Introduction

Today, the Internet is the most important and easiest way to connect people all over the world. It allows users to communicate and share multimedia content, such as text, images, audio, and video, with low cost and high quality. However, the most important problem that arises is how to protect critical data during transmission from illegal use [1, 2]. Protecting confidential information is a moral and legal requirement. Data hiding is a method for protecting information by hiding it in a multimedia object for the authentication purpose. This process is carried out in such a way that the embedded data is not visible to the naked eye, but it is easily detected by a detector. Data hiding has two main types: digital watermarking and steganography [3, 4]. The insertion of a part of information into the multimedia content, where it is not visible to the human eye but can be detected with a detector, is called digital watermarking. Figure 1 introduces the watermarking framework, which consists of the embedding and detection processes. It is suitable for several applications such as fingerprinting, copyright protection, and content authentication, because it has a very important feature that the content is inseparable from the watermark [5, 6].

Fig. 1
figure 1

Watermarking system

Digital watermarking techniques include embedding of a watermark in a multimedia content to ensure authenticity and protect copyright holders from unauthorized data alteration [7]. Consequently, it is vital to specify the prerequisites or properties of a watermarking scheme. The specifications for watermarking schemes are shown in Fig. 2.

Fig. 2
figure 2

Image watermarking requirements

These requirements guarantee the effectiveness of watermarking schemes. The ideal characteristics of digital watermarking include imperceptibility, robustness, capacity, and security [8, 9].

  1. 1.

    Imperceptibility: Imperceptibility is crucial, when assessing the watermarking scheme effectiveness. It is reflected in faithfulness and invisibility. The watermarked image in this instance needs to look exactly like the original image [10].

  2. 2.

    Robustness: Robustness is the property that a watermark must have to be detectable after various typical signal-processing operations used in digital image watermarking systems have been applied. Among them are spatial filtering, color mapping, scanning and printing, compression, scaling, translation, and rotation [10].

  3. 3.

    Capacity: The amount of embedded data in the host signal should be as large as possible.

  4. 4.

    Security: The authorized person is the only one, who can detect the watermark.

Consequently, Fig. 2 summarizes the general requirements for a digital watermarking scheme [9].

The motivation of this paper is introducing an efficient image watermarking scheme for different applications. This scheme depends on two cascaded stages of the SVD and B-SVD. It achieves a trade-off between the watermarking requirements, where embedding of more than one watermark increases capacity, robustness, and imperceptibility. Furthermore, the security is improved through the scheme complexity.

The paper organization is as follows. Section "Traditional singular value decomposition (SVD) watermarking" gives an explanation of the traditional SVD  watermarking with the method of Liu. Section "The block-based SVD (B-SVD) watermarking algorithm" presents the B-SVD watermarking algorithm. Section "Obtain the SVs of each (Swi matrix) by applying SVD on each Di matrix." presents an explanation of the proposed watermarking scheme. Section "The watermarked blocks in the spatial domain will be built by using the SVs of each Di matrix (Swi matrix)." shows the experimental results. Finally,  Section 6 provides the conclusion.

Traditional singular value decomposition (SVD) watermarking

In the traditional method of Liu for SVD watermarking, a matrix is decomposed into three matrices. A matrix B can be decomposed into a product of three matrices as follows [12]:

$${\mathbf{B}} = {\mathbf{XSY}}^{{{T}}}$$
(1)

where X and Y are orthogonal matrices, such that XT X = I, and YT Y = I, and I is an identity matrix. S is a diagonal matrix, where its diagonal elements are the singular values of B.

From the perspective of image processing, the traditional SVD method of Liu is a mathematical technique with the following main properties:

  1. (a)

    Image Singular Values (SVs) have good stability, which means that even if a small change is made to an image, its SVs do not change noticeably, making the method resistant to various attacks.

  2. (b)

    The image algebric properties can be represented by its SVs.

Using these properties of the SVs of an image, the watermark can be settled into this matrix without great variations in the watermarked image. Liu et al. [9] introduced a watermarking algorithm based on the spatial SVD. Recently, watermarking schemes based on the SVD have gained popularity due to their simplicity of implementation and the attractive mathematical features of the SVD.

Figure 3 presents the traditional method of Liu et al. [13], and the steps of the watermark embedding process are explained as follows:

Fig. 3
figure 3

Mathematical SVD

The original image (B matrix) is decomposed with the SVD.

$${\mathbf{B}} = \mathbf{XSY}^{T}$$
(2)

The matrix D can be obtained by adding the watermark (W matrix) to the SVs of the original matrix.

$${\mathbf{D}} = {\mathbf{S}} + K{\mathbf{W}}$$
(3)

The new modified matrix (D) is decomposed with SVD.

$${\mathbf{D}} = {\mathbf{X}}_{{{w}}} {\mathbf{S}}_{{{w}}} Y_{w}^{T}$$
(4)

By knowing the obtained matrix (Sw), the watermarked image can be obtained.

$${\mathbf{B}}_{{{w}}} = {\mathbf{XS}}_{{{w}}} {\mathbf{Y}}^{{{T}}}$$
(5)

With Xw, S, and Yw matrices and the potentially distorted image Bw*, the corrupted watermark is extracted from the potentially-corrupted watermarked image, and it is presented as follows:

  1. 1.

    The corrupted watermarked image (Bw* matrix) is decomposed with SVD.

$${\mathbf{B}}_{{{w}}}^{*} = {\mathbf{X}}_{{{w}}}^{*} {\mathbf{S}}_{{{w}}}^{*} {\mathbf{Y}}_{{{w}}}^{{*{{T}}}}$$
(6)
  1. 2.

    By knowing Xw and YwT, the matrix D* can be obtained.

$${\mathbf{D}}^{*} \, = \,{\mathbf{X}}_{{{w}}} {\mathbf{S}}_{{{w}}}^{*} {\mathbf{Y}}_{{{w}}}^{{{T}}}$$
(7)
  1. 3.

    Using the D* and S matrices, the watermark is obtained.

    $${\mathbf{W}}^{*} = \, \left( {{\mathbf{D}}^{*} - {\mathbf{S}}} \right) \, /K$$
    (8)

    where K is the watermark gain and the corruption caused by the attacks is denoted by the symbol *.

Block-based SVD (B-SVD) watermarking

To give the chance for embedding of more watermarks to override attacks, the B-SVD watermarking is used. The original image is divided into non-overlapping blocks before embedding the watermark in the SVs of each block, separately [14, 15].

Watermark embedding

The steps of B-SVD watermarking are presented as follows. First, the original image (G matrix) is segmented into several blocks, none of which overlapping with others. The new matrices are obtained by inserting the watermark into the SVs (S matrix) of each block. To get the S matrices of the watermarked blocks, we apply an SVD to each of these new matrices. The watermarked image Gw is built in the spatial domain. By rearranging the blocks again into one matrix of the same dimensions as the original image, the watermarked image is obtained.

The steps of the embedding process are explained as follows [14]:

  1. 1.

    The original image (G matrix) is divided into non-overlapping blocks.

  2. 2.

    To obtain the SVs of the Si matrix of each block, the SVD is performed on each block Ci matrix, where i = 1, 2, 3…, N, and N is the number of blocks.

$${\mathbf{C}}_{{{i}}} = {\mathbf{X}}_{{{i}}} {\mathbf{S}}_{{{i}}} {\mathbf{Y}}_{{{i}}}^{{{T}}}$$
(9)
  1. 3.

    The watermark image (W matrix) is added to the S matrix of each block, giving the new matrices Di.

    $${\mathbf{D}}_{{{i}}} = {\mathbf{S}}_{{{i}}} + K{\mathbf{W}}$$
    (10)
  1. 4.

    The SVs of each (Swi matrix) are obtained by applying SVD on each Di matrix.

    $${\mathbf{D}}_{{{i}}} = {\mathbf{X}}_{{{{wi}}}} {\mathbf{S}}_{{{{wi}}}}$$
    (11)
  1. 5.

    The watermarked blocks in the spatial domain are built using the SVs of each Di matrix (Swi matrix).

    $${\mathbf{C}}_{{{{wi}}}} = {\mathbf{X}}_{{{i}}} {\mathbf{S}}_{{{{wi}}}} {\mathbf{Y}}_{{{i}}}^{{{T}}}$$
    (12)
  1. 6.

    The watermarked image in the time domain (Gw matrix) is obtained by combining the watermarked blocks back into a single matrix.

Watermark detection

To get the watermark that may be corrupted, by knowing the Xwi, Ywi, Si, matrices, and the corrupted watermarked image G*w, we apply the following steps [15].

  1. 1.

    Before applying the SVD, the corrupted watermarked image (G*w matrix) is divided into the same-size blocks as in the embedding process.

  2. 2.

    The SVs of each one (S*wi matrix) are obtained and the SVD is applied on each possibly-corrupted watermarked block (C*wi matrix).

$${\mathbf{C}}^{*}_{{{{wi}}}} = {\mathbf{X}}^{*}_{{{{wi}}}} {\mathbf{S}}^{*}_{{{{wi}}}} {\mathbf{Y}}^{{*{{T}}}}_{{{{wi}}}}$$
(13)
  1. 3.

    Using Xwi, Ywi, and S*wi matrices, the matrices that contain the watermark are obtained

    $${\mathbf{D}}_{{{i}}}^{*} = {\mathbf{X}}_{{{{wi}}}} {\mathbf{S}}^{*}_{{{{wi}}}} {\mathbf{Y}}_{{{{wi}}}}^{{{T}}}$$
    (14)
    $$\left( {{\mathbf{D}}^{*}_{{{i}}} - {\mathbf{S}}_{{{i}}} } \right) \, /K = {\mathbf{W}}^{*}_{{{i}}}$$
    (15)

The proposed hybrid digital image watermarking scheme

The proposed scheme depends on two cascaded stages of the SVD and B-SVD. The suggested scheme aims to fulfill the following watermarking requirements:

  1. 1.

    Improving the level of security through the scheme complexity.

  2. 2.

    Maintaining imperceptibility by increasing the capacity of embedded information without affecting the quality of the original image.

  3. 3.

    Enhancement of the correlation coefficient (Cr) to increase watermarking robustness.

  4. 4.

    Increasing Peak Signal-to-Noise Ratio (PSNR) of the watermarked image to enhance its fidelity by ensuring that the watermark is not noticeable to the human eye.

Basic idea

The proposed watermarking scheme consists of embedding and (detection/extraction) processes. Figure 4 shows the watermark embedding process, which consists of two stages. In the first stage, watermark 1 is embedded into the original image using the B-SVD algorithm to obtain the primary watermarked image. Then, watermark 2 is embedded into the primary watermarked image using the SVD watermarking algorithm in the second stage to obtain the final watermarked image. Figure 5 shows the detection/extraction process, which consists of two stages: first, the extracted watermark 1 is detected and extracted from the final watermarked image. Then, the extracted watermark 2 is extracted from the primary watermarked image in the second stage.

Fig. 4
figure 4

Proposed algorithm (embedding stage)

Fig. 5
figure 5

Proposed algorithm (detection/extraction stage)

The scheme description

Embedding process

In the embedding process, we apply the B-SVD and the SVD algorithms, respectively as shown in Fig. 6.

  1. 1.

    First, the original image (A matrix) is divided into non-overlapping blocks with the same size. The size of the block is chosen to be 16 × 16 as indicated in [19]. Then, the SVD is applied on each block (Ci matrix) for obtaining the SVs (Si matrix) of each block, where i = 1, 2, 3..., N and N is the number of blocks.

    $${\mathbf{C}}_{{{{i }} }} = {\mathbf{X}}_{{{i}}} {\mathbf{S}}_{{{i}}} {\mathbf{Y}}_{{{i}}}^{{{T}}}$$
    (16)
    Fig. 6
    figure 6

    The embedding block diagram of the proposed algorithm

  2. 2.

    The watermark image (W1 matrix) is added to each block S matrix.

    $${\mathbf{D}}_{{{i}}} = {\mathbf{S}}_{{{i}}} + K{\mathbf{W}}_{{1}}$$
    (17)
  3. 3.

    The SVD is applied on each Di matrix to obtain the SVs of each (Swi matrix).

    $${\mathbf{D}}_{{{i}}} = {\mathbf{X}}_{{{{wi}}}} {\mathbf{S}}_{{{{wi}}}} {\mathbf{Y}}^{{{T}}}_{{{{wi}}}}$$
    (18)
  4. 4.

    The watermarked blocks in the spatial domain are built by using the SVs of each Di matrix (Swi matrix).

    $${\mathbf{C}}_{{{{wi}}}} = {\mathbf{X}}_{{{i}}} {\mathbf{S}}_{{{{wi}}}} {\mathbf{Y}}_{{{i}}}^{{{T}}}$$
    (19)
  5. 5.

    The watermarked image in the time domain (Awp matrix) is built by combining the watermarked blocks back into one matrix.

    From the previous steps, we get the primary watermarked image which will be the input for the second stage.

  6. 6.

    The SVD is applied on the primary watermarked image.

$${\mathbf{A}}_{{wp }} = {\mathbf{XS}}_{{{{wp}}}} {\mathbf{Y}}^{{{T}}}$$
(20)
  1. 7.

    To obtain the matrix D, the watermark (W2 matrix) is added to the SVs of the primary watermarked matrix, then the SVD is applied

    $${\mathbf{D}} = {\mathbf{S}}_{{{{wp}}}} + K{\mathbf{W}}_{{2}}$$
    (21)
    $${\mathbf{D}} = {\mathbf{X}}_{{{w}}} {\mathbf{S}}_{{{{wp}}}} {\mathbf{Y}}^{{{T}}}$$
    (22)
  1. 8.

    Using the modified matrix (Swp), the final watermarked image (Awf) is obtained.

    $${\mathbf{A}}_{{{{wf}}}} = {\mathbf{XS}}_{{{{wp}}}} {\mathbf{Y}}^{{{T}}}$$
    (23)

(Extraction/Detection) Process

Figure 7 shows the watermarking (extraction/detection) process, which comprises application of the SVD and B-SVD watermarking algorithms, respectively. The new extraction process consists of several steps as follows:

Fig. 7
figure 7

(Detection/extraction) block diagram for the proposed algorithm

The SVD is applied on the distorted final watermarked image (A*wf matrix).

$${\mathbf{A}}^{*}_{{{{wf }} = }} {\mathbf{X}}^{*} {\mathbf{S}}^{*}_{{{{wf}}}} {\mathbf{Y}}^{{*}{{T}}}$$
(24)

The matrix which contains the watermark is computed.

$${\mathbf{D}}^{*} = {\mathbf{X}}_{{{{wf}}}} {\mathbf{S}}^{*}_{{{{wf}}}} {\mathbf{Y}}^{{{T}}}_{{{{wf}}}}$$
(25)

Using the matrix D* and Swf, we get the watermark 2, which may be corrupted.

$${\mathbf{W}}_{{2}}^{*} = \, ({\mathbf{D}}^{*} - {\mathbf{S}}_{{{{wf}}}} )/K$$
(26)

The corruption due to attacks will be referred to as *.

To get the watermark that may be corrupted, by knowing Xwi, Ywi, Si matrices, and the possibly corrupted primary watermarked image A*wp, the steps below are applied.

The corrupted primary watermarked image (A*wp) is divided into blocks that have the same size as that in the embedding process.

The SVs of each matrix (S*wpi) are obtained by applying SVD on each corrupted watermarked block (C*wpi matrix) to get

$${\mathbf{C}}^{*}_{{{{wpi}}}} = {\mathbf{X}}^{*}_{{{i}}} {\mathbf{S}}^{*}_{{{{wpi}}}} {\mathbf{Y}}_{{{i}}}^{{*{{T}}}}$$
(27)

The Xwi, Ywi, and Swi, matrices are used to obtain the Di* matrices that contain the watermark.

$${\mathbf{D}}_{{{i}}}^{*} = {\mathbf{X}}_{{{{wpi}}}} {\mathbf{S}}^{*}_{{{{wpi}}}} {\mathbf{Y}}^{{{T}}}_{{{{wpi}}}}$$
(28)

From the Di* matrices, the corrupted watermark 1 (W1i*) is extracted.

$$\left( {{\mathbf{D}}_{{{i}}}^{*} - {\mathbf{S}}_{{{{wpi}}}} } \right) \, /K = {\mathbf{W}}_{{{{1i}}}}^{*}$$
(29)

Experimental results

Performance metrics

The performance evaluation for most work in watermarking techniques depends mainly on two image quality metrics [16, 17]:

  1. 1.

    Imperceptibility Quality Metric.

PSNR is a metric used to describe the quality of a watermarked image. A large PSNR is desirable. The PSNR should be infinite, but this is not possible for a watermarked image. The mathematical representation of the PSNR is given as:

$${P}_{SNR}=10{\mathrm{log}}_{10}\left(\frac{{255}^{2}}{\frac{1}{{N}^{2}}{\sum }_{x,y}{\left({A}_{w}\left(x,y\right)-A\left(x,y\right)\right)}^{2}}\right)$$
(30)

where: A (x, y) is the original image and Aw (x, y) is the watermarked image.

  1. 2.

    Robustness Quality Metric:

The difference between the extracted and the original watermarks is measured by the correlation coefficient (Cr), which is a metric of resilience. The mathematical expression of the Cr is shown below. The stronger the robustness, the closer the Cr value to one [17].

$$C_{r} \left( {{\mathbf{W}},{\mathbf{W'}}} \right) = \frac{{\mathop \sum \nolimits_{y} W\left( y \right)W'\left( y \right)}}{{\sqrt {\mathop \sum \nolimits_{y} W^{2} \left( y \right)\mathop \sum \nolimits_{y} W'^{2} \left( y \right)} }}$$
(31)

where W and \(\varvec{\rm{W}}^{\prime} \) are the original and extracted watermarks, respectively.

Experimental result analysis

The performance of the proposed hybrid scheme is assessed in this section, along with that of the Liu et al. for a single watermark [13], the DWT-SVD with fused watermark [18], and the hybrid digital image watermarking scheme (SVD-BSVD).

The proposed hybrid digital image watermarking scheme (BSVD-SVD) is simulated using MATLAB on an Intel(R) Core(TM) i3 CPU with 2GB RAM, and several simulations are carried out. The used parameters in the simulations are summarized in Table 1.

Table 1 Specification of simulation parameter

To evaluate and illustrate the performance of the proposed algorithm, several test experiments are carried out for different original images with and without attacks. In each test, both the Cr of the extracted watermark and PSNR of the watermarked images are measured.

Figures 8 and 9 show the variation of Cr and PSNR with the gain factor of the watermark K. The figures indicate that the optimum value of K equals 0.01, where the best values of Cr and PSNR are obtained. If the K is lower than 0.01, the Cr will decrease and the watermark cannot be successfully extracted. If K is larger than 0.01, PSNR will decrease and the original image will be distorted.

Fig. 8
figure 8

Variation of the Cr of the watermarked image versus the watermark gain k

Fig. 9
figure 9

Variation of the PSNR of the watermarked image versus the watermark gain k

Figure 10 shows the outcome of the Liu method with this sequence, 10 (a) is the original image, 10 (b) is the watermark of the same size as the original image, 10 (c) is the watermarked image, and 10 (d) is the extracted watermark without attacks. The correlation coefficient Cr between the extracted watermark and the original one is 0.8543 in the case of using a single watermark.

Fig. 10
figure 10

a Original image, Size = 63.5 Kilo Byte (KB). b Watermark image, Size = 64.1 KB. c Watermarked image without attacks, PSNR = 60.5250, Size = 63.6 KB. d Extracted watermark for Liu method cr = 0.8543

The proposed algorithm BSVD-SVD simulation results in the embedding process and extraction process in the absence of attacks are shown in Fig 11 as follows: 11(a) is the original image, 11(b) is the watermark added to each block, 11(c) is the primary watermarked image using B-SVD, which gives PSNR=45.8605 and 11(d) is the final watermarked image using BSVD-SVD, which gives PSNR=45.5193. On the other hand, the extraction process has been completed. The extracted watermark1 from the final watermarked image by SVD has a Cr2 equal to 0.0121, while the extracted watermark 1 (from BSVD) has a Crmax of 0.9975, as shown in Fig. 11e,f, g. The proposed scheme gives a high correlation coefficient between the original watermark and the extracted watermark, closer to 1. According to the results, the proposed scheme extracts watermarks perfectly in the absence of attacks, increasing the capacity of embedded information.

Fig. 11
figure 11

a Original image, Size = 63.5 KB. b Watermark image, Size = 1.3 KB with block size (16 × 16). c Primary Watermarked image, PSNR 1 = 45.8605. d Final watermarked image, PSNR 2 = 45.5193. e Extracted watermark1 (from the final watermarked image by SVD), Cr1 = 0.0121 f Extracted watermark 2 (From stage 2 by using BSVD). g The Extracted watermark 2 (From stage 2 by using BSVD) which gives max correlation (Cr2max = 0.9975), after magnification

The high fidelity of the proposed scheme is noticed, where there is no visual difference between the original image and the watermarked image. An improved level of security is achieved by increasing the scheme complexity. The proposed scheme is also tested on different original images, as shown in Fig. 12. From the behavior of the proposed schemes it is proved that it is not dependent on the type of image used as the original image. The correlation coefficients for extracted watermarks are high and close to one in the absence of attacks. This means that the proposed scheme works efficiently with different original images.

Fig. 12
figure 12

Different test images

As shown in Figs. 13 and 14, the Liu method and the proposed scheme were tested in the presence of some attacks, such as cropping with 50%, Gaussian noise with zero mean and 0.01 variance, and blurring with the LPF window of size 3×3. Figs. 15 and 16 represent the extracted watermarks and their correlation coefficients between the original watermark and each extracted watermark for the method of Liu and the proposed scheme, respectively.

Fig. 13
figure 13

Attacked watermarked images for the method of Liu

Fig. 14
figure 14

Attacked watermarked images for the proposed method

Fig. 15
figure 15

The extracted watermarks for the method of Liu after applying different attacks

Fig. 16
figure 16

Extracted watermarks for different attacks using the proposed method

Table 2 gives the numerical values of correlation coefficient for different noise variances. The table indicates that there is a degradation in the correlation values with the increase in noise variance, in addition to the degradation in PSNR due to the noise. Table 3 indicates the effect of increasing the filter window in blurring attack on the Cr and PSNR. It is clear that increasing the filter window has a negative effect on the watermarking process. Rotation attack has a different effect on the watermarking process, where Cr and PSNR increase with rotation angle. The best values are obtained at 90 degree rotation (Table 4).

Table 2 Correlation coefficients and PSNR for various values of Gaussian noise variance
Table 3 Correlation coefficients between the extracted watermarks and the original watermark for various values of low pass filter windows
Table 4 Correlation coefficients between the extracted watermarks and the original watermark under the rotation attack with different rotation angles

The same simulation is repeated on a reverse hybrid digital image watermarking scheme by reversing the stages of the proposed scheme (SVD-BSVD), and its results are shown in Figs. 17, 18 and 19. The results of this simulation reveal the superiority of the proposed hybrid digital image watermarking scheme (BSVD-SVD) over the reverse hybrid digital image watermarking scheme (SVD-BSVD). Tables 5 and 6 give a comparison study of the Cr and PSNR for the proposed scheme and other schemes for different attacks. In the presence of attacks such as low-pass filtering attack, Gaussian noise attack, and cropping attack, the proposed scheme proves its superiority over the other compared ones. Table 5 presents the Cr using SVD with only one watermark, hybrid DWT-SVD with a fused watermark, a reverse hybrid digital image watermarking scheme (SVD-BSVD), and the proposed scheme. The results show that the proposed scheme (BSVD-SVD) improves the Cr compared with other ones, where the value of Cr for the proposed scheme is higher than that for other ones. From these results, the proposed scheme proves its ability to extract watermarks perfectly compared to other ones (Fig. 19).

Fig. 17
figure 17

a Original image with Size = 63.5 KB. b Watermark image with Size (256 × 256) c Primary watermarked image by (SVD), PSNR 1 = 113.3409. d Watermark image with block size (16 × 16). e Final watermarked image by (BSVD) PSNR 2 = 45.1884. f Extracted watermark1 from the final watermarked image by (BSVD). g Extracted watermark 1 from stage 1 using BSVD which gives max correlation Cr1max = 0.9975 (f) Extracted watermark 2 (From stage 2 by using BSVD). h The Extracted watermark 2 from stage 2 by using SVD (Cr2 = 0.0030), after magnification

Fig. 18
figure 18

Attacked watermarked images for the Reverse Hybrid Digital Image Watermarking Algorithm (SVD-BSVD)

Fig. 19
figure 19

Extracted watermarks for different attacks using attacked watermarked images for the Reverse Hybrid Digital Image Watermarking Algorithm (SVD-BSVD).

Table 5 Comparison between the correlation coefficients for the proposed Hybrid (BSVD-SVD) Digital Watermarking Algorithm and other methods
Table 6 Comparison between PSNR for the proposed Hybrid (BSVD-SVD) Digital Watermarking Algorithm and other methods.

Table 6 presents the PSNR using SVD with only one watermark, hybrid DWT-SVD with a fused watermark, a reverse hybrid digital image watermarking scheme (SVD-BSVD), and the proposed scheme. The results show that the proposed scheme has a higher PSNR and a better chance of detecting watermarks, even in the presence of severe attacks, ensuring its fidelity. Table 7 gives the comparison of the processing time (sec) between the SVD with only one watermark and the proposed scheme. Despite increasing the processing time for the proposed scheme, this scheme improves the level of security by increasing the complexity of the system.

Table 7 Comparison between processing time (sec) of the proposed Hybrid (BSVD-SVD) Digital Watermarking Algorithm and (only one stage (SVD).

Conclusion

In this paper, an efficient image watermarking scheme has been presented. The proposed scheme is implemented through the SVD and B-SVD. The SVD is recognized as a robust watermarking algorithm by exploiting its stability characteristic. The proposed scheme is used to embed more than one watermark into the original image, which means a large capacity. The B-SVD implementation gives more chances to survive different attacks and achieve robust watermarking. The watermarks are embedded with a weight equal to 0.01 to preserve the original image quality and achieve imperceptibility. The complexity of the proposed scheme increases the security level. In addition, improving fidelity means achieving suitable values for PSNR, where there is no visual difference between the original image and the watermarked image. We have concluded that the proposed algorithm is superior to other methods, because it satisfies the watermarking requirement, but the complexity will increase.