Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

Selection-channel-aware rich model for steganalysis of digital images

T Denemark, V Sedighi, V Holub… - … and security (WIFS), 2014 - ieeexplore.ieee.org
From the perspective of signal detection theory, it seems obvious that knowing the
probabilities with which the individual cover elements are modified during message …

Game theory and adaptive steganography

P Schöttle, R Böhme - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
According to conventional wisdom, content-adaptive embedding offers more steganographic
security than random uniform embedding. We scrutinize this view and note that it is barely …

CNN-based steganalysis and parametric adversarial embedding: a game-theoretic framework

X Shi, B Tondi, B Li, M Barni - Signal Processing: Image Communication, 2020 - Elsevier
CNN-based steganalysis has recently achieved very good performance in detecting content-
adaptive steganography. At the same time, recent works have shown that, by adopting an …

Game-theoretic analysis to parameterized reversible watermarking

H Wu, X Zhang - IETE Technical Review, 2021 - Taylor & Francis
Separable reversible watermarking enables two encoders to separately embed a payload in
a cover, and the original cover can be reconstructed by cooperation. It is required to limit the …

[PDF][PDF] Hide and seek in digital communication: the steganography game

A Laszka, D Szeszlér - 2015 - real.mtak.hu
Two players, Alice and Bob play the following game. A list of positive numbers d1, d2,..., dn
and an integer 1 k n are given. Alice chooses a k-element subset S of 11, 2,..., nl and …

[PDF][PDF] Theoretical foundations of adversarial detection and applications to multimedia forensics

B Tondi - University of Siena: PhD Thesis, 2016 - clem.dii.unisi.it
Theoretical Foundations of Adversarial Detection and Applications to Multimedia Forensics
Page 1 Theoretical Foundations of Adversarial Detection and Applications to Multimedia …

[PDF][PDF] 基于图像来源分类的最小化虚警隐写分析模型

杨培韬, 张卫明, 俞能海 - 通信学报, 2016 - cww.cww.net.cn
在实真场景中, 在载体失配(CSM, cover source mismatch) 条件下降低虚警率是隐写分析的一个
巨大挑战, 提出了一种新的模型来处理该问题. 该方法由来源分类器首先判断图像的来源 …

Side-information for steganography design and detection

T Denemark - 2018 - search.proquest.com
Today, the most secure steganographic schemes for digital images embed secret messages
while minimizing a distortion function that describes the local complexity of the content …

Statistical Models for Image Steganography Explaining and Replacing Heuristics

J Butora - 2021 - search.proquest.com
The steganographic field is nowadays dominated by heuristic approaches for data hiding.
While there exist a few model-based steganographic algorithms designed to minimize …