Skip to main content
Erschienen in: International Journal of Machine Learning and Cybernetics 6/2019

03.04.2018 | Original Article

Imperceptible watermark for a game-theoretic watermarking system

verfasst von: S. Prasanth Vaidya, P. V. S. S. R. Chandra Mouli, K. C. Santosh

Erschienen in: International Journal of Machine Learning and Cybernetics | Ausgabe 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper advances the game-theoretic approaches to design a robust watermarking scheme for embedding watermark in an image in discrete wavelet transform (DWT) domain. A reliable architecture for imperceptible watermarking system that provides an optimal solution for decision makers is proposed. Using iterative Elimination of strictly dominant strategies (IESDS), an optimal solution is computed to attain the best trade-off between embedding and extraction of the watermark. Under different attacks and strategies, embedder could be able to obtain the best strategy. Experimental results attested the fact that the proposed approach is robust to various signal and image processing attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Agarwal C, Mishra A, Sharma A (2015) A novel gray-scale image watermarking using hybrid fuzzy-bpn architecture. Egypt Inf J 16(1):83–102CrossRef Agarwal C, Mishra A, Sharma A (2015) A novel gray-scale image watermarking using hybrid fuzzy-bpn architecture. Egypt Inf J 16(1):83–102CrossRef
2.
Zurück zum Zitat Ansari IA, Pant M, Ahn CW (2016) Svd based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybernet 7(6):1225–1239CrossRef Ansari IA, Pant M, Ahn CW (2016) Svd based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybernet 7(6):1225–1239CrossRef
3.
Zurück zum Zitat Barron EN (2013) Game theory: an introduction, vol. 2. Wiley Barron EN (2013) Game theory: an introduction, vol. 2. Wiley
4.
Zurück zum Zitat Billings SA (2013) Nonlinear system identification: NARMAX methods in the time, frequency, and spatio-temporal domains. Wiley Billings SA (2013) Nonlinear system identification: NARMAX methods in the time, frequency, and spatio-temporal domains. Wiley
6.
Zurück zum Zitat Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann
7.
Zurück zum Zitat Cox IJ, Kilian J, Leighton T, Shamoon T (1996) Secure spread spectrum watermarking for images, audio and video. In: Image Processing, 1996. Proceedings., International Conference on. vol. 3, pp 243–246. IEEE Cox IJ, Kilian J, Leighton T, Shamoon T (1996) Secure spread spectrum watermarking for images, audio and video. In: Image Processing, 1996. Proceedings., International Conference on. vol. 3, pp 243–246. IEEE
8.
Zurück zum Zitat Goteti AK, Moulin P (2004) Two private, perceptual data-hiding games. In: Acoustics, Speech, and Signal Processing, 2004. Proceedings.(ICASSP’04). IEEE International Conference on. vol. 3, pp iii–373. IEEE Goteti AK, Moulin P (2004) Two private, perceptual data-hiding games. In: Acoustics, Speech, and Signal Processing, 2004. Proceedings.(ICASSP’04). IEEE International Conference on. vol. 3, pp iii–373. IEEE
10.
Zurück zum Zitat Huang BB, Tang SX (2006) A contrast-sensitive visible watermarking scheme. IEEE Multimed 13(2):60–66CrossRef Huang BB, Tang SX (2006) A contrast-sensitive visible watermarking scheme. IEEE Multimed 13(2):60–66CrossRef
11.
Zurück zum Zitat Huynh-Thu Q, Ghanbari M (2008) Scope of validity of psnr in image/video quality assessment. Electron Lett 44(13):800–801CrossRef Huynh-Thu Q, Ghanbari M (2008) Scope of validity of psnr in image/video quality assessment. Electron Lett 44(13):800–801CrossRef
12.
Zurück zum Zitat Kundur D, Lin CY, Macq B, Yu HH (2004) Special issue on enabling security technologies for digital rights management. Proc IEEE 92(6):879–882CrossRef Kundur D, Lin CY, Macq B, Yu HH (2004) Special issue on enabling security technologies for digital rights management. Proc IEEE 92(6):879–882CrossRef
13.
Zurück zum Zitat Mehta R, Rajpal N, Vishwakarma VP (2015) A robust and efficient image watermarking scheme based on lagrangian svr and lifting wavelet transform. Int J Mach Learn Cybern 1–17 Mehta R, Rajpal N, Vishwakarma VP (2015) A robust and efficient image watermarking scheme based on lagrangian svr and lifting wavelet transform. Int J Mach Learn Cybern 1–17
14.
Zurück zum Zitat Mehta R, Rajpal N, Vishwakarma VP (2015) Robust image watermarking scheme in lifting wavelet domain using ga-lsvr hybridization. Int J Mach Learn Cybern 1–17 Mehta R, Rajpal N, Vishwakarma VP (2015) Robust image watermarking scheme in lifting wavelet domain using ga-lsvr hybridization. Int J Mach Learn Cybern 1–17
15.
Zurück zum Zitat Mohamed TM, Elmahdy HN, Onsi HM (2011) Efficient watermark detection by using the longest common substring technique. Egypt Inf J 12(2):115–123CrossRef Mohamed TM, Elmahdy HN, Onsi HM (2011) Efficient watermark detection by using the longest common substring technique. Egypt Inf J 12(2):115–123CrossRef
16.
Zurück zum Zitat Mohanty SP, Ramakrishnan KR, Kankanhalli MS (2000) A dct domain visible watermarking technique for images. In: 2000 IEEE International Conference on Multimedia and Expo, 2000. ICME 2000. vol 2, pp 1029–1032. IEEE Mohanty SP, Ramakrishnan KR, Kankanhalli MS (2000) A dct domain visible watermarking technique for images. In: 2000 IEEE International Conference on Multimedia and Expo, 2000. ICME 2000. vol 2, pp 1029–1032. IEEE
17.
Zurück zum Zitat Moon HS, You T, Sohn MH, Kim HS, Jang DS (2007) Expert system for low frequency adaptive image watermarking: using psychological experiments on human image perception. Expert Syst Appl 32(2):674–686CrossRef Moon HS, You T, Sohn MH, Kim HS, Jang DS (2007) Expert system for low frequency adaptive image watermarking: using psychological experiments on human image perception. Expert Syst Appl 32(2):674–686CrossRef
18.
Zurück zum Zitat Moulin P (2001) The role of information theory in watermarking and its application to image watermarking. Sig Process 81(6):1121–1139CrossRefMATH Moulin P (2001) The role of information theory in watermarking and its application to image watermarking. Sig Process 81(6):1121–1139CrossRefMATH
19.
Zurück zum Zitat Moulin P, Ivanovic A, Ivanovic A (2001) Game-theoretic analysis of watermark detection. ICIP (3):975–978. Citeseer Moulin P, Ivanovic A, Ivanovic A (2001) Game-theoretic analysis of watermark detection. ICIP (3):975–978. Citeseer
20.
Zurück zum Zitat Osborne MJ (2004) An introduction to game theory, vol 3. Oxford University Press, New York Osborne MJ (2004) An introduction to game theory, vol 3. Oxford University Press, New York
21.
Zurück zum Zitat Pal SK, Sarma SS (2012) Graph coloring approach for hiding of information. Proc Technol 4:272–277CrossRef Pal SK, Sarma SS (2012) Graph coloring approach for hiding of information. Proc Technol 4:272–277CrossRef
22.
Zurück zum Zitat Tadelis S (2013) Game theory: an introduction. Princeton University Press Tadelis S (2013) Game theory: an introduction. Princeton University Press
23.
Zurück zum Zitat Tian L, Zheng N, Xue J, Li C, Wang X (2011) An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection. Sig Process Image Commun 26(8):427–437CrossRef Tian L, Zheng N, Xue J, Li C, Wang X (2011) An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection. Sig Process Image Commun 26(8):427–437CrossRef
24.
Zurück zum Zitat Tsai MJ (2009) A visible watermarking algorithm based on the content and contrast aware (cocoa) technique. J Vis Commun Image Represent 20(5):323–338MathSciNetCrossRef Tsai MJ (2009) A visible watermarking algorithm based on the content and contrast aware (cocoa) technique. J Vis Commun Image Represent 20(5):323–338MathSciNetCrossRef
25.
Zurück zum Zitat Tsai MJ, Liu J, Wang CS (2011) A game-theoretic framework for the security system of visible watermarking. Expert Syst Appl 38(5):5748–5754CrossRef Tsai MJ, Liu J, Wang CS (2011) A game-theoretic framework for the security system of visible watermarking. Expert Syst Appl 38(5):5748–5754CrossRef
26.
Zurück zum Zitat Vaidya SP, Mouli PC (2015) Adaptive digital watermarking for copyright protection of digital images in wavelet domain. Proc Comput Sci 58:233–240CrossRef Vaidya SP, Mouli PC (2015) Adaptive digital watermarking for copyright protection of digital images in wavelet domain. Proc Comput Sci 58:233–240CrossRef
27.
Zurück zum Zitat Vorobeychik Y, Wellman MP, Singh S (2007) Learning payoff functions in infinite games. Mach Learn 67(1–2):145–168CrossRef Vorobeychik Y, Wellman MP, Singh S (2007) Learning payoff functions in infinite games. Mach Learn 67(1–2):145–168CrossRef
28.
Zurück zum Zitat Wang XY, Miao EN, Yang HY (2012) A new svm-based image watermarking using Gaussian–Hermite moments. Appl Soft Comput 12(2):887–903CrossRef Wang XY, Miao EN, Yang HY (2012) A new svm-based image watermarking using Gaussian–Hermite moments. Appl Soft Comput 12(2):887–903CrossRef
Metadaten
Titel
Imperceptible watermark for a game-theoretic watermarking system
verfasst von
S. Prasanth Vaidya
P. V. S. S. R. Chandra Mouli
K. C. Santosh
Publikationsdatum
03.04.2018
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Machine Learning and Cybernetics / Ausgabe 6/2019
Print ISSN: 1868-8071
Elektronische ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-018-0813-x

Weitere Artikel der Ausgabe 6/2019

International Journal of Machine Learning and Cybernetics 6/2019 Zur Ausgabe

Neuer Inhalt