MiFor '10最新文献

筛选
英文 中文
A game-theoretic system security design for the visible watermarking 基于博弈论的可见水印系统安全设计
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877980
Min-Jen Tsai, Jung Liu
{"title":"A game-theoretic system security design for the visible watermarking","authors":"Min-Jen Tsai, Jung Liu","doi":"10.1145/1877972.1877980","DOIUrl":"https://doi.org/10.1145/1877972.1877980","url":null,"abstract":"Digital watermarking has been widely studied and regarded as a potentially effective means for protecting copyright of digital media in recent years. Among different categories of researches for digital watermarking, visible watermarking protect copyrights in a more active way since the approach not only prevents pirates but also visually recognizes the copyrights of multimedia data. However, how to determine the equilibrium of optimal security strategies between encoder and attacker and the optimal tradeoff between the intensity of embedded watermark and the perceptual translucence for visible watermark is becoming a subject of importance. Therefore, in order to achieve the best tradeoff between the embedding energy of watermark, the quality of perceptual watermark translucence and the image fidelity after attacks, a novel game-theoretic system security design for visible watermarking is proposed in this study. The watermark embedding problem is formulated as a dynamic non-cooperative game with complete information while the optimal strategy is defined by the Nash equilibrium of the game. The experimental results demonstrate the feasibility of the proposed approach which allows the watermark encoder to obtain the best watermarking strategy under attacks. Accordingly, our research could help to resolve security issue of visual communication.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116651461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deluding image recognition in sift-based cbir systems 基于筛选的模糊图像识别系统
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877977
Thanh-Toan Do, Ewa Kijak, T. Furon, L. Amsaleg
{"title":"Deluding image recognition in sift-based cbir systems","authors":"Thanh-Toan Do, Ewa Kijak, T. Furon, L. Amsaleg","doi":"10.1145/1877972.1877977","DOIUrl":"https://doi.org/10.1145/1877972.1877977","url":null,"abstract":"Content-Based Image Retrieval Systems used in forensics related contexts require very good image recognition capabilities. Therefore they often use the SIFT local-feature description scheme as its robustness against a large spectrum of image distortions has been assessed. In contrast, the security of SIFT is still largely unexplored. We show in this paper that it is possible to conceal images from the SIFT-based recognition process by designing very SIFT-specific attacks. The attacks that are successful in deluding the system remove keypoints and simultaneously forge new keypoints in the images to be concealed. This paper details several strategies enforcing image concealment. A copy-detection oriented experimental study using a database of 100,000 real images together with a state-of-art image search system shows these strategies are effective. This is a very serious threat against systems, endangering forensics investigations.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书