Skip to main content
Log in

Imperceptible watermark for a game-theoretic watermarking system

  • Original Article
  • Published:
International Journal of Machine Learning and Cybernetics Aims and scope Submit manuscript

Abstract

This paper advances the game-theoretic approaches to design a robust watermarking scheme for embedding watermark in an image in discrete wavelet transform (DWT) domain. A reliable architecture for imperceptible watermarking system that provides an optimal solution for decision makers is proposed. Using iterative Elimination of strictly dominant strategies (IESDS), an optimal solution is computed to attain the best trade-off between embedding and extraction of the watermark. Under different attacks and strategies, embedder could be able to obtain the best strategy. Experimental results attested the fact that the proposed approach is robust to various signal and image processing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Agarwal C, Mishra A, Sharma A (2015) A novel gray-scale image watermarking using hybrid fuzzy-bpn architecture. Egypt Inf J 16(1):83–102

    Article  Google Scholar 

  2. Ansari IA, Pant M, Ahn CW (2016) Svd based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybernet 7(6):1225–1239

    Article  Google Scholar 

  3. Barron EN (2013) Game theory: an introduction, vol. 2. Wiley

  4. Billings SA (2013) Nonlinear system identification: NARMAX methods in the time, frequency, and spatio-temporal domains. Wiley

  5. Chen YC, Van Long N, Luo X (2007) Iterated strict dominance in general games. Games Econ Behav 61(2):299–315

    Article  MathSciNet  MATH  Google Scholar 

  6. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann

  7. Cox IJ, Kilian J, Leighton T, Shamoon T (1996) Secure spread spectrum watermarking for images, audio and video. In: Image Processing, 1996. Proceedings., International Conference on. vol. 3, pp 243–246. IEEE

  8. Goteti AK, Moulin P (2004) Two private, perceptual data-hiding games. In: Acoustics, Speech, and Signal Processing, 2004. Proceedings.(ICASSP’04). IEEE International Conference on. vol. 3, pp iii–373. IEEE

  9. Hofbauer J, Weibull JW (1996) Evolutionary selection against dominated strategies. J Econ Theory 71(2):558–573

    Article  MathSciNet  MATH  Google Scholar 

  10. Huang BB, Tang SX (2006) A contrast-sensitive visible watermarking scheme. IEEE Multimed 13(2):60–66

    Article  Google Scholar 

  11. Huynh-Thu Q, Ghanbari M (2008) Scope of validity of psnr in image/video quality assessment. Electron Lett 44(13):800–801

    Article  Google Scholar 

  12. Kundur D, Lin CY, Macq B, Yu HH (2004) Special issue on enabling security technologies for digital rights management. Proc IEEE 92(6):879–882

    Article  Google Scholar 

  13. Mehta R, Rajpal N, Vishwakarma VP (2015) A robust and efficient image watermarking scheme based on lagrangian svr and lifting wavelet transform. Int J Mach Learn Cybern 1–17

  14. Mehta R, Rajpal N, Vishwakarma VP (2015) Robust image watermarking scheme in lifting wavelet domain using ga-lsvr hybridization. Int J Mach Learn Cybern 1–17

  15. Mohamed TM, Elmahdy HN, Onsi HM (2011) Efficient watermark detection by using the longest common substring technique. Egypt Inf J 12(2):115–123

    Article  Google Scholar 

  16. Mohanty SP, Ramakrishnan KR, Kankanhalli MS (2000) A dct domain visible watermarking technique for images. In: 2000 IEEE International Conference on Multimedia and Expo, 2000. ICME 2000. vol 2, pp 1029–1032. IEEE

  17. Moon HS, You T, Sohn MH, Kim HS, Jang DS (2007) Expert system for low frequency adaptive image watermarking: using psychological experiments on human image perception. Expert Syst Appl 32(2):674–686

    Article  Google Scholar 

  18. Moulin P (2001) The role of information theory in watermarking and its application to image watermarking. Sig Process 81(6):1121–1139

    Article  MATH  Google Scholar 

  19. Moulin P, Ivanovic A, Ivanovic A (2001) Game-theoretic analysis of watermark detection. ICIP (3):975–978. Citeseer

  20. Osborne MJ (2004) An introduction to game theory, vol 3. Oxford University Press, New York

    Google Scholar 

  21. Pal SK, Sarma SS (2012) Graph coloring approach for hiding of information. Proc Technol 4:272–277

    Article  Google Scholar 

  22. Tadelis S (2013) Game theory: an introduction. Princeton University Press

  23. Tian L, Zheng N, Xue J, Li C, Wang X (2011) An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection. Sig Process Image Commun 26(8):427–437

    Article  Google Scholar 

  24. Tsai MJ (2009) A visible watermarking algorithm based on the content and contrast aware (cocoa) technique. J Vis Commun Image Represent 20(5):323–338

    Article  MathSciNet  Google Scholar 

  25. Tsai MJ, Liu J, Wang CS (2011) A game-theoretic framework for the security system of visible watermarking. Expert Syst Appl 38(5):5748–5754

    Article  Google Scholar 

  26. Vaidya SP, Mouli PC (2015) Adaptive digital watermarking for copyright protection of digital images in wavelet domain. Proc Comput Sci 58:233–240

    Article  Google Scholar 

  27. Vorobeychik Y, Wellman MP, Singh S (2007) Learning payoff functions in infinite games. Mach Learn 67(1–2):145–168

    Article  Google Scholar 

  28. Wang XY, Miao EN, Yang HY (2012) A new svm-based image watermarking using Gaussian–Hermite moments. Appl Soft Comput 12(2):887–903

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. C. Santosh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vaidya, S.P., Mouli, P.V.S.S.R.C. & Santosh, K.C. Imperceptible watermark for a game-theoretic watermarking system. Int. J. Mach. Learn. & Cyber. 10, 1323–1339 (2019). https://doi.org/10.1007/s13042-018-0813-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13042-018-0813-x

Keywords

Navigation