1 Introduction

In the last few years, with outspread of cyber technologies, multimedia copy rights become unavoidable domain in business dealings [1, 23, 34]. Therefore, watermarking techniques which are the methods of embedding data into image, audio, and video to prevent illegal use of copy files [1, 30] got great attention. It is clear-cut that security and efficiency have the main role in evaluating a watermarking method. On the whole, watermarking techniques are discussed in two different domains:

  1. 1 -

    Spatial Domain which concentrates on applying algorithm to pixels directly. It is easy in implementation but decrease of efficiency caused by complex calculus must be considered [8, 32].

  2. 2 -

    Transform Domain that provides high flexibility and efficiency with low overhead of calculus. However, it must be noticed that locating watermark values into low-frequency ratio may cause huge alternation in base image which is not acceptable. On the other side, embedding that into high frequency ratio steers to a weak point because applying some filters(Attacks) such as low pass filter causes watermark looseness [8, 32]. So as a factor in watermarking process, using transform domain could have lots of effects on results. Many of recent papers, have focused on wavelet based transforms, because it is fast and efficient regarding to other techniques. One of the known wavelet based transforms is DWT (Discrete Wavelet Transform) which is suitable transform domain for watermarking because preferred sub-band can be chosen which causes slight changes in watermarked image [1, 17, 19, 35]. Agoy et al. [1] introduced a novel combination of DWT via chirp z-transform and SVD for image watermarking which shows medium imperceptibility and robustness. As another work, Amiri et al. [3] proposed new visual cryptography based watermarking scheme using DWT and SIFT which shows good imperceptibility and high values for robustness. Also Hu et al. [16] introduced novel scheme based on combination of DWT-DCT for blind image watermarking which shows good capabilities according to metrics. As another wavelet based transforms, the newer version of DWT called LWT became more famous because of fastness and efficiency via other wavelet based transforms [23]. Mehta et al. [24] proposed novel image watermarking scheme based on LWT and GA-LSVR which shows high values in both metrics. As another research, Mehta et al. [25] worked on combination of LWT, QR decomposition and LSVR for image watermarking and results shows high robustness against different kinds of attacks. As another approach, using lossless data hiding technique for reversible watermarking became popular. An et al. [4] proposed a watermarking method using Enhanced Pixel-Wise Masking and Clustering which showed good robustness. Also An et al. [6] presented Content-adaptive reliable method for robust lossless data embedding. In another paper, An et al. [5] developed a statistical quantity histogram Shifting and clustering-based method which shows same good results due to experiments. Furthermore, Gao et al. [12] proposed a novel method for improving reversibility in lossless data hiding with two technique of block skipping scheme and modifying embedding level by a parameter model. Also, Gao et al. [13] developed a framework based on generalized statistical quantity histogram that show same good results.

Up to above discussion, watermarking technique metrics include: imperceptibility that concerns low difference between original and watermarked image and good robustness that points to successful watermark detection even after applying some attacks to watermarked image. These metrics seems to be Consolidation inevitable since you need to use large amount of data to improve robustness that conflicts with imperceptibility [8, 10, 24]. It seems that we need such a trade-off between these two parameters that is reminiscent of optimization problems. Thus as an optimization technique such as genetic algorithms (GA), particle swarm optimization (PSO), differential evolution (DE) may be employed in watermarking applications. There are some strategies numerated to face this kind of issue but in this paper we focus on Firefly algorithm. The main role of optimization phase takes place in choosing suitable blocks for embedding watermark.

Choosing the best blocks in transform domain for embedding process derived to ignore specific percentage of blocks that this percentage named as Ignoring Factor in following. In this case, the Firefly algorithm applied to optimize Ignoring Factor (IF) for embedding the watermark into base medium via lifting wavelet transform.

In this paper, we scrutinize novel method and combination of Lifting Wavelet Transform and Firefly optimization algorithm for digital image watermarking which produces significant results in robustness. Embedding and extracting phase implemented in LWT domain for specific characteristics stated before and firefly algorithm used for optimizing block ignoring factor which balances trade of between imperceptibility and robustness. Remain parts structured as follows. In Section 2, Overview of Lifting Wavelet Transform, Firefly Algorithm, Arnold Transform and evaluation metrics are discussed. The usage of proposed algorithm is introduced in Section 3. Then, experimental results and discussion are presented in Section 4 followed by conclusion and future work in Section 5.

2 Overview of LWT, firefly algorithm, Arnold transformation and evaluation metrics

2.1 Lifting wavelet transform

In recent decade, LWT mentioned by Sweldens [9], becomes a powerful scheme for various applications in the field of image processing such as watermarking [21], image compression [11], pattern recognition [39]. LWT overcomes the defects and limitations of former wavelet transform [23]. On the whole, this strategy contains three fundamental section:

  • Splitting: This points to dividing primary signal Z(x) into even and odd non-overlapping items of Z e (x) and Z o (x).

    $$ {Z}_e(x)=Z(2x),{Z}_o(x)=Z\left(2x+1\right) $$
    (1)
  • Prediction: After applying correlation between even and odd item, the one can be predictable by other one. It can be considered as high-pass filter operation. For prediction of Z o (x) we brought Z e (x) item by:

    $$ h(x)={Z}_o(x)-P\left({Z}_e(x)\right) $$
    (2)

    Where h(x) shows subtraction between primary signal and predicted rate and P(.) is prediction operator.

  • Updating: It can be considered as low-pass filter operation which depict coarse figure of primary signal. For updating even items, we hired h(x) and operator of updating U(.) as follow:

    $$ l(x)={Z}_e(x)+U\left(h(x)\right) $$
    (3)

2.2 Firefly algorithm

Lately, meta-heuristic algorithms has been the focus of academic communities. This kind of algorithms are suitable for conquering optimization problems. FA is one of the meta-heuristic algorithms which proposed by Yang in 2007 [36] for solving optimization problems specially those of multimodal and nonlinear ones. Firefly algorithm inspired from instinctive behavior pattern of fireflies on communicating to each other or finding the mates by bioluminescence process of illustrating natural light [18, 27, 33]. Simplicity, easy implementation, flexibility are strength points of this algorithm [2]. There are some rules we consider for ease of perception [38]:

  1. 1.

    Fireflies attract to each other regardless of sexuality.

  2. 2.

    Attraction depends on brightness. Thus, it can be said, the less bright firefly move to brighter one (In max condition). We’ll see random moves in the case of no light or no brighter firefly can be found.

  3. 3.

    Firefly light intensity is specified by optimized objective function value.

In firefly algorithm, we face two essential factors: light intensity alteration and formulizing attraction rate. The attraction rate β is obtained by light intensity I. The alternation of attraction rate between firefly i and j in distance of d ij , occurs on decrease of light intensity caused by distance. Following equation denotes calculus of intensity for a firefly in the simplest form [8].

$$ I(d)={I}_0{e}^{-\gamma d} $$
(4)

Where γ is the light absorption coefficient and I 0 is the base intensity. Since attraction rate of a firefly depends on received intensity in adjacent fireflies, the attraction rate β can be specified by

$$ \beta (d)={\beta}_0{e}^{-\gamma {d}^2} $$
(5)

Where β 0 is attraction rate at d = 0. We can use Cartesian or Euclidean distance for calculating the distance between a pair of fireflies at position of x i and x j as follows:

$$ {d}_{i,j}=\left\Vert {x}_i-{x}_j\right\Vert =\sqrt{{\displaystyle {\sum}_{k=1}^{dim}{\left({x}_{i,k}-{x}_{j,k}\right)}^2}} $$
(6)

Where dim shows spatial coordinate dimensions. The fireflies movement are consequence of interactions in such a way that low brighter firefly attracted by high brighter one in maximization condition and vice versa in minimization condition. This process continues until the best result achieved. This process formulated by following equation:

$$ {x}_i={x}_i+{\beta}_0{e}^{-\gamma {d}_{ij}^2}\left({x}_j-{x}_i\right)+\alpha {\varepsilon}_i $$
(7)

Where the current location of firefly is shown in the primary term and second one indicates attraction while third one depicted randomization by ε as the vector of random values drawn from a Gaussian distribution and α as randomization parameter. In this case, we assume γ = 1 for faster convergence of algorithm to optimal result, β 0  = 0.1 and α in desired range of [0, 1]. It should be noticed that β 0 ranges between [0, 1] where lower bound eventuate to random, distributed and non-cooperative search and on the other side, the upper bound tantamount to cooperation on local domain search. γ represents attractiveness variation which theoretically, ranges in [0, ∞] but practically it must be selected according to the optimization issue. In general, choosing zero value for that shows constant attractiveness and letting it to infinity causes near to zero values for attractiveness which means random search. On the whole, values of these parameters are very significant with regard to impact on algorithm behaviors [7, 28, 37]. The pseudo code for firefly algorithm in finding Min condition is shown in Fig. 1.

Fig 1
figure 1

Pseudo code of firefly algorithm

2.3 Arnold transformation

For security reasons, applying image scrambling methods are recommended and Arnold transform is one of the powerful and popular one proposed by V.I. Arnold. For a square image, common 2D form of that specialized by equation:

$$ \left[\begin{array}{c}\hfill {x}_k\hfill \\ {}\hfill {y}_k\hfill \end{array}\right]=\left[\begin{array}{cc}\hfill 1\hfill & \hfill a\hfill \\ {}\hfill b\hfill & \hfill ab+1\hfill \end{array}\right]\left[\begin{array}{c}\hfill {x}_{k-1}\hfill \\ {}\hfill {y}_{k-1}\hfill \end{array}\right] mod\ N $$
(8)

Where N indicates the height of processing image, a and b positive integer values and x k , y k are scrambled image peculiarities in accordance with kth iteration of x k-1 and y k-1. According to special property of Arnold transform, after T n (image period) iteration position of pixel changes to primary position as depicted in Fig. 2. Mentioned figure shows an instance of applying Arnold transform to image with size of 32 × 32. It is clear cut that for k iteration scrambled image, we need T n - k iteration to achieve original image.

Fig 2
figure 2

Arnold transform process (numbers upper images refer to iteration count)

2.4 Evaluation metrics

As stated in Section 1, we have two aimed metrics to evaluate our technique. These two metrics are imperceptibility which is measured by peak signal to noise ratio (PSNR) specified by equation:

$$ PSNR=10{ \log}_{10}\left(\frac{I_{max}^2}{MSE}\right) $$
(9)

Where I max is maximum intensity level and MSE is mean square error specified by equation:

$$ MSE=\frac{{\displaystyle {\sum}_{x=1}^M{\displaystyle {\sum}_{y=1}^N{\left(I\left(x,y\right)-I\prime \left(x,y\right)\right)}^2}}}{M\times N} $$
(10)

Where I and I′ denotes intensity of pixel(x, y) before and after watermarking and robustness which is measured by normalized correlation (NC) specified by Eq. (11) and Bit error rate (BER) specified by Eq. (12).

$$ NC\left(W,{W}^{*}\right) = \frac{{\displaystyle {\sum}_{i=1}^{N1}}{\displaystyle {\sum}_{j=1}^{N2}}\left(W\left(i,j\right)\times W^{\prime}\left(i,j\right)\right)}{{\displaystyle {\sum}_{i=1}^{N1}}{\displaystyle {\sum}_{j=1}^{N2}}{\left(W\left(i,j\right)\right)}^2} $$
(11)
$$ BER = \frac{{\displaystyle {\sum}_{i=1}^{N1}}{\displaystyle {\sum}_{j=1}^{N2}}\left(W\left(i,j\right)\otimes W^{\prime}\left(i,j\right)\right)}{N1\times N2} $$
(12)

Where W(i, j) and W′(i, j) represent embedded watermark and extracted watermarked.

Also, for checking visibility and quality of watermarked image there is a subjective method which works with human visual system (HVS) but Sheikh et al. [29] proposed new objective metric named Visual Information Fidelity (VIF) that shows better efficiency and accuracy.

3 Proposed watermarking technique

In current section, we explain proposed watermarking technique in which include Firefly algorithm implementation details for optimizing ignoring factor, embedding and extracting process of watermarking.

3.1 Watermark embedding process

  1. Step1:

    Watermark safety via Arnold Transform

    Watermark image is converted to binary image which size is \( {N_w}^2 \) as a square image. We robust safety of our watermark by applying Arnold transform using k iteration (here k = 16) and this process results to scrambled image. After that, scrambled image formed as a row matrix with length of L swi. Matrix elements are binary values which must be used in embedding process. General form of this matrix is shown in following equations:

    $$ SWI=\left[b{e}_1,b{e}_2, \dots,\ b{e}_{L_{swi}}\right],\ b{e}_i\in \left\{0,1\right\} $$
    (13)
  2. Step2:

    Applying LWT into base image

    Apply one level LWT with db2 filter to base image with size of M × N for decomposing it into four sub-bands LL, LH, HL and HH. The size of each sub-band can be calculated by following equations:

    $$ SS={M}_L\times {N}_L $$
    (14)
    $$ {M}_L = M/{2}^k,\ {N}_L=N/{2}^k $$
    (15)

    Where k refers to decomposition level (Here, k = 1).

    After that, rip LL matrix coefficients of LWT transform into 3 × 3 non-overlapping blocks as shown in Fig. 3.

    Fig 3
    figure 3

    General form of 3 × 3 non-overlapping blocks

  3. Step3:

    Choosing suitable blocks

    Standard deviation (SD) of each block must be calculated and sorted in descending order. If we start embedding from first block with most deviation according to embedding technique, results in high robustness but low imperceptibility and vice versa. So in the following, some percentage of primary blocks (achieved by Firefly Algorithm) ignored for balancing trade-off between our two metrics. After applying Ignoring Factor, select \( \left({L}_{swi}\right) \) number of first blocks for embedding process. For extracting phase, position of these block are needed, so we save index of used blocks in a key_vector array. It should be passed to extracting function as an input parameter.

  4. Step4:

    Watermark embedding

    Afterward, for each block we use coefficients of that block to find min/max values. Then we use min and max values to embed watermark data by instruction depicted in Fig. 4. According to value of each scrambled watermark bit, we change central coefficient to min or max value. In the following, we reconstruct LL sub-band by merging changed blocks and applying inverse LWT to get watermarked Image.

    Fig 4
    figure 4

    Proposed watermark embedding instruction

3.2 Watermark extracting process

  1. Step1:

    Applying LWT into base image

    Apply one level LWT and make 3 × 3 non-overlapping blocks as mentioned in step 2 from Section 3.1.

  2. Step2:

    Extracting scrambled watermark data from watermarked image

    Select blocks due to key_vector values, then use instruction shown in Fig. 5 to extract hidden values of scrambled watermark. We find max and min coefficient for each block. After that we compare destination of these two values with central coefficient. Lower value of destination shows tendency to min or max. Then we use it as a condition to get scrambled watermark. Main reason for this comparison refers to probability of distortion occurrence for coefficients by attacks.

    Fig 5
    figure 5

    Proposed watermark extracting instruction

  3. Step3:

    Applying Arnold Transform

    Reshape resulted row matrix into two dimensional form and apply (T n – k) time Arnold transform to get watermark.

3.3 Implementation of firefly algorithm to achieve ignoring factor

  1. Step 1:

    Define n fireflies which each one contains decimal random values.

  2. Step 2:

    Perform watermark embedding process for each firefly.

  3. Step 3:

    Obtain M + 1 different watermarked image include one attack free and M attacked ones and compute PSNR and BER for attack free watermarked image.

  4. Step 4:

    Produce M watermark from attacked watermarked image using extraction process and compute NC and BER for each one.

  5. Step 5:

    Compute objective function depicted in Eq. 16 for current firefly.

    $$ \mathrm{OF} = \left[\upomega \times \left(BER + \frac{1}{PSNR}\right)\right]+\left[\left(\frac{1}{M}\times {\displaystyle {\sum}_{k=1}^M\frac{1}{NC{\left(W,W\prime \right)}_k}}\right) + \left(\frac{1}{M}\times {\displaystyle {\sum}_{k=1}^M BE{R}_k}\right)\right] $$
    (16)

    Where first bracket is for attack free phase and second one for attacked phase. Our main aim is minimizing objective function so, as is obvious in formula, lower value of BER along with higher values of PSNR and NC (Bigger values in denominator makes two fraction smaller) makes it possible for us. Second bracket contains average values of BER and 1/NC for attack phase. Also ω (Here ω = 10) used for balancing effect of PSNR, BER and NC for two phase.

  6. Step 6:

    Move fireflies as for explained in Section 2.2.

  7. Step 7:

    Iterate step 2 to 6 until max generation reached.

4 Experimental results and comparison

4.1 Experiment description

Our experiments implemented using Intel(R) Core™2 Due 2.53 GHz, windows7 with 4GB RAM in platform of MATLAB R2014b(8.4.0). The performance of our technique evaluated by utilizing standard grayscale images of “Lena”, “Boat”, “Mandrill”, “Barbara”, “Cameraman”, “Pepper”, “Pirate”, “Jet Plane” and “Lake” with size of 512 × 512 and two binary image of CS as WM1 and test logo as WM2 with size of 32 × 32 which are depicted in Fig. 6a–k.

Fig 6
figure 6

Standard grayscale images of (a) “Lena”, (b) “Boat”, (c) “Mandrill”, (d) “Barbara”, (e) “Cameraman”, (f) “Pepper”, (g) “Pirate”, (h) “Jet Plane” and (i) “Lake” with size of 512 × 512 and (j) with (k) are binary images as 32 × 32 watermarks

For optimizing process performed by FA we use 10 fireflies with max generation of 50 and \( \gamma =1.0,\;{\beta}_0=1.0 \) and α = 0.1. Convergence of this algorithm with given parameters studied on “Lena” image with watermark WM2 and gained results showed in Fig. 12. On the whole, all images investigated from two aspect of attack and attack free. For the aspect of attack, we applied 8 kind of image processing functions like Center Cropping (size of 100 × 100), JPEG compression (Q = 70), Average filter, Gaussian filter, Sharpening filter, Gaussian noise, Speckle noise and Salt and Pepper noise as attack process. According to above data, for attack free phase acceptable imperceptibility and high robustness achieved. Good value of PSNR shows good quality of watermarked image so that it is hard to recognize base image from watermarked one. For extracted watermark, significant values of NC and BER indicates accuracy of our technique in extracting watermark. Table 1 shows gained results while Fig. 7 indicates watermarked image and extracted watermark for attack free phase.

Table 1 Experimental values of PSNR, BER and NC for watermarked imag in condition of using WM1 and WM2
Fig 7
figure 7

Watermarked images of (a) “Lena”, (b) “Boat”, (c) “Mandrill”, (d) “Barbara”, (e) “Cameraman”, (f) “Pepper”, (g) “Pirate”, (h) “Jet Plane” and (i) “Lake” with extracted watermarks (WM1 and WM2) in attack free phase

For the phase of attack, NC and BER for each attack extracted watermark were computed and results shown in Tables 2, 3, and 4. The description of each attack used in firefly implementation and evaluating current technique are explained as:

Table 2 Experimental values of NC and BER of proposed method for extracted watermarks from images of Lena, Boat, Mandrill
Table 3 Experimental values of NC and BER of proposed method for extracted watermarks from images of Cameraman, Peppers, Pirate
Table 4 Experimental values of NC and BER of proposed method for extracted watermarks from images of Barbara, Jet Plane, Lake
  • Filtering Attack: Mean filter and Gaussian filter with mask size of 3 × 3 along with Unsharp Masking as sharpening filter applied to watermarked image and BER and NC of extracted watermark used in objective function of FA.

  • Noise Attack: Salt and Pepper noise with density of 0.01, Gaussian noise and Speckle noise with variance of 0.05 added to image. All results with combination of other densities and variances depicted in Tables 2, 3, and 4.

  • Cropping Attack: Watermarked image cropped by center like a square with size of 100 × 100 and filling it by zero. Achieved results with various positions shown in Tables 2, 3, and 4.

  • JPEG Compression: Watermarked image compressed with quality factor of 70 % for FA phase and other QF hired to evaluate proposed method. All outcomes brought in Tables 2, 3, and 4.

There are some other attacks like median filter, scaling, rotation and Gamma correction applied to watermarked image for boosting evaluation and results shown in Tables 2, 3, and 4.

4.1.1 Study of operational time

For studying operational status of our scheme, we concentrate on that part which has main share in whole time which is optimization code, so proposed scheme was checked in two phase: First phase include Firefly optimization algorithm to get ignoring factor and second phase checked that without optimization by applying random value as ignoring factor. Comparison of operational time, Average BER of attacks and BER for attack free phase showed in Figs. 8, 9 and 10.

Fig 8
figure 8

Operational time graph showing two phase: optimization based and without optimization

Fig 9
figure 9

BER graph showing average BER of attacks in two phase: optimization based and without optimization

Fig 10
figure 10

Graph showing BER of attack free phase in two scheme: optimization based and without optimization

4.1.2 Performance evaluation of proposed technique on a dataset

As an extra study, behavior of our technique investigated on 30 images of Pasadena-Houses-2000 dataset [15]. To have fair comparison, all images resized to 512 × 512 and grayscale mode. Experimental results gathered in Table 5 and average values of BER for each attack on all sample images depicted in Figs. 11 and 12.

Table 5 PSNR of watermarked image via NC and BER values of extracted watermark in attack free phase with average and standard deviation of NC and BER values of extracted watermark in attacked phase on 30 images of Pasadena-Houses-2000 dataset
Fig 11
figure 11

Graph showing average BER/NC of extracted watermarks on each attack

Fig 12
figure 12

Convergence behavior graph of fireflies in 50 generation

4.2 Comparison and discussion

In case of investigating operational time, according to our experiment between two schemes of using Firefly optimization algorithm and using random value instead of that, FF shows long runtime (More than 2500 s) for achieving ignoring factor rather than using random number but in case of investigating extracted watermark, significant values of BER and NC indicates undeniable robustness of first scheme. As shown in Fig. 9, upper bound of average BER in optimized phase is less than 0.05 that shows good robustness rather than second scheme with lower bound of 0.19. Interesting point is zero values of BER for optimized scheme in attack free phase against unacceptable values (More than 0.12 except for Lena which is 0.06) of that for second scheme which shows efficiency of firefly algorithm in proposed scheme. So it seems to be worthwhile to spend that much time to achieve this amount of robustness.

Due to main results, our technique shows good robustness about different kinds of additive noise like Salt & Pepper, Poison, Speckle, Gaussian noise with different variances. Low value of BER and on the other side high value of NC shows superiority of our technique. In case of geometric attacks like scaling and rotation inconsistent results achieved. For scaling in both side, down scaling and upper scaling, significant values for BER and NC achieved but rotation demonstrate as a weak point. Main reason for that clearly goes back to block indexes passed from embedding phase. After rotation, position of each block will be changed. So retrieved blocks differs from those of embedding phase. For filtering attacks like Gaussian filter, Average filter, Median filter, Sharpening and wiener filter considerable values obtained. Our scheme was checked with some other kind of attacks like JPEG compression, Gama correction, histogram equalization that led to similar results. On evaluating imperceptibility values bounded between 35 and 39 dB which shows slight distortion in watermarked image but high values of VIF range (more than 0.97) represents good visibility of watermarked image. Visibility of proposed scheme checked on both primary and dataset images with WM2 watermark shown in Fig. 13. In following, an extra study on 30 images done that shows similar results to primary ones, Achieved PSNR of watermarked image and BER, NC values of extracted watermark in attack free phase are in same range of primary results which shows superiority of our scheme. According to Table 5 and Fig. 11, average value of NC and BER of each sample image shows robustness of technique against various kinds of attacks.

Fig 13
figure 13

Visibility status of primary images and dataset images based on VIF

In following, our method compared with methods based on discrete wavelet transform and singular value decomposition [20], wavelet coefficient quantization based watermarking [22], dirty paper trellis codes [26], SWT-SVD based watermarking scheme [31] and non-blind watermarking method based on Integer Wavelet Transform [14]. Considering to provide comprehensive comparison to methods, compared papers implemented with grayscale sample image of Lena (Size is [512,512]) on the same platform as ours. As a point, intensity of sample image normalized before operation. Lai’s method [20], concentrate on combination DWT and SVD. We used strength parameter value of 0.01 as scaling factor in implementation. On the other side, Lin’s method [22], focus on difference of wavelet coefficient quantization. We used blocks with size of 7 as mentioned in paper with thresholds of T = 0.04 and y = 0.02. For implementing Miller’s method [26], which is based on dirty paper trellis codes, we used trellis with 64 state and 64 arc per state as mentioned in paper. In other work, Soniwal’s method [31] concentrates on combination of Stationary Wavelet Transform (SWT) with Singular Value Decomposition (SVD). We used k = 0.03 as scaling factor along with mentioned parameters in paper. The last paper, we compare with is Hajiramezan’s non-blind watermarking scheme [14] which focused on Integer Wavelet Transform (IWT) and we implemented that by applying M = 0.1 as strength factor. Details of comparison gathered in Table 6. As stated our method shows better robustness against various attacks rather than other methods except in rotation which discussed before. In following, quality of watermarked image and payload of each technique gathered in Table 7. Situation of these two items shows acceptable quality of proposed scheme. Notice that bold values shows progress in robustness of our technique.

Table 6 Comparison of BER values for extracted watermark with method [14, 20, 22, 26, 31] against various attacks on sample image of “Lena”
Table 7 Comparison of PSNR and Payload of proposed method with [14, 20, 22, 26, 31] on sample image of “Lena”

5 Conclusion

In this paper, a novel digital image watermarking technique using combination of Lifting Wavelet Transform and Firefly Algorithm presented. According to standard deviation, non-overlapping blocks sorted and optimization algorithm used for specifying best block for starting embedding process. Our experimental results compared with known other schemes for various image processing attacks like adding noise, smooth filtering, sharpening, gamma correction, cropping and scaling depicted high robustness and acceptable imperceptibility.

Our future work will concentrate on using other kind of optimization algorithm and transform domain. Also working on such a features that is more resistance of geometrical transform to use in embedding process.