDI-agent in game-theoretic framework
    Ambroszkiewicz, S
    Komar, J
    FORMAL MODELS OF AGENTS, 1999, 1760 : 8 - 19
  • [39] Distinctive human social motivations in a game-theoretic framework
    Ross, D
    BEHAVIORAL AND BRAIN SCIENCES, 2005, 28 (05) : 715 - +
  • [40] Game-Theoretic Framework for Integrity Verification in Computation Outsourcing
    Tang, Qiang
    Pejo, Balazs
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 472 - 473