1 Introduction

The network connectivity has increased manifold in the past decade and market is estimated to grow to 2898.9 Million USD by 2020 [1]. This increase makes it easier to share multimedia information efficiently at high speed. However, the downside of the same is frequent violations of intellectual property (IP) rights owing to unauthorized use of the data mainly in terms of reproduction and distribution resulting in a huge financial loss for IP owners [2]. IP rights play the crucial role of ensuring that proper incentives are served to the IP holders. Infringement of IP rights is known as piracy in which the work is distributed, reproduced, used directly or derivative without copyright holder’s permission.

Watermarking is one amid various applied techniques for ensuing unauthorized access, intercepting illegal replication, establishing ownership rights, and facilitating content authentication. It involves embedding special elements within the content in order to authenticate the ownership of the IP [3, 4]. Numerous mechanisms for IP protection have been proposed and the search still goes on since attackers continuously tries to attack the watermark [5,6,7,8] with the aim to break its security feature. Some of the desirable features of a good watermarking technique are (1) owner protection (2) highly robust (3) versatile (4) strongly imperceptible (5) potential to identify owner/developer. Keeping these aspects in mind myriad researchers in past have proposed different watermarking techniques [9,10,11,12]. Some of the existing algorithms [13,14,15,16,17] preserve the multimedia content but are vulnerable to geometric attacks. This paper identifies the shortcoming of the watermarking algorithms available in literature and concedes an enhanced and robust watermarking algorithm.

The quantum chaos based encryption algorithm owing to low time complexity and optimized entropy values is employed to curtail statistical attacks. Withal to this highly secured and easily applicable SHA-3 is used for creating the digest. To work on robustness this research work proposes DCT–DWT hybrid model for embedding watermark and RC4 with quantum chaos for randomness enhancement. To work efficiently on allocating position to watermark pixels RC4 is coupled with NCML sequence for key designing. The proposed work promises outdo results against existing noise based geometric attacks viz. Gaussian/salt-pepper and UIQI.

The next section gives a brief on past literature work in detail and problem definition. The details of the proposed algorithm are given in Sect. 3. Section 4 gives the simulation setup parameters employed contemplating robustness and efficiency of the proposed mechanism. Comparison results of the proposed scheme with the latest technique available in literature are manifested in the following section followed by conclusion and references.

2 Literature survey and problem identification

The past research focusing on watermarking techniques analogous to the proposed mechanism is exhibited in Table 1.

Table 1 Literature survey

The aforementioned past research shows need for an improved robust watermarking technique still persists to match pace with the fast heading technology. This research work aims resolving the past setbacks with following objectives.

Objectives

Ownership Protection: This is the utmost requirement of any watermarking technique. It must be extremely easy for the owner to verify its ownership while for impostor it must be extremely difficult.

Robustness: The watermarking algorithm must be robust against geometric attacks. For that it should use latest frequency domain techniques.

Integrity of Signature: To maintain integrity of the signature, the watermarking scheme must use latest hashing algorithms available in literature.

Embedding Signature in Random Positions: The watermark should be appended in random positions. Thus, latest algorithms to search random positions for inserting signature should be employed.

The next section deals with proposed watermarking scheme in detail.

3 The proposed watermarking scheme

The proposed research illustrated in Fig. 1 illustrates making of a robust watermark and mechanism to append it in a cover media to protect the ownership of the multimedia content. The salient features of the proposed algorithm are:

  • Employment of DWT–DCT that helps in improving robustness of the proposed scheme in comparison to Zhang et al. scheme.

  • The process uses quantum chaos mechanism to improve randomness in data embedding process making it extremely difficult for the other persons to find out the position of watermark.

  • Quantum cryptographic algorithm is used which has very high execution speed and brute force search time.

  • Employment of latest hashing technique also improves the integrity process.

Fig. 1
figure 1

Block description of the proposed watermarking algorithm

The proposal is divided into three inherent parts (1) watermark computation (2) watermark embedding (3) watermark verification

3.1 Watermark computation

In this stage, first of all random numbers are generated using quantum logistic map equations provided in Goggin et al. [16] and Akhavan et al. [19].

3.1.1 Quantum logistic map equation

$$\begin{aligned} X\left( {n + 1} \right) & = r \times \left( {X\left( n \right) - \left| {X\left( n \right)} \right|^{2} } \right) - r \times Y\left( n \right) \\ Y\left( {n + 1} \right) & = - Y\left( n \right) \times e^{ - 2\beta } + e^{ - \beta } \times r \times \left[ {\left( {2 - X\left( n \right) - X^{*} \left( n \right)} \right) \times \,Y\left( n \right) - X\left( n \right) \times Z^{*} \left( n \right) - X^{*} \left( n \right) \times Z\left( n \right)} \right] \\ Z\left( {n + 1} \right) & = - Z\left( n \right) \times e^{ - 2\beta } + e^{ - \beta } \times r \times \left[ {2 \times \left( {1 - X^{*} \left( n \right)} \right) \times\, Z\left( n \right) - 2 \times X\left( n \right) \times Y\left( n \right) - X\left( n \right)} \right] \\ \end{aligned}$$

Where the initial key parameters are:

  1. 1.

    X(0), Y(0), Z(0),

  2. 2.

    \(\varvec{X}^{*} \left( 0 \right)\), \(\varvec{Z}^{\varvec{*}} \left( 0 \right)\) {complex conjugates of X and Z},

  3. 3.

    r (also known as control parameter),

  4. 4.

    \(\varvec{\beta}\) (dissipation parameter).

This quantum logistic map generated string is independently coupled with NCML.

Equation set for coupling:

$$\begin{aligned} X_{n}^{coupled} \left( k \right) & = \left( {1 - e} \right) \times \left( {X_{n} \left( {k + 1} \right)} \right) + \left( e \right) \times Y_{n} \left( {k + 1} \right) \\ Y_{n}^{coupled} \left( k \right) & = \left( {1 - e} \right) \times \left( {Y_{n} \left( {k + 1} \right)} \right) + \left( e \right) \times Z_{n} \left( {k + 1} \right) \\ Z_{n}^{coupled} \left( k \right) & = \left( {1 - e} \right) \times \left( {Z_{n} \left( {k + 1} \right)} \right) + \left( e \right) \times X_{n} \left( {k + 1} \right) \\ \end{aligned}$$

where \(X_{n} ,Y_{n}\), \(Z_{n}\) are the random numbers generated using quantum chaos scheme \(X_{n}^{coupled} , Y_{n}^{coupled} , Z_{n}^{coupled}\) are the sequences obtained using NCML equations

This random sequence is used for encrypting the Signature (S) using a key whose value is given in set up parameters. Finally the encrypted signature is hashed using latest SHA-3 [23] algorithm to obtain encrypted digest. This digest is scrambled (XORed) with another digest obtained after applying SHA-3 on random chaotic sequences to obtain the watermark. The watermark is appended in random positions which are generated using RC4. The input key to RC4 is provided using quantum logistic equations mentioned above. The next section shows embedding of this watermark in the multimedia content.

3.2 Watermark embedding

The process of embedding is done using hybrid model i.e. combining DCT with Wavelet transform. The steps towards implementation of DWT–DCT hybrid embedding are as follows:

Step 1:

As suggested from the name of hybridization, the first transformation will be the Two-dimensional Discrete Wavelet Transform (DWT) applied on the full cover image

Step 2:

The result comprises of 4 matrices, approximation coefficients matrix cA (or LL in the diagram) and details coefficients matrices cH, cV, and cD(horizontal (LH), vertical (HL), and diagonal (HH), respectively)

Step 3:

In DWT based embedding techniques amongst these matrices the horizontal and vertical matrices are chosen for embedding purposes. Thus, choosing either HL or LH matrix and then applying two-dimensional discrete cosine transforms on it; we get a DWT–DCT block for the purpose of data embedding. The embedding positions are generated RC4

Step 4:

The reverse procedure is followed for getting the modified cover image or data embedded cover image.

Pictorially, the technique can be summed up as follows (see Fig. 2).

Fig. 2
figure 2

Embedding DWT–DCT block diagram

The advantages of using this hybridization can be seen in the result section ahead where geometric attacks are compared on Standalone DCT and hybridized form.

3.3 Watermark verification

The proposed paper uses same technique as provided by author Zhang et al. [18]. Author derived its basis from the inspiring contributions in literature [21, 24, 25]. The role of chaotic sequence generation in the same is inexplicable. This process is further enhanced by employing quantum logistic map coupled with NCML so as to enhance the robustness [16] nature and the subsequent security of the scheme [26,27,28].

4 Experimental setup

4.1 Set up parameters

The setup parameters are illustrated in Fig. 3 and enlisted in Table 2.

Fig. 3
figure 3

Set up parameters used in computation

Table 2 Set up parameters

4.2 Snapshots

The snapshots of results along with the histogram are shown in Table 3. The histogram of both the techniques (1) base paper—Zhang et al. [18] (2) proposed technique, show same result on ownership protection. The histogram indicates that watermarking scheme performs quite well in hiding the data in the original image. Same is the case for Zhang et al. scheme therefore no visual inference can be drawn from the histogram results. The performance metrics in terms of robustness and other parameters is covered in next section.

Table 3 Snapshots and histogram of results

5 Results

To check the efficacy of the proposed scheme, it is compared with one of the robust technique in literature provided by Zhang and Liu [18]. In addition; it is also compared with Ref. [22] which takes image perceptual quality as the performance metric. The next subsections give the detail of improvements obtained in performance parameters:

5.1 Ownership protection

5.1.1 Impact on correlation coefficient

To protect the ownership of the multimedia content, it should perfectly match with the original data. Therefore, correlation is calculated between original and watermarked image. The following points can be inferred:

  • Correlation obtained in proposed mechanism maintains consistent value for all image sizes unlike the base algorithm (Zhang et al.) where it increases with image size.

  • Table 4 depicts that the correlation between cover image and watermarked image is higher in proposed algorithm as compared to the base algorithm. A better correlation signifies much more visual similarity between cover and watermarked image, which in turn shows that higher level of imperceptibility is achieved in proposed technique.

    Table 4 Correlation coefficient versus image size

5.1.2 Impact on PSNR

The PSNR is basically the ratio of maximum power of signal to power of noise [25, 26, 29, 30]. More is its value better is the ownership of the document.

  • Referring to Table 5, it can be clearly observed that PSNR values are comparatively higher in proposed technique for all image sizes. The better values of PSNR between cover and watermarked image indicate that image quality is better retained in the proposed version.

    Table 5 PSNR versus image size
  • Also, PSNR increases as the image size increases.

5.1.3 Impact on SSIM (structural similarity)

  • Figure 4 shows that SSIM index is greater for proposed algorithm in each case i.e. for every image size. The numeric data is represented in Table 6.

    Fig. 4
    figure 4

    SSIM versus image size

    Table 6 SSIM versus image size
  • Also, SSIM Index of proposed algorithm is maintaining a consistent value unlike that of reference which rises with the increase in image size.

5.2 Robustness analysis

5.2.1 Impact on correlation coefficient

The watermark verification system can be manipulated if one includes some noise like pattern or its own watermark at different places overshadowing the original watermark. Thus, more than any of the other geometric attacks, such as affine transformations or cropping attacks, the analysis of recovered watermark after noise is added to the watermarked image seems necessary.

To check the robustness of the proposed algorithm against attacks, correlation is calculated after applying geometric attacks on the watermarked image. It was found that in most of the cases; proposed algorithm results into higher correlation indicating that it is more robust than the base algorithm in terms of resistance against geometric attacks (see Figs. 5, 6).

Fig. 5
figure 5

Correlation (after geometric attack): Gaussian noise

Fig. 6
figure 6

Correlation (after geometric attack) versus image size

5.2.2 Impact of JPEG compression

To find the impact on JPEG compression, Normalized Correlation Coefficient (NCC) is calculated between the original and water mark extracted for different Quality Factor (QF). It is found that the proposed technique has an edge over the Zhang scheme. At Quality factor 1 meaning no compression is there, the values of NCC for both the techniques are same while for QF = 0.75, the value of NCC is more for proposed algorithm (illustrated in Table 7) due to employment of Hybrid DCT–DWT approach.

Table 7 Impact of JPEG compression

5.3 Integrity of signature

The proposed algorithm uses SHA-3 in contrast to SHA-2 used by Zhang et al. Though, both have nearly same efficiency in terms of number of bits change when one bit is changed as can be seen from the Table 8 but SHA-2 is susceptible to length extension attacks. Also, its hardware implementation is easy that’s why SHA-3 is used in our proposed algorithm.

Table 8 Comparison of SHA-2 and SHA-3

5.4 Embedding signature in random positions

To find the embedding positions for watermark embedding, the proposed scheme uses RC4 in which input key is generated using quantum chaos scheme instead of chaos method making the generation of random position more random. Also RC4 is coupled with NCML for further enhancement of randomness.

5.5 Comparison results of proposed scheme

The proposed scheme is compared with Zhang et al. [18] and Gaurav et al. [22] from past literature. Clearly, it indicates from Table 9 that the proposed scheme is best in terms of robustness in comparison to both since it employs DCT–DWT watermarking scheme whereas Gaurav et al. uses spatial domain watermarking technique hence not robust but at the same time gives good picture quality. Also, DCT–DWT is more robust then stand-alone technique such as DCT and DWT, therefore the, the performance metrics lies in the middle of the both.

Table 9 Comparison table metric of the proposed scheme

6 Conclusion

The proposed watermarking scheme outperform Zhang et al. proposal available in literature in terms of all the objectives mentioned above. This proposed scheme is a novel approach for investigating robust watermarking in protection for IP cores. This approach is competent to investigate a low embedding watermark that accounts for satisfactory user specify constraints of randomness. The watermark generated through the proposed approach is based on a DWT–DCT coding scheme with RC4results in robust and secured outcome. The proposal is better in handling the effect of any noise-based geometric attacks (Gaussian and salt-pepper Noise).Besides, robustness watermark generated by this approach, the scheme contents the strong proof of authorship, imperceptibility, resiliency and integrity. The simulation results have confirmed that the proposed approach outmatches the recent work in robustness. The concluding points along-with their reasons are thus, enlisted in Table 10.

Table 10 Comparative analysis of proposed scheme with past research

Apart, from all the advantages one drawback of the proposed scheme is its time complexity, which is on the higher side in comparison to the Zhang et al. scheme due to usage of SHA-3, and DWT–DCT hybrid process. Also, the perceptual quality is also not good when compared to Gaurav et al. scheme due to employment of spatial domain technique for watermark embedding. Therefore, a scheme which has best picture quality after watermark embedding and robustness may be thought of in nearby future.