132
Views
1
CrossRef citations to date
0
Altmetric
Articles

Game-theoretic Analysis to Parameterized Reversible Watermarking

ORCID Icon &

References

  • Z. Ni, Y. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., Vol. 16, no. 2, pp. 354–362, 2006.
  • V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst. Video Technol., Vol. 19, no. 7, pp. 989–999, 2009. doi: 10.1109/TCSVT.2009.2020257
  • J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” Proc. SPIE, Security and Watermarking of Multimedia Contents III, Vol. 3971, pp. 197–208, 2001. doi: 10.1117/12.435400
  • J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., Vol. 13, no. 8, pp. 890–896, 2003. doi: 10.1109/TCSVT.2003.815962
  • H. Wu, H. Wang, and Y. Shi, “PPE-based reversible data hiding,” In: Proc. ACM Workshop Inf. Hiding Multimed. Security, pp. 187–188, 2016. doi: 10.1145/2909827.2933196
  • H. Wu, H. Wang, and Y. Shi, “Dynamic content selection-and-prediction framework applied to reversible data hiding,” In: Proc. IEEE Workshop Inf. Forensics Security, pp. 1–6, 2016. Available: https://ieeexplore.ieee.org/document/7823903
  • W. Zhang, X. Hu, X. Li, and N. Yu, “Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression,” IEEE Trans. Image Process., Vol. 22, no. 7, pp. 2775–2785, 2013. doi: 10.1109/TIP.2013.2257814
  • J. M. Ettinger, “Steganalysis and game equilibria,” Proc. Int. Workshop Inf. Hiding, Vol. 1525, pp. 319–328, 1998.
  • P. Moulin, and J. A. O’Sullivan, “Information-theoretic analysis of information hiding,” IEEE Trans. Inf. Theory, Vol. 49, no. 3, pp. 563–593, 2003. doi: 10.1109/TIT.2002.808134
  • A. S. Baruch, and N. Merhav, “On the error exponent and capacity games of private watermarking systems,” IEEE Trans. Inf. Theory, Vol. 49, no. 3, pp. 537–562, 2003. doi: 10.1109/TIT.2002.808132
  • A. S. Cohen, and A. Lapidoth, “The Gaussian watermarking game,” IEEE Trans. Inf. Theory, Vol. 48, no. 6, pp. 1639–1667, 2002. doi: 10.1109/TIT.2002.1003844
  • M. Costa, “Writing on dirty paper,” IEEE Trans. Inf. Theory, Vol. 29, no. 3, pp. 439–441, 1983. doi: 10.1109/TIT.1983.1056659
  • A. S. Baruch, and N. Merhav, “On the capacity game of public watermarking systems,” IEEE Trans. Inf. Theory, Vol. 50, no. 3, pp. 511–524, 2004. doi: 10.1109/TIT.2004.824920
  • A. Ker, “Batch steganography and the threshold game,” Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505, pp. 0401–0413, 2007.
  • A. Ker, “Batch steganography and pooled steganalysis,” Proc. Int. Workshop Inf. Hiding, Vol. 4437, pp. 265–281, 2006.
  • P. Schöttle, and R. Böhme, “A game-theoretic approach to content-adaptive steganography,” In: Proc. Int. Workshop Inf. Hiding, pp. 125–141, 2012. Available: https://link.springer.com/chapter/10.1007/978-3-642-36373-3_9
  • B. Johnson, P. Schöttle, and R. Böhme, “Where to hide the bits,” Decision and Game Theory for Security (GameSec), pp. 1–17, 2012. Available: https://link.springer.com/chapter/10.1007%2F978-3-642-34266-0_1
  • T. Denemark, and J. Fridrich, “Detection of content adaptive LSB matching (a game theory appraoch),” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics, Vol. 9028, pp. 1–12, 2014.
  • P. Schöttle, A. Laszka, B. Johnson, J. Grossklags, and R. Böhme, “A game-theoretic analysis of content-adaptive steganography with independent embedding,” European Signal Process. Conference, pp. 1–5, 2013. Available: https://ieeexplore.ieee.org/document/6811726
  • P. Schöttle, and R. Böhme, “Game theory and adaptive steganography,” IEEE Trans. Inf. Forensics Security, Vol. 11, no. 4, pp. 760–773, 2016. doi: 10.1109/TIFS.2015.2509941
  • C. Qin, W. Zhang, F. Cao, X. Zhang, and C.-C. Chang, “Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection,” Signal Process., Vol. 153, pp. 109–122, 2018. doi: 10.1016/j.sigpro.2018.07.008
  • C. Qin, P. Ji, C.-C. Chang, J. Dong, and X. Sun, “Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery,” IEEE Multimed., Vol. 25, no. 3, pp. 36–48, 2018. doi: 10.1109/MMUL.2018.112142509
  • H. Wu, Y. Shi, H. Wang, and L. Zhou, “Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification,” IEEE Trans. Circuits Syst. Video Technol., Vol. 27, no. 8, pp. 1620–1631, 2017. doi: 10.1109/TCSVT.2016.2556585

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.