TY - GEN
T1 - Scalar Quadratic-Gaussian soft watermarking games
AU - Mıhçak, M. Kıvanç
AU - Akyol, Emrah
AU - Başar, Tamer
AU - Langbort, Cédric
N1 - Publisher Copyright:
© Springer International Publishing AG 2016.
PY - 2016
Y1 - 2016
N2 - We introduce a zero-sum game problem of soft watermarking: The hidden information (watermark) comes from a continuum and has a perceptual value; the receiver generates an estimate of the embedded watermark to minimize the expected estimation error (unlike the conventional watermarking schemes where both the hidden information and the receiver output are from a discrete finite set). Applications include embedding a multimedia content into another. We study here the scalar Gaussian case and use expected mean-squared distortion. We formulate the problem as a zero-sum game between the encoder & receiver pair and the attacker. We show that for linear encoder, the optimal attacker is Gaussian-affine, derive the optimal system parameters in that case, and discuss the corresponding system behavior. We also provide numerical results to gain further insight and understanding of the system behavior at optimality.
AB - We introduce a zero-sum game problem of soft watermarking: The hidden information (watermark) comes from a continuum and has a perceptual value; the receiver generates an estimate of the embedded watermark to minimize the expected estimation error (unlike the conventional watermarking schemes where both the hidden information and the receiver output are from a discrete finite set). Applications include embedding a multimedia content into another. We study here the scalar Gaussian case and use expected mean-squared distortion. We formulate the problem as a zero-sum game between the encoder & receiver pair and the attacker. We show that for linear encoder, the optimal attacker is Gaussian-affine, derive the optimal system parameters in that case, and discuss the corresponding system behavior. We also provide numerical results to gain further insight and understanding of the system behavior at optimality.
UR - http://www.scopus.com/inward/record.url?scp=84994834951&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84994834951&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-47413-7_13
DO - 10.1007/978-3-319-47413-7_13
M3 - Conference contribution
AN - SCOPUS:84994834951
SN - 9783319474120
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 215
EP - 234
BT - Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings
A2 - Panaousis, Emmanouil
A2 - Tambe, Milind
A2 - Alpcan, Tansu
A2 - Casey, William
A2 - Zhu, Quanyan
PB - Springer
T2 - 7th International Conference on Decision and Game Theory for Security, GameSec 2016
Y2 - 2 November 2016 through 4 November 2016
ER -