Introduction

With the rapid growth of information technology, interactive media have become the most important gadgets for transmitting information [1]. The mode of communication and business has been converted into digital form due to the global pandemic situations and this scenario is increasing day by day. Thus, there are millions, and billions of data are moving worldwide in the digital platform. Recently, this has caused considerable interest within the community due to the pandemic situation of COVID-19. Considering the privilege of cyberspace, anyone can easily modify or use content without the owner’s permission. So, security and authenticity become a concern to protect the information from being altered or misuse. Digital watermarking stands here to solve the issues. Digital watermarking is pursued as a marker or verification mechanism that proves an individual’s identity for his/her work. This marker can be a logo for an organization or the digital signature of an author. A digital watermark can be visible or invisible and embedded into the digital carrier like text, image, audio, or video-related content. Intangibility and robustness are considered in the substantial watermarking algorithm [2]. Intangibility is calculated by PSNR value (peak signal-to-noise ratio) and robustness is computed by correlation among the original watermark and recovered watermark image [3].

Digital watermarking is classified into spatial domain and frequency domain transform. In the spatial domain, the watermark is precisely enclosed by adjusting the grayscale values of the pixels of the host image beyond any transformation [4]. On the contrary, the transformation, such as DWT, SVD, DCT, DFT, etc., is performed in the host image before embedding into the watermark image [4]. It is said that the frequency domain not only tends to be more robust in comparison with the spatial domain but also further complex than the spatial method [4]. Several research groups have been working on the design of the watermarking technique. This has been introduced to overcome some of the inherent limitations of cryptography. The solution is to apply an appropriate hybrid method that guarantees strong authentication as well as the robustness of the owner’s property.

With this aim in mind, we seek to develop a novel approach with the goal of copyright protection. We examine the three key elements of work in this area:

(1) the first part was focused on the embedding procedure

(2) the second phase was involved in the extraction process and

(3) the last stage concentrated the resistance against multiple attacks.

The remaining of the paper has been structured as follows—“Literature Review” illustrates a review of techniques used in digital watermarking, “Digital Watermarking Concept”, “DWT” and “SVD” has set out the theories of digital watermarking, DWT (discrete wavelet transform), SVD (singular value decomposition) that underpin the method used in this paper, “Proposed Work” presents the embedding and extracting algorithm of our proposed work, “Performance Analysis” shows the performance analysis and discussion and “False Positive Issue” concludes the paper by examining the impact of the method.

Literature Review

The literature is reviewed to examine available methods that could be used in watermarking. A good number of research work is conducted for contemporary watermarking methods.

Zhang et al. [2] suggested a robust color image watermarking algorithm. This algorithm converts the host color image watermarking into YUV and SVD is utilized to Y component. However, the watermark is embedded into the host image followed by the modification through Arnold transform and DWT. This method claimed robustness against geometric attacks, but it is seen that the PSNR value is very low compare to other watermark-related schemes.

Singh et al. [5] proposed a block-based DWT-SVD image watermarking approach where QR (quick response code) code is considered as a watermark image. Both the original image and watermark image are decomposed by 2-level DWT on a low-frequency band and the corresponding frequency band is separated into m × n block size. As the color image is used here as a host image, SVD had to apply on each RGB component of a block to find the singular values of the watermarking. This method claims robustness against Gaussian noise and salt and pepper noise.

Similar work also has been pursued by others [6] in which a hybrid (DWT–SVD) watermarking scheme and a mathematical tool known as PSO (particle swarm optimization) are used for the efficient and secured watermarked image. RGB components of the host image are separated, and three-level DWT is performed on the R component. Then, SVD is applied on the approximate co-efficient of the R component. On the other hand, the watermark image is scrambled using Arnold transform and SVD is also used here to find the singular value of the watermark. The scaling factor is obtained from PSO to embed into the watermark image. This technique asserted good PSNR values adjacent to different attacks.

This issue was explored by Naik et al. [7], who introduced a robust watermarking technique based on DWT and SVD, which decomposed the host image by 2-level DWT and SVD is applied into the HL sub-band. The same working principle is performed on the watermark image and then the SVD of both images is embedded with a scaling factor to form a watermarked image.

Conceptually similar work has also been carried out by [8, 9] in which the cover image is divided by first-level Haar DWT and the SVD is added to the LH and HL sub-bands. Besides, the watermark is split into equal halves and LH and HL are modified before being inserted in the host image. The watermark is extracted from the reverse process. It is noted that this approach only demonstrates robustness for histogram equalization.

Harjito and Suryani [10] developed their watermarking scheme where white Gaussian is added to the scaling factor. But this technique is not resistant to some attacks like rotating, cropping, and blurring.

In the study [11], both the host and watermark are converted into the grayscale and the watermark is encrypted before the embedding procedure. Host image is decomposed by 2-D DWT and SVD is applied on lower-level frequency region. Encrypted watermark is then embedded into this LL sub-band of the host image.

A hybrid watermarking algorithm based on DWT–DCT is suggested by Akter et al. [3]. The authors applied 4th-level DWT into the original image and select HL4 and LH4 sub-bands. The properties of DCT are performed to the co-efficient of these said sub-bands. Concurrently, the watermark image is reformed and scramble it. The scrambled watermark image is then transformed into DCT. The duo of these modified host image and watermark is embedded to form the watermarked image. The reverse process is used to extract the watermark. This algorithm is tested through PSNR and MSE to evaluate the performance and compared the existing method. It can be seen the PSNR value is found 36.52 dB of the watermarked image before the attack and it is 30.21 dB after the attack. This method only used Additive White Gaussian Noise (AWGN) to prove the performance, but other significant attacks were not tested here.

This method [12] presented a unique technique that showed a comprehensive rise of PSNR value. The host image and the watermark image are split into R, G, and B channels, and the single-level 2D DWT is applied to the selected frequency sub-bands. Increased levels of host image and watermark have been associated with 2D DFT and DCT respectfully. The SVD is performed on both images before the embedding. But this method is not being tested by a variety of attacks.

Another method is approached by [13], where DCT is used in host images and a watermark is embedded by a slightly modified version of Cox’s formula. This system provides robustness upon adding a watermark in the low-frequency regions compare with high-frequency regions.

It is noted that some methods provide good PSNR values in terms of watermarked images, but the robustness is low for the watermark extraction procedure. The grayscale image works well in some approaches while several techniques produce better results in color images. Fewer algorithms show robustness upon geometric attacks where some other is applicable only for lean attacks. Considering the above-mentioned difficulties discussed in the literature review, a novel hybrid watermarking procedure is approached in the presented work. This mechanism is developed to consider the grayscale and color images. Watermark embedding and extraction are evaluated in both types of images and robustness is examined in various types of attacks. This scheme is allowed an acceptable imperceptibility rate along with security issues.

Digital Watermarking Concept

Digital watermarking is a good choice for the authentication and copyright protection of images. This has proven to be a serious impediment to a widespread misuse of information in a common communication environment like the internet [14]. The basic idea of image watermarking is to embed invisible or inaudible data within multimedia content. The copyright information is contained in the watermarked substance. The hidden data for such purposes are referred to as a watermark and the content can be an image, audio, or some other type of media in any of the formats available [15]. On that account, digital watermarking has been chosen for its wide range of applications in the field of computer science, cryptography, signal processing, and communications [16].

The digital watermarking technique comprises two processes—embedding process and extraction process. In the embedding phase, the secret information (known as a watermark) is inserted into the multimedia object (known as a cover image) and is called “watermarked image” [17].

This watermarked image is then transmitted through the communication channel and the stored watermark can be retrieved at the receiver end to ensure the validity of the digital data. This retrieval process is called “watermark extraction” [17]. The embedding and extraction process is schematically shown in Fig. 1.

Fig. 1
figure 1

Schematic diagram of digital watermarking

Imperceptibility, robustness, and security are the key features of the watermarking method. Imperceptibility is computed by the visual affinity of the host image in comparison to the watermarked image [18]. The watermarking framework ought to be robust against any deliberate or accidental assault of the watermarked substance that can be a picture, sound, video, or text [13]. A watermark system is supposed to be secure if the unauthorized person cannot extract the watermark without having complete knowledge of the embedding algorithm, the detector, and the composition of the watermark [19]. The schematic diagram of digital watermarking is shown in Fig. 1.

DWT

Discrete wavelet transform is considered the most widely used transformation technique for digital watermarking. It is indeed useful to describe DWT as any wavelet transform for which wavelets are sampled discretely [31]. The strength of DWT over Fourier transform is its ability to produce a temporal resolution in which it captures both frequency and location information. The wavelet’s translations and dilations are triggered by the mother wavelet [26].

The DWT splits an image into four non-overlapping multi-resolution sub-bands—LL, LH, HL, and HH [37]. The LL (low–low) level signifies the approximate part of the cover image while the other three levels, i.e. LH (low–high), HL (high–low), and HH (high–high) provide detailed information about the host image [33]. For further decomposition, any of the sub-bands are selected and hence divide into four levels. The decomposition method is replicated until the required levels of decomposition are reached [32]. The maximum degree of decomposition seems to be the intensity of the watermarked image [33]. At each step of decomposition, the magnitude of DWT coefficients is greater in the lower band (LL) and smaller in the other three bands (LH, HL, and HH) [33]. As HVS (human visual system) is more sensitive to low-frequency parts (LL sub-band), so watermarks are ideally put in the three other sub-bands to maintain the quality of the original image [33]. A diagram, showing the steps in the DWT decomposition process is shown in Fig. 2.

Fig. 2
figure 2

Discrete wavelet transform decomposition

SVD

Singular value decomposition is a mathematical transformation that is used for the factorization of a real or complex matrix with diverse applications in various areas of image processing [36]. The purpose of SVD is to minimize the complexity by splitting the non-negative image matrix into U × S × VT, where U and V denote the orthogonal matrices and S is called the diagonal matrix of singular values of the original matrix handled in decreasing order [26].

There are two key features of SVD to be used in automated watermarking techniques: [33]

  1. (1)

    The changes in singular values would inevitably affect the quality of the images.

  2. (2)

    The singular values of the image are therefore of high stability; they do not shift after numerous attacks.

A graphical description of the procedure of SVD of an M × N image is presented in Fig. 3 [32].

Fig. 3
figure 3

The procedure of SVD decomposition

Proposed Work

In our work, we explore a new hybrid approach, a fusion of DWT and SVD, for the improved quality of watermark insertion and extraction procedure. The advantage of this proposed algorithm is that it has the properties of undetectability and durability. The blend of DWT and SVD will bring to light the potential mechanisms responsible for the owner’s authenticity and robustness to several kinds of attacks. The suggested algorithm belongs to two parts—the watermark embedding and extraction algorithm. Both parts along with respective flowcharts have been described in detail in “Watermark Embedding Algorithm” and “Watermark Extracting Algorithm”.

Watermark Embedding Algorithm

A detailed description of the steps of watermark embedding is given below:

figure a

The flowchart of watermark embedding is presented in Fig. 4.

Fig. 4
figure 4

Flowchart of watermark embedding

Watermark Extracting Algorithm

The procedure of watermark extraction is explained in the following Algorithm 2.

figure b

The flowchart of watermark extraction is shown in Fig. 5.

Fig. 5
figure 5

Flowchart of watermark extraction

Performance Analysis

The proposed algorithm has been accomplished using MATLAB R2016a software. This technique is carried out under several conditions with different types of host images and logo watermark image. The sizes of the host image are taken as 512 × 512 pixels and the watermark image as 256 × 256 pixels.

Proof of Imperceptibility

Imperceptibility implies that the visual quality of the host image should not be skewed by the presence of the watermark [3]. Peak signal-to-noise ratio (PSNR) is used as a primary tool to show the visual effect between the host image and the watermarked image whereas MSE is calculated as the square of error amidst those images [34]. Besides, the Structural Similarity Index Measure (SSIM) and Normalized Correlation (NC) act as essential parameters for the evidence of invisibility. The range of SSIM varies from 0 to 1. Although 1 indicates the perfect match of the reconstructed image compares to the original one, the values range from 0.9 to 1 are designated as appropriate regenerated images. NC is also used to measure the similarity between two images.

Mathematically, PSNR and MSE can be expressed as follows:

$${\text{PSNR}}\left( {{\text{dB}}} \right) = 10\log_{10} \frac{{{\text{MAX}}^{2} }}{{{\text{MSE}}}}$$
(1)
$${\text{MSE}} = \frac{1}{H \times W} \mathop \sum \limits_{i = 1}^{H} \mathop \sum \limits_{j = 1}^{W} \left[ {X\left( {i,j} \right) - Y\left( {i,j} \right)} \right]^{2} .$$
(2)

Apart from PSNR, MSE, SSIM, and NC, a new metric known as feature similarity index (FSIM) has been applied to correlate the feature similarity measure among the host image and the watermarked image [35] for image quality assessment (IQA). The phase congruency (PC) and the gradient magnitude (GM) are the two main parameters in FSIM to measure the image quality [36]. At first, the feature similarity of phase congruency (PC) of host and watermarked images can be defined as

$$S_{{{\text{PC}}}} \left( x \right) = \frac{{2{\text{PC}}_{h} \left( x \right) \cdot {\text{PC}}_{{{\text{WI}} \left( x \right)}} + T_{1} }}{{{\text{PC}}_{h}^{2} \left( x \right) + {\text{PC}}_{{{\text{WI}}}}^{2} \left( x \right) + T_{1} }},$$
(3)

where, SPC is the feature similarity of phase congruency (PC) between host image and watermarked image, PCh and PCWI are the phase congruency of host image and watermarked image, respectively, and T1 is a positive constant for boosting the stability of SPC.

Likewise, the similarity measure of GM value can be calculated as follows:

$$S_{{{\text{GM}}}} \left( x \right) = \frac{{2G_{h} \left( x \right) \cdot G_{{{\text{WI}}}} \left( x \right) + T_{2} }}{{G_{h}^{2} \left( x \right) + G_{{{\text{WI}}}}^{2} \left( x \right) + T_{2} }},$$
(4)

where SGM is the similarity computation of gradient magnitude of both images (host and watermarked), Gh and GWI are the gradient values of host and watermarked image and T2 is the positive constant factor relying on the changing values of gradient magnitude.

The similarity SL (x) of fh (x) and fWI (x) can be found by combining the SPC (x) and SGM (x):

$$S_{{\text{L}}} \left( x \right) = \left[ {S_{{{\text{PC}}}} \left( x \right)} \right]^{\alpha } \cdot \left[ {S_{{{\text{GM}}}} \left( x \right)} \right]^{\beta } ,$$
(5)

where α and β regulate the corresponding importance of PC and GM features. The values of α and β have been set to 1 for convenience.

The expression of FSIM can be computed in the following way

$${\text{FSIM}} = \frac{{\sum\nolimits_{{x \epsilon \Omega }} {S_{{\text{L}}} } \left( x \right) \cdot {\text{PC}}_{m} \left( x \right)}}{{\sum\nolimits_{{x \epsilon \Omega }} {{\text{PC}}_{m} } \left( x \right)}},$$
(6)

where Ω is the whole image spatial domain.

An additional mathematical tool, called gradient magnitude similarity deviation (GMSD) has been used to evaluate the performance of image quality assessment. To predict the overall image quality, GMSD analyses the exploit of global variation of the gradient-based local-quality map [36]. The gradient is normally computed by transforming an image with a linear filter. The GMS map is represented pixel-wise and serves as the local-quality map of the distorted image. The gradient magnitude similarity deviation (GMSD) can be calculated as follows:

$${\text{GMSD}} = \sqrt {\frac{1}{N}\mathop \sum \limits_{i = 1}^{N} ({\text{GMS}}(i) - {\text{GMSM}})^{2} } ,$$
(7)

where, N is the total number of pixels in the image, GMS is the gradient magnitude similarity at location i, and GMSM is the gradient magnitude similarity map at location i.

The value of GMSD represents the range of magnitude of distortion in an image. The higher the GMSD score, the greater the distortion range, and hence, the lower the perceptual quality of the image.

Initially, the test is performed for the grayscale and colored version of the same host image. The scaling factor-alpha of the watermark image is chosen manually through a trial-and-error basis. The range beyond the values from 0.03 to 0.06 gives a drastic change of extracted watermark images. Thus, the scaling factor-alpha has been set within this range. Figure 6 shows the watermarked images of Lena (grayscale) and Lena (color) and the subsequent Table 1 displays the testimony of these images. The PSNR values of Lena (grayscale) and Lena (color) are found here as 43.8362 and 34.7266 dB. MSE, SSIM, NC, and FSIM values also validate the output. GMSD is a distortion index where a lower value indicates higher quality.

Fig. 6
figure 6

Host image of a Lena (grayscale) and b Lena (color), c Logo watermark and watermarked image of d Lena (grayscale) and e Lena (color)

Table 1 PSNR, MSE, SSIM, and normalized coefficient (NC) of watermarked. image of Lena (grayscale) and Lena (color)

Furthermore, Figs. 7 and 8 indicate the watermarked images of grayscale and color formats of Zelda and penguin and the consecutive Tables 2 and 3 convey the values of those images. It can be seen that the PSNR values inclusive of MSE, SSIM, and NC of Zelda and penguin provide well-founded results for watermarked images and extraction of the watermark process. The value of FSIM is also on a normalized scale. GMSD identically shows a very good appraisal which indicates the minimal distortion between the host and the watermarked images.

Fig. 7
figure 7

Host image of a Zelda (grayscale) and b Zelda (color), c Logo watermark and watermarked image of d Zelda (grayscale) and e Zelda (color)

Fig. 8
figure 8

Host image of a Penguin (grayscale) and b Penguin (color), c Logo watermark and watermarked image of d Penguin (grayscale) and e Penguin (color)

Table 2 PSNR, MSE, SSIM, and normalized coefficient (NC) of watermarked
Table 3 PSNR, MSE, SSIM, and normalized coefficient (NC) of watermarked image of Penguin (grayscale) and Penguin (color)

The proposed method is also executed through some test images, taken from open-source databases, such as Berkeley Segmentation Dataset (BSD) [37] and THUR15K dataset [38]. The values of FSIM and GMSD show the validation of the proposed method. Figures 9 and 10 illustrate the watermarked and extracted watermark images from different test images of the specified datasets.

Fig. 9
figure 9

Implementation of test images of Berkeley Segmentation Dataset

Fig. 10
figure 10

Implementation of test images taken from THUR15000 dataset

Proof of Robustness

Robustness implies that how efficiently the watermark can be extracted from various types of attacks employed in the watermarked image. Both geometric and non-geometric attacks are considered for stability assessment. Geometric attacks include cropping, rotation, and scaling. JPEG compression, median filtering, average filtering, noise, and histogram equalization are dealt with non-geometric attacks [20]. The Figs. 9, 10, 11, 12 and 13 illustrate the retrieved watermark (without noise) from the watermarked image and Tables 4, 5, and 6 summarize the range of parameters used in interpretation purpose.

Fig. 11
figure 11

Extracted watermark from a Lena (grayscale) and b Lena (color)

Fig. 12
figure 12

Extracted watermark from a Zelda (grayscale) and b Zelda (color)

Fig. 13
figure 13

Extracted watermark from a Penguin (grayscale) and b Penguin (color)

Table 4 PSNR, MSE, SSIM, and normalized coefficient (NC) of extracted watermark of Lena (grayscale) and Lena (color)
Table 5 PSNR, MSE, SSIM, and normalized coefficient (NC) of extracted watermark of Zelda (grayscale) and Zelda (color)
Table 6 PSNR, MSE, SSIM, and normalized coefficient (NC) of the extracted watermark of Penguin (grayscale) and Penguin (color)

The following Table 7 shows the PSNR values that are retrieved from the several watermarked images under numerous attacks.

Table 7 PSNR values of different watermarked images under several attacks

Table 8 summarizes the NC (normalized coefficient) values of the extracted watermark, recovered from multiple attacked watermarked images.

Table 8 NC (normalized coefficient) values of watermark extracted from attacked watermarked images

Table 9 indicates the comparison of the watermarked image and extracted watermark between the proposed method and existing methods for the grayscale image.

Table 9 Comparison chart of the proposed method with existing methods of Lena (grayscale)

The NC (normalized correlation) values of the extracted watermark (grayscale image) from different attacks are shown in Table 10.

Table 10 Comparison of NC value of watermark extraction under several attacks of Lena (grayscale)

Here is the chart in Table 11, which shows the comparison of the proposed method with existing methods for colored images.

Table 11 Comparison chart of the proposed method with existing methods of Lena (color)

The watermark extraction from the colored image under several attacks is compared in Table 12.

Table 12 Comparison of NC value of watermark extraction under several attacks of Lena (Color)

False-Positive Issue

In SVD-based watermarking system, different types of errors, such as message error, false-negative, and false-positive errors, can occur. The most significant problem in the SVD-based image watermarking scheme is a false-positive error. This error happens during the extraction of the watermark process. A transformation technique along with SVD can resolve the issue. In this paper, we have applied multi-level DWT transform accompanying SVD to mitigate this error. Owing to DWT transform and to find out the singular values of LL and HH edges of host and watermark image and embed those singular values into the host part could inhibit the false-positive fallacy.

Conclusion

This paper proposed an improved DWT–SVD-based hybrid approach which is proved to be a good mechanism for both grayscale and color images. The blending of the 1st level and the 2nd level of singular values are inserted into the lower-level and higher-level frequency regions of the cover image. It is said that adding singular values in the host image cause false-positive results, but our proposed approach has overcome this issue. We have applied our method in three types of duo images (grayscale and color) to exhibit the outcome. The authenticity and robustness are found at an acceptable rate for both types of images using the proposed method. More efforts will be taken in near future for further improvement of the imperceptibility and robustness, such as the incorporation of the modified Fibonacci sequence for watermark encryption and particle swarm optimization (PSO) for embedding purposes. We will also work on infusing multiple watermarks with the host image for more flexibility.