Microsoft Word - 16.doc Mathematical Problems of Computer Science 35, 116--127, 2011. 116 Effective, Secure and Robust CDMA Digital Image Watermarking in YCbCr Channel Using DWT2 Mehdi Khalili 1 and David G. Asatryan 2 1 Institute for Informatics and Automation Problems of NAS RA 2 Russian-Armenian (Slavonic) University e-mail: Khalili@ipia.sci.am 1 , dasat@ipia.sci.am 2 Abstract Digital watermarking has been widely used in digital rights management and copyright protection. In this paper, a new cryptographic CDMA watermark scheme is proposed. Compared to the existing watermarking techniques, this proposed watermarking scheme combine transparency, security and robustness that none of the existing schemes can do. In this paper, a wavelet-based watermarking approach for hiding watermark image in color host images is proposed. The experimental results show that the proposed approach provides extra imperceptibility, security and robustness against JPEG compression and different noise attacks such as Gaussian and “Salt & Pepper” compared to the similar proposed methods such as [7]. Moreover, the proposed approach has no need of the original image to extract watermarks. References [1] Jian. Ren, “A cryptographic watermarking technique for multimedia signals”, Springer Science, Business Media, August 2008. [2] S.-H. Wang and Y.-P Lin, “Wavelet tree quantization for copyright protection watermarking”, IEEE Trans, Image Process , vol.13, no. 2, pp. 154–165, 2004. [3] H.S. Malvar, D.A.F Florêncio, “Improved spread spectrum: a new modulation technique for robust watermarking”, IEEE Trans. Signal Proc., vol. 51, no. 4, pp. 898–905, 2003. [4] X.G. Xia, C. G. Boncelet and G. R. Arce, “Wavelet transform based watermark for digital images”, Optics Express, vol. m, no. 12, pp.497-511, 1998. [5] M. Khalili, “A comparison between digital images watermarking in two different color spaces using DWT2”, Proceedings of the 7th International Conference on Computer Science and Information Technologies, pp. 158-162, Yerevan, Armenia, 2009. [6] M. Khalili and D. Asatryan, “Effective digital image watermarking in YCbCr color space accompanied by presenting a novel technique using DWT”, Mathematical Problems of Computer Science, vol. 33, pp. 150—161, 2010. M. Khalili, D. Asatryan 117 [7] Y. Fang, J. Huang and Yun Q. Shi, “Image watermarking algorithm applying CDMA”, IEEE, 2003. [8] Qian-Chuan Zhong, Qing-Xin, Ping- Li- Zhang, “A Satial Domain Color Watermarking Scheme Based on Chaos”, IEEE, 2008. [9] X.G. Xia, C. G. Boncelet and G. R. Arce, “Wavelet transform based watermark for digital images”, Optics Express, vol. m, no. 12, pp.497-511, 1998. [10] C. Lin, “Face detection in complicated backgrounds and different illumination conditions by using YCbCr color space and neural network”, Elsevier, Pattern Recognition Letters 28 (2007), pp. 2190–2200, 2007. [11] M.-S. Hsieh, “Wavelet-based image watermarking and compression”, Ph-D Thesis, Institute of Computer Science and Information Engineering National Central University, Taiwan, 2001. [12] A. William and Irizarry-Cruz, “FPGA implementation of a video watermarking algorithm”,, M.S. Thesis, University of Puerto Rico Mayaguez Campus, 2006. [13] F. A. P. Petitcolas, “Watermarking schemes evaluation” IEEE Signal Processing, vol. 17, no. 5, pp. 58–64, 2000. [14] Arvind Kumar Parthasarathy, “Improved content based watermarking for images”, M.S. Thesis, Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements, 2006. DWT2 ÏÇñ³éٳٵ YCbCr ϳåáõÕáõÙ CDMA å³ïÏ»ñÇ Ãí³ÛÇÝ ³ñ¹Ûáõݳí»ï, íëï³Ñ»ÉÇ ¨ ϳÛáõÝ çñ³ÝßáõÙ Ø. ʳÉÇÉÇ ¨ ¸. ²ë³ïñÛ³Ý Ամփոփում Âí³ÛÇÝ çñ³ÝßáõÙÁ ɳÛÝáñ»Ý ÏÇñ³éíáõÙ ¿ Ñ»ÕÇݳϳÛÇÝ Çñ³íáõÝùÇ å³ßïå³ÝáõÃÛ³Ý µÝ³·³í³éáõÙ: Ðá¹í³ÍáõÙ ³é³ç³ñÏí»É ¿ çñ³ÝßÙ³Ý CDMA ͳÍϳ·ñ³Ï³Ý Ýáñ ë˻ٳ: ²é³ç³ñÏí³Í çñ³ÝßÙ³Ý ëË»Ù³Ý Ñ³Ù³ÏóáõÙ ¿ ó÷³ÝóÇÏáõÃÛ³Ý, íëï³Ñ»ÉÇáõÃÛ³Ý ¨ ϳÛáõÝáõÃÛ³Ý ³ÛÝåÇëÇ Ñ³ïÏáõÃÛáõÝÝ»ñ, áñáÝù Ç ½áñáõ ã¿ ³å³Ñáí»Éáõ ·áÛáõÃÛáõÝ áõÝ»óáÕ çñ³ÝßÙ³Ý ë˻ٳݻñÇó áã Ù»ÏÁ: êáõÛÝ Ñá¹í³ÍáõÙ ·áõݳíáñ å³ïÏ»ñÝ»ñáõÙ çñ³ÝÇßÇ ï»Õ³Ï³ÛÙ³Ý Ñ³Ù³ñ ³é³ç³ñÏí»É ¿ í»ÛíÉ»ïÝ»ñÇ ÏÇñ³éÙ³Ý íñ³ ÑÇÙÝí³Í Ùáï»óáõÙ,: öáñÓÇ ïíÛ³ÉÝ»ñÁ óáõÛó »Ý ï³ÉÇë, áñ ³é³ç³ñÏí³Í Ùáï»óáõÙÁ ÝٳݳïÇå ³ÛÉ Ù»Ãá¹Ý»ñÇ (ÇÝãå»ë ûñÇݳÏ` [7]) Ýϳïٳٵ ³å³ÑáíáõÙ ¿ Éñ³óáõóÇã ó÷³ÝóÇÏáõÃÛáõÝ, íëï³Ñ»ÉÇáõÃÛáõÝ ¨ ϳÛáõÝáõÃÛáõÝ JPEG ë»ÕÙÙ³Ý ¨ ï³ñµ»ñ å³ï³Ñ³Ï³Ý ³ÕÙáõÏÝ»ñÇ, ÇÝãå»ë ûñÇݳÏ` ·³áõëÛ³Ý, “³Õ ¨ åÕå»Õ” ï»ë³ÏÇ, Ýϳïٳٵ: ²í»ÉÇÝ, ³é³ç³ñÏí³Í Ùáï»óáõÙÁ çñ³ÝÇßÇ ³ñï³ÍÙ³Ý Ñ³Ù³ñ ãÇ å³Ñ³ÝçáõÙ çñ³ÝÇßÇ µÝûñÇݳÏÇ ³éϳÛáõÃÛáõÝÁ: