International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 Perceptually Tuned Price Control Using TwoWay Stackelburg Game Theory A. Sunil Kumar #1, D. Prasanth *2 1# M.Tech 2nd year, Dept of CSE, ASCET, GUDUR, AP, India Assistant Professor, Dept of CSE, ASCET, GUDUR, AP, India 2* and digital TV broadcasting, video conferencing, telemedicine that encompasses, on the one aspect, present video and telemanipulation, military applications, and remote video acquisition and, on the opposite aspect, presents video surveillance. All these applications share many technological process and viewing, addressing each computer-based and human-based surveillance. Adaptive control algorithms challenges. On the one side, videos create serious issues in are utilized to realize the most effective trade-off between terms of each quantity of knowledge transferred on the low latency and smart video fluidity. The recent network and process resources. On the opposite side, mobile developments of good mobile phones and 3G networks devices and UMA scenario need accessibility through modify users to fancy video programs by subscribing to completely different and infrequently restricted wireless information plans. Due to mobile to mobile networks, either 802.11 Wi-Fi, 3G networks like HSPA (High communication technologies and enjoy of mobile phones, Speed Packet Access) and UMTS (Universal Mobile data-plan subscribers/leader are able to distribute the Telecommunications Service), or perhaps 2/2.5G networks video content to secondary buyer/follower. Such a such as GPRS (General Packet Radio Service) or EDGEdistribution mechanism is a potential contender for the GPRS (Enhanced knowledge rates for GSM Evolution). Also, the enhanced quality of wireless networks and mobile service supplier and is extremely difficult to trace mobile devices is conclusion of attentions on ubiquitous given users’ high quality. The service supplier has to set an inexpensive value for the information conceives to forestall multimedia access within the transmission community within such unauthorized re-distribution behaviour to safeguard the past decade. Network service suppliers and researchers or maximize his/her own profit. during this paper, new suppliers focusing on developing efficient solutions to present and all-purpose methodologies for streaming performance access of transmission knowledge, particularly videos, from analysis also are planned and used to compare Moses with all over using mobile devices (laptops, PDAs or sensible existing solutions in terms of various parameters (latency, phones that may access 3G networks) [1]. Mobile-phone users image quality, video fluidity, and frame losses), as well as will watch video programs on their devices by subscribing to in terms of performance in individuals segmentation and the info plans from network service suppliers, and they can pursuit. We have a tendency to investigate the simply use their programmable hand devices to retrieve and evolutionarily stable magnitude relation of mobile users reproduce the video content [2]. Therefore, it's necessary to who arrange to subscribe the information arrange. Such know finish users’ potential actions of so as to produce higher an analysis will facilitate the service supplier preserve present video access services. With such a high quality and his/her profit beneath the threat of the distribution also the convenient mobile-to-mobile communication networks and might improve the standard of service for technologies, it's very potential for data-plan leaders to distribute the video content while not authorization. For finish users. example, some users who don't buy the data set up may need Keywords— Game theory, 3G network, MoSES, video fluidity, to watch TV programs whereas looking forward to public transportation, and some of them may wish to examine news Mobile network. from time to time. Hence, these users have incentives to shop I. INTRODUCTION for the specified video content from neighbouring knowledge Ubiquitous multimedia Access (UMA) has become a leaders if the price is less than the subscription fee charged by really common topic inside the transmission community the service supplier. In contrast to generic knowledge, throughout the previous couple of years. Analysis centers and transmission knowledge may be simply retrieved and telecom suppliers address new, sensible and efficient solutions modified, that facilitates the distribution of video content. for the ever-present access to transmission knowledge and Nevertheless, the mobile network service supplier would particularly videos, from all over with mobile devices (laptops, really like to set the content worth to maximize his/her own PDAs or last generation cellular phones). Potential profit. The service supplier’s profit may be pictured because applications of such technology include consumer recreation the total variety of subscriptions times content worth. If the Abstract— Mobile video represents a brand new paradigm ISSN: 2231-5381 http://www.ijettjournal.org Page 3656 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 content worth is high, mobile users have less incentive to buy the data set up which could result the authors may be reached at wylin@umd.edu and kjrliu@umd.edu. In low subscriptions. However on the opposite hand, the content worth within the redistribution network might get higher due to less leaders and more followers. In such a case, though a leader pays more for the video stream, he/she additionally gets a lot of compensation by re-distributing the info. Hence, setting content worth higher doesn't necessarily cut back the quantity of subscriptions and it's not trivial to and the best worth that maximizes the service supplier’s utility. The service supplier, data-plan leaders and also the followers who have an interest within the video knowledge move with one another and influence every other’s selections and performance. In such a scenario, game theory may be a mathematical tool to model and analyses the strategic interactions among rational maker’s manufacturers [3]. In our previous work [4], the equilibrium worth of the video stream within the re-distribution network was derived. Given the worth of the decentralized video streams, the service supplier would choose the official price to maximize its net profit. Since the mobiles users will change their choices on subscribing or re-subscribing, the content owner is interested in the quantity of leaders that's stable over the time. Hence, we tend to formulate the video streaming promoting development as an evolutionary game and derive the evolutionarily stable strategy (ESS) [5] for the mobile users that is that the desired stable equilibrium for the service supplier. Fig: architecture for mobile video surveillance A typical example of design for mobile video surveillance is that the three-layer design of Fig. 1. The first layer (transmitting aspect or write in coder) is dedicated to encode the video provided by either a live supply (camera) or a keep repository of videos. The encoded video is distributed to the second layer (receiving side or decoder) through a wireless radio channel that provides the widest potential coverage. The received video, once decoded, is processed by the third layer (video surveillance system); it are often a conventional human-based system consisting of human operators analysing The which means of the term “mobile” is kind of hazy and the videos or a computer-based system with automatic process may assume completely different meanings, looking on the that extracts moving objects and acknowledges interesting context: as an example it might be an installation not events. This is not the only potential design for mobile video unnatural to stay in an exceedingly fixed location, a moving surveillance. The expansion of good cameras makes additional device, a transportable device (such as handhelds and laptops), possible and interesting the shifting of some process tasks onor finally a powered device. However, in multimedia the term board on the native encoder side. In general, a part of the “mobile” is mostly associated with the property. Consequently, computer-based video surveillance algorithms can be enforced here we tend to assume that the reference mobile video on the first layer with the twofold advantage of reducing the surveillance system is given a present wireless property (either transmission bandwidth and working with uncompressed on the server, on the client or on both). Conversely the term pictures. However, our focus are kept on a first layer that “fixed” are going to be used to think about systems with wired performs video encoding and streaming only, demanding any surveillance tasks tithe any steps: this answer remains the property. mostflexible since no specific assumptions are created on the surveillance applications implemented on the third layer. In our work the first layer can be embodied by a standard pc design, being aware that standard video encoders have usually embedded hardware implementation. II. RELATED WORK: Today's mobile computing setting has redefined the approach business is completed, and challenged enterprise networks to deliver security and repair levels exceptional any previous benchmark. Not only are today's users demanding mobile access, they convey and use their own devices. Enterprise networks have to offer that access transparently, securely, wired or wirelessly, at any field or branch location within the enterprise, and from any external location further. The Bring ISSN: 2231-5381 http://www.ijettjournal.org Page 3657 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 Your Own Device (BYOD) development brings with it particularly difficult security challenges as a result of every type of mobile device is totally different and has distinctive vulnerabilities. At an equivalent time, attackers are additional various and refined, and keep finding new ways in which to attack every type of device. additionally, today's transmission and interactive applications present new ways in which of masking attacks, further increasing network vulnerability. And it's all growing quickly. Today's networks have to enable access to a quickly growing range of employees, partners, customers, patrons, and even casual visitors, and then they need to have robust and flexible identity management systems to make sure appropriate access. At an equivalent time they have to protect of business critical applications and property, and change all types users to possess access to sophisticated on-line applications designed to fulfill their explicit business functions. All of this needs to be given enhanced levels of performance that support wide and responsive distribution of today's refined business and entertainment applications, ranging from straightforward order entry and account management, to VoIP telephone and interactive video coaching programs. III. CONTRIBUTION WITHIN THE PAPER According to a survey on the recognition of mobile devices [2], almost everyone has a minimum of one mobile phone in developed countries. With such a high quality and therefore the convenient mobile-to-mobile communication technologies, it's potential for data-plan leaders to distribute the video content at minimal worth in an unauthorized approach. Compared to generic data, multimedia information is simply retrieved and changed, which facilitates the distribution of video content and permits the leaders to distribute the content typically for a higher price than their transmission price. This distribution activity exists just for a brief amount of your time and is extremely difficult to trace by the service owners. So the higher way to forestall this type of copyright action is to line a worth distribution strategy so no primary leader can have the incentive to distribute the video content to the second leaders. But there's a bent that the mobile network service supplier are additional fascinated by setting the video content price to maximize his own profit instead of protective copyrights. During this paper a no-cooperative theory of games is applied between the service supplier & leader in such a way so the service supplier’s is pictured because the total range of subscriptions times the content worth. If the content worth is high, mobile users have less incentive to subscribe to the information arrange, which could lead to less subscription. however on the opposite hand, the content worth within the redistribution network could get higher owing to less leaders and additional followers. In such a case, although a leader pays additional for the video stream, he/she also gets more compensation by re-distributing the information. Hence, ISSN: 2231-5381 setting the content worth higher doesn't essentially reduce the number of subscriptions, and it's not trivial to search out the optimal worth that maximizes the service supplier’s utility. The service supplier, the data-plan leaders, and the secondary consumers who have an interest within the video information act with one another and influence every other’s choices and performance. In such a situation, the game theory could be a mathematical tool to model and analyzes the strategic interactions among rational call manufacturers. during this game theory model we have a tendency to add the service supplier as a player to the game to research the best rating for the service supplier in the video streaming promoting network. Since the mobile users will modification their choices on subscribing or re-subscribing, the content owner is fascinated by the quantity of leaders that's stable over the time. Therefore, a robust equilibrium solutions is desired for the service supplier. Hence, we formulate the video streaming promoting development as an evolutionary game and derive the evolutionarily stable strategy for the mobile users [6]. IV. GAME THEORITIC MODEL Since the video-stream distribution network could be a dynamic system within which all users have high quality that may be part of and leave anytime, it's very tough to possess a central authority to control the users’ behavior. additionally, since this redistribution is unauthorized and illegal , to reduce their risk of being detected by the service supplier, the taking part users (leaders and followers) haven't any incentives to trust one further person and therefore the central authority, and a distributed strategy is most popular. Given the very fact that there's just one follower, we propose a Stackelburg game model to research however the follower offer incentives for leaders to redistribute the video stream and realize the best worth and quantity that the follower should provide. the last word goal of this model is to assist the content owner to line an appropriate subscription fee such the equilibrium of the game between the leaders and therefore the followers leads to negative payoffs. Thus, leaders can have n’t any incentive to distribute the video. Before the game starts, each user, either a leader or the follower can declare his/her presence to any or all different users inside his/her transmissions vary. (1)Game Stages: the primary stage of the game is that the leaders’ (leaders’) move. for every leader, he/she can set his/her unit worth Pi per unit transmission power, as well as his/her highest transmission power Pi (max) . Then, in the second stage of the game, the secondary leader (follower) will decide from whom to shop for the video and the way a lot of power he/she needs the leader to transmit. The secondary leader then pays every leader consequently at the value that the leader sets in stage one. (2)Utility perform of the secondary buyer /follower: we have a tendency to initial define the secondary leader’s utility perform and study his/her best action. The secondary leader Ss gains rewards by with success receiving the video with a http://www.ijettjournal.org Page 3658 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 precise quality. On the other hand, Ss has got to pay money for the ability that the leaders use for transmission. 8. 9. (3)Utility functions of the leaders: every leader Si will be viewed as a sellers, who aims to earn the payment that covers his/her transmission price and conjointly to realize the maximum amount further reward as potential. we have a tendency to introduce parameter , Ci i.e., the cost of power for relaying information, that is decided by the characteristics of the device that leader Si uses. Hence, the utility of Si is outlined as: 10. 11. 12. 13. Where Pi is the power that leader i uses to transmit to the follower. Thus, leader Si can opt for worth Pi that maximizes his/her utility πSi . The choice of the best worth Pi is stricken by not only the leader’s own channel condition however also different leaders’ prices, since totally different leaders non cooperatively play and they contend to be selected by the secondary leader. Thus, a better worth might not help a leader improve his/her payoff. 14. 15. 16. 17. 18. V.CONCLUSION 19. The same video-stream distribution game could be a game with excellent data, and therefore the secondary buyer/follower has perfect data of every subscriber’s/leader action (the hand-picked price). consistent with backward induction, a game with excellent information has a minimum of one equilibrium. Therefore, the optimal ways for each the secondary buyer/follower and therefore the subscribers/leader exist and may be obtained by finding the best decision for every stage mistreatment backward induction REFERENCES 1. 2. 3. 4. 5. 6. 7. 21. 22. 23. G. Gualdi, A. Prati, and R. Cucchiara, “Video streaming for mobile video surveillance,” IEEE Trans. Multimedia, vol. 10, no. 6, pp. 1142–1154, Oct. 2008. H. Ibaraki, T. Fujimoto, and S. Nakano, “Mobile video communications techniques and services,” in Proc. SPIE, 1995, vol. 2501, p. 1024. D. F. S. Santos and A. Perkusich, “Granola: A location and bandwidth aware protocol for mobile video on-demand systems,” in Proc. Int. Conf. SoftCom, Sep. 2008, pp. 309–313. S. Sudin, A. Tretiakov, R. H. R. M. Ali, and M. E. Rusli, “Attacks on mobile networks: An overview of new security challenge,” in Proc. Int.Conf. Electron. Design, Dec. 2008, pp. 1–6. H. Lee, Y. Lee, J. Lee, D. Lee, and H. Shin, “Design of a mobile video streaming system using adaptive spatial resolution control,” IEEE Trans. Consum. Electron., vol. 55, no. 3, pp. 1682–1689, Aug. 2009. T. Schierl, T. Stockhammer, and T.Wiegand, “Mobile video transmission using scalable video coding,” IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 9, pp. 1204–1217, Sep. 2007. W. A. Vorbau, A. S. Mitchell, and K. O’Hara, ““My iPod is my pacifier”: An investigation on the everyday practices of mobile video consumption,” in Proc. IEEEWorkshop HotMobile,Mar. 2007, pp. 29–33. ISSN: 2231-5381 20. S. Jumisko-Pyykko and J. Hakkinen, “Evaluation of subjective video quality of mobile devices,” in Proc. 13th Annu. ACM Int. Conf. Multimedia, 2005, p. 538. M. Ries, O. Nemethova, and M. Rupp, “Video quality estimation for mobile H.264/AVC video streaming,” J. Commun., vol. 3, no. 1, pp. 41–50, Jan. 2008. B. Girod and N. Farber, “Feedback-based error control for mobile video transmission,” Proc. IEEE, vol. 87, no. 10, pp. 1707–1723, Feb. 1999. M. Taghizadeh and S. Biswas, “Minimizing content provisioning cost in heterogeneous social wireless networks,” in Proc. 3rd Int. Conf. COMSNETS, 2011, pp. 1–10. N. Dimokas, D. Katsaros, and Y. Manolopoulos, “Cooperative caching in wireless multimedia sensor networks,” Mobile Netw. Appl., vol. 13, no. 3/4, pp. 337–356, Aug. 2008. C. Y. Chow, H. V. Leong, and A. Chan, Peer-to-peer cooperative caching in mobile environments, pp. 528–533, 2004. S. Banerjee and S. Karforma, “A prototype design for DRM based credit card transaction in e-commerce,” Ubiquity, vol. 9, no. 18, pp. 1–9, 2008. International Telecommunication Union [Online]. Available: http://www.itu.int/itu-d/ict/statistics/ict/graphs/mobile.jpg K. O’Hara, A. S. Mitchell, and A. Vorbau, “Consuming video on mobile devices,” in Proc. SIGCHI Conf. Human Factors Comput. Syst., 2007, p. 866. H. Zhao, W. S. Lin, and K. J. R. Liu, “Behavior modeling and forensics for multimedia social networks: A case study in multimedia fingerprinting,” IEEE Signal Process. Mag., vol. 26, no. 1, pp. 118–139, Jan. 2009. J. M. Smith, Evolution and the Theory of Games. Cambridge, U.K.: Cambridge Univ. Press, 1982. M. Mauve, A. Widmer, and H. Hartenstein, “A survey on positionbased routing in mobile ad hoc networks,” IEEE Netw., vol. 15, no. 6, pp. 30–39, Nov./Dec. 2001. S. Ganu, L. Raju, B. Anepu, S. Zhao, I. Seskar, and D. Raychaudhuri, “Architecture and prototyping of an 802.11-based self-organizing hierarchical ad-hoc wireless network (sohan),” in Proc. 15th IEEE Int. Symp. PIMRC, Sep. 2004, vol. 2, pp. 880– 884. Z. Sheng, K. K. Leung, and Z. Ding, “Cooperative wireless networks: from radio to network protocol designs,” IEEE Commun. Mag., vol. 49, no. 5, pp. 64–69, May 2011. G. Kramer, M. Gastpar, and P. Gupta, “Cooperative strategies and capacity theorems for relay networks,” IEEE Trans. Inf. Theory, vol. 51, no. 9, pp. 3037–3063, Sep. 2005. R. Blahut, “Computation of channel capacity and rate-distortion functions,” IEEE Trans. Inf. Theory, vol. IT-18, no. 4, pp. 460– 473, Jul. 1972. 2680 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 5, MAY http://www.ijettjournal.org Page 3659