Nothing Special   »   [go: up one dir, main page]

Skip to main content

Optimal Data-Hiding Strategies for Games with BER Payoffs

  • Conference paper
Digital Watermarking (IWDW 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2939))

Included in the following conference series:

  • 1132 Accesses

Abstract

We analyze three different data hiding methods from a game-theoretic point of view, using the probability of bit error as the payoff. Those data hiding schemes can be regarded to as representatives of three families of methods: spread-spectrum, informed-embedding and hybrid. In all cases, we have obtained theoretical expressions for the BER which are then optimized to derive the strategies for both the attacker and the decoder, assuming that the embedder simply follows point-by-point constraints given by the perceptual mask. Experimental results supporting our analyses are also shown, with examples of watermarking in the spatial domain as well as the DCT domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cohen, A.S., Lapidoth, A.: The gaussian watermarking game. IEEE Transactions on Information Theory 48, 1639–1667 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  2. Eggers, J.J., Girod, B.: Informed Watermarking. Kluwer Academic Publishers, Dordrecht (2002)

    Google Scholar 

  3. Moulin, P., O’Sullivan, J.: Information-theoretic analysis of information hiding. IEEE Trans. on Information Theory (2003)

    Google Scholar 

  4. Moulin, P., Ivanovic, A.: The zero-rate spread-spectrum watermarking game. IEEE Trans. on Signal Processing (2003)

    Google Scholar 

  5. Hernández, J.R., Pérez-González, F.: Statistical analysis of watermarking schemes for copyright protection of images. Proceedings of the IEEE 87, 1142–1166 (1999); Special Issue on Identification and Protection of Multimedia Information

    Article  Google Scholar 

  6. Pérez-González, F., Balado, F., Hernández, J.R.: Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Trans. on Signal Processing (2003); Special Issue Signal Processing for Data Hiding in Digital Media & Secure Content Delivery

    Google Scholar 

  7. Hernández, J.R., Pérez-González, F., Rodr´ıguez, J.M., Nieto, G.: Performance analysis of a 2D-multipulse amplitude modulation scheme for data hiding and watermarking of still images. IEEE J. Select. Areas Commun. 16, 510–524 (1998)

    Article  Google Scholar 

  8. Vázquez-Méndez, M.E.: Análisis y control óptimo de problemas relacionados con la dispersión de contaminantes. PhD thesis, Universidade de Santiago de Compostela (1999)

    Google Scholar 

  9. Herskovits, J.: Feasible direction interior-point technique for nonlinear optimization. Journal of optimization theory and applications (1998)

    Google Scholar 

  10. Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory 47, 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  11. Pérez-González, F., Balado, F.: Nothing but a kiss: A novel and accurate approach to assessing the performance of multidimensional distortion-compensated dither modulation. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 87–105. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Pérez-González, F., Comesaña, P., Balado, F.: Dither-modulation data hiding with distortion-compensation: Exact performance analysis and an improved detector for jpeg attacks. In: Proc. of the IEEE International Conference on Image Processing (ICIP), Barcelona, Spain (September 2003)

    Google Scholar 

  13. Hernández, J.R., Amado, M., Pérez-González, F.: DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. on Image Processing 9, 55–68 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Comesaña, P., Pérez-González, F., Balado, F. (2004). Optimal Data-Hiding Strategies for Games with BER Payoffs. In: Kalker, T., Cox, I., Ro, Y.M. (eds) Digital Watermarking. IWDW 2003. Lecture Notes in Computer Science, vol 2939. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24624-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24624-4_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21061-0

  • Online ISBN: 978-3-540-24624-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics