1 Introduction

Multimedia has evolved into the information storage technology of the modern world. Image has features such as intuitive images and rich content as a significant way of transmitting a piece of information. Due to the growing importance of scientific visualization and the requirement for adequate information receiving and transferring, image processing techniques have garnered a lot of attention and scope [12, 29]. However, security issues are becoming more prominent due to the image’s widespread use and distribution, which has raised serious concerns about copyright infringement, manipulation, data authentication, and integrity [22]. Digital watermarking [5, 26, 27, 37] is a well-known technique for protecting intellectual property rights and authenticating the validity of data by concealing secret information in digital products. To safeguard ownership and integrity, copyright violations can be avoided by obscuring information in the image via digital image watermarking. Digital watermarking consists of two processes: embedding and extraction, which are mutually exclusive but connected. Watermarking is differentiated into two categories based on the embedding domain: spatial domain and transform domain. As the spatial domain methods are straightforward, they are more vulnerable to attacks. Transform domain methods, on the other hand, are more resistant and durable to numerous attacks, but they are slightly more sophisticated [41]. The time-frequency domain aspect of the wavelet transform domain allows it to be utilized as a multi-resolution wavelet analysis approach [24]. The most extensively used transform domain techniques for developing robust watermarking algorithms are the discrete Fourier transform (DFT), DWT, discrete cosine transform (DCT), integer wavelet transform (IWT), and redundant wavelet transform (RWT). Attacks on watermarked images wipe off both the host image and the applied watermark. As a result, the watermark becomes distorted, and the image’s quality suffers. Wavelet transforms frequently used with different decompositions to improve resilience. Because of its geometric feature and strong stability even at minor disturbances, SVD is commonly used with transform domain algorithms [13].

All the above-discussed techniques are fundamental, and they suffer heavily when attacks are complicated. Therefore, to enhance the robustness of existing watermarking methods against various attacks, especially noise, filtering, and scaling, a new watermarking scheme (WMS) using an optimization-based image reconstruction technique is proposed in this paper. The proposed image reconstruction technique allows our watermarking scheme to efficiently produce the attack-free WI from the extracted attacked WI as compared to other competing methods. Moreover, it makes the WMS more robust to noise, filtering and scaling.

The rest of this paper is arranged as follows: Section 2- literature review; Section 3- the proposed watermarking scheme; Section 4- experimental results; and Section 5- conclusions.

2 Related works

As the focus of this paper is to develop a robust WMS using image reconstruction (IR) techniques, hence in this section, the works related to both WMS and IR are discussed one by one.

2.1 Image watermarking methods

Ebrahimnejad et al. [7] have presented a window-based approach for removing high-density salt-and-pepper noise from brain Magnetic Resonance Imaging (MRI) pictures for optimal Region of Interest (ROI) recognition. In this method, an adaptive n × n window in the neighborhood of each pixel of the noisy input image is considered. This window’s pixels are weighted according to their distance from the target pixel if they are not noisy, and the weighted sum of the nearby pixels is averaged. The result is then used to replace the noisy pixel. Before and after the addition of noise, the ROI obtained is the same. This approach produces an intermediate image with varied noise densities.

Sakthivel et al. [34] proposed a large-scale integration (VLSI) image watermarking system with increased robustness and performance. The use of integer DCT reduces computing complexity, while the development of a four-stage pipeline architecture improves throughput. Integrating the torus automorphism procedure against invertibility threats improves security. Using a mean adaptive threshold value, secret watermark bits are injected into the DCT low-frequency coefficient [15, 16]. The least damage to the host image quality enhances the suggested algorithm’s robustness. The PSNR reported of the suggested method was greater than 50db. The major goal of Zermi et al. [40] is to effectively integrate the watermark into the host medical image with minimum possible distortion so that the information content of the image is normally retained. The host image is transformed using DWT, and transformed using SVD. Authors claim that the method assures integrity, the confidentiality of patient data during transmission, and robustness against a variety of traditional threats.

Using matrix decomposition and the Gyrator transform created in the invariant integer wavelet (IIW) domain, Zhang et al. [42] suggested a watermarking algorithm. The authors proposed the redistributed IIW transform, which is reversible and can convert an image into an invariant domain. A new singular value determination approach is also presented in this study. While compared to SVD, it has lesser time complexity. They further, proposed a new dual encryption system [23]. Hu and Xiang [11] proposed a lossless robust watermarking method using polar harmonic transform. This method is capable of retrieving the original image losslessly if no attacks happen. The WI can be immediately extracted for copyright authentication in the event of an assault.

The majority of extant color image watermarking systems [9] is designed to mark each color channel separately, ignoring color channel correlation and synchronous watermark embedding. In this direction, Chen et al. [4] presented a resilient blind watermarking system for color image copyright protection using quaternion QR-decomposition (QQRD) with an algebraic structure-preserving strategy to reduce computing cost. In the embedding phase, QQRD is used for the entirety of non-overlapping 4 × 4 watermark fragments, after which three strong coefficient pairs are calculated using the NC method and are changed to embed color watermarks within factorized matrices. This eliminates layered processing, which leads to an exaggerated sensitivity to attacks and less correlation, which leads to excessive coefficient value alteration.

Using the Paillier cryptosystem (PC), Liang et al. [17] presented a resilient and reversible WM method for encrypted images. The plain-text image is divided into 8 × 8 non-overlapping blocks, and the PC is used to encrypt [25] each block. To begin, a data hider can use the modular multiplicative inverse (MMI) method to determine the statistical values of encrypted blocks while searching for a mapping table. The shifted histogram is produced from both the encrypted and decrypted images on the receiver side [23]. In addition, the shifted histogram is used to extract the embedded watermark. The encrypted image is restored via inverse histogram shifting procedures. The original image is then restored via a decryption procedure.

To achieve the correct balance between imperceptibility, robustness, and payload, Wang et al. [39] used statistical model-based multiplicative watermarking with local Radial Harmonic Fourier Moments (RHFMs). The CI is spitted into non-overlapping blocks during the embedding process, and the local RHFMs of image blocks are computed before the watermark signal is inserted. Robust local RHFMs magnitudes are initially modeled using the Beta exponential distribution in the extraction phase. The suggested technique is more imperceptible to local geometrical attacks and conventional image processing attacks, and it is more resistant to them. However, there are certain flaws in this method, such as the extraction accuracy not being as good as it should be in strong signal processing.

Based on the Walsh Hadamard Transform (WHT), Prabha and Sam [28] proposed a blind color image WMS. The method splits an image into four 4 × 4 non-overlapping blocks, which are then processed with WHT. This technique embeds the color image watermark in the third and fourth-row WHT coefficients since a little alteration in those rows may not have a significant impact on the image’s visual quality. The difference between the watermarked image’s third and fourth-row WHT coefficients is then calculated. The obtained difference value is used to extract the watermark information. The suggested system surpasses existing watermarking methods in terms of embedding capacity, PSNR, Weighted PSNR, NC, and SSIM. This strategy is more resistant to a variety of manipulations and lossy attacks.

A QR-based digital watermarking approach that can incorporate color images is proposed by Hsu, and Tu [10]. Each bit of the strong watermark is duplicated four times and hidden in several image blocks. The sinusoidal function is used to create the embedding rule, and the wavelength of the sinusoidal function determines the trade-off between imperceptibility and resilience.

Mohammed et al. [21] proposed an approach for an effective embedding technique to create a semi-blind WMS based on the transform domain DWT-SVD. The WI is first transformed using the DWT technique for one pass during the embedding procedure. The SVD technique is then used to alter the LL-band values. For inserting into the CIs, a diagonal matrix with S-values is prepared. DWT, on the other hand, transforms the CIs for two degrees of deconstruction. The watermark bits are embedded into the HL2 and HH2 bands of the CI using the zigzag approach.

In [13], the lifting wavelet transform (LWT) based scheme with the support vector machine (SVM) technique is presented by Islam et al. After applying a 3-level LWT decomposition on the host image, several different sub-bands are selected for the embedding process. The process of training and testing using SVM is used as a detector of the watermark bit during extraction. This scheme provides better robustness against a variety of attacks in addition to noise attacks. Ansari et al. [1] proposed an integer wavelet transform (IWT) based method for protecting copyrighted material using SVD and Ant Bee Colony (ABC) algorithm. ABC algorithm helps to find optimized scaling factors to achieve high robustness, but it does not give good results against deep geometric attacks. On another side, Liu et al. [19] also proposed a similar technique in which HD and SVD-based optimized watermarking method has been proposed in the DWT domain. The Fruit Fly Optimization (FOA) algorithm is used to find the optimal scaling factor. The robustness of this algorithm against various types of attacks is good due to the optimal scaling factor, but increasing the robustness against rotation and crop attacks also needs attention. In [2], an intelligent watermarking method using SVD and HVS in the DWT domain is presented by Ahmadi et al. After applying the DWT, embedding regions are selected with the help of HVS to enhance the visual quality. In this method, the scaling factor is automatically chosen by using the PSO algorithm. By selecting the appropriate area, the robustness against various attacks is high, but still, the robustness against scaling and noise needs to be strengthened. Recently, a robust WMS is proposed by Salehnia et al. [35] with a combination of SVD and lifting wavelet transform along with the three Module Redundancy approach. Most recently, the JA-fi algorithm has been developed in [6] for getting better robustness against different attacks.

2.2 Image reconstruction methods

The study of different image reconstruction techniques is presented here. As in real-world scenarios, the captured images are often destroyed by various noises, blur, etc., and hence, image IR methods are developed to restore the lost information in the captured images [8, 36]. Initially, these methods focused on reconstructing only clean low-size images to generate corresponding higher-dimension images [20]. Thereafter, these techniques are explored by many authors to make them robust to different noises, blurs, etc. [18, 30, 32]. Most of them used the least square representation-based optimization approach [20] for generating high-resolution clean images from the captured low-resolution, noisy, and blurry captured images.

3 Motivation and contributions

As insight derived from the above discussion, the handling of different attacks, especially noise and down-scaling, is still challenging for the current watermarking schemes. Hence, this paper presents the new image-reconstruction-based watermarking schemes which provide better robustness against various attacks as compared to the different competitive methods. The major contributions of this work are as follows:

  • A new optimization-based IR technique is developed that succors the proposed WMS to generate the high-quality watermark image from the extracted attacked one.

  • The objective function developed for IR is optimized statistically to get the maximum benefit of the proposed IR technique.

  • IR technique is coupled with the extraction process to develop the robust WMS.

4 The proposed algorithm

In many circumstances, watermarks are degraded and become noisy due to channel noise and different kinds of image-processing attacks. To overcome this problem, a robust WMS using a DWT-HD-SVD and optimization-based IR technique is presented in this section. The proposed WMS is described in three parts, namely (i) the embedding process, (ii) the extraction process, and (iii) the proposed IR technique. All three sections are discussed briefly in the following subsections.

4.1 Embedding Process (EP)

The EP happens in the transform domain to achieve greater robustness against various attacks. In this work, a CI and WI of size N × N and M × M, respectively, are used as inputs. The process of embedding the watermark is shown in Fig. 1. There are three steps to hide a watermark in a CI. In the first step, a 1-level DWT is performed on the CI that divides it into four sub-bands LL, HL, LH, and HH of size \(\frac {N}{2}\times \frac {N}{2}\). In the next step, the LL sub-band is further decomposed by HD to extract the matrix H. Finally, SVD is performed to extract singular values on the matrix H and the WI. Thereafter, the embedded singular value is computed with the optimal scaling factor α. The detailed embedding steps are shown in Algorithm 1.

Algorithm 1
figure a

Embedding algorithm.

Fig. 1
figure 1

Illustration of an embedding process

4.2 Extraction process

The extraction process is the reverse of the embedding process. In the watermark extraction algorithm, a WI of size M × M is used as the input. The extraction process is based on DWT, HD, and SVD, which is similar to the embedding process. The procedure of the watermarking extraction is shown in Fig. 2. First, the watermarked image is decomposed into four non-overlapping sub-bands using 1-level DWT, then HD is performed on the LL sub-bands. The SVD is applied to the Hessenberg matrix H (which is the output of the previous step) to extract the singular value of H. By taking the singular value, \(HS_{w}^{ext}\) and the singular value of the CI, HSw, a reconstructed singular value \(S_{w}^{ext}\) is generated which is used in the reverse SVD to obtain the extracted watermark. The detailed extracting steps are shown in Algorithm 2.

Algorithm 2
figure b

Extraction algorithm.

Fig. 2
figure 2

Illustration of an extraction process

4.3 Image reconstruction (IR) technique

In this paper, an optimization-based IR technique is proposed to make the WI robust to various attacks (especially to different digital image processing noise, filtering, and scaling). The proposed IR technique helps in generating a high-quality (HQ) version of the extracted low-quality (LQ) attacked WI. Inspired by the advantages of patch-based IR [14, 31,32,33] over the other kinds of IR techniques, this paper employs the patch-based IR concept for the reconstruction of extracted LQ WI. In addition to the input image, the proposed technique also requires some database images of the same domain.

As the proposed IR is the patch-oriented approach, we first divide the input image (extracted attacked LQ WI) into small overlapping patches, which are processed in raster scan order. Then, each input patch is expressed as a weighted linear combination of same-positioned patches in database images. From this process, a vector of weights (or coefficients) is obtained. After this, the optimization approach is applied to optimize the weights. Further, the same weights are again associated with the same database patches with generating the HQ attack-free patch. All patches of the input image follow this process. And at last, all the HQ attack-free patches are merged to form a complete image. An average value is utilized for overlapping image portions during the merge operation. The overall working of the proposed IR technique is illustrated in Fig. 3.

Fig. 3
figure 3

Illustrates the working of the proposed IR technique. Here, each patch of the extracted attacked watermark image is represented as a weighted linear combination of some patches from database images of the same domain. The weight vector (ω) obtained from this representation is optimized statistically. After this, the optimized weights are applied to the same database patches to reconstruct the high-quality watermark patch, which is free from several artifacts. All reconstructed patches are merged to form the complete image

The reconstruction process discussed above is mathematically formulated as follows:Footnote 1

Table 1 Notations and abbreviations
$$ \begin{aligned} \omega^{\ast}(r,c) &= \mathop {\arg \min }\limits_{\omega(r,c)} \left\{ \left\Vert W^{NS}_{E}(r,c) - \sum\limits_{n=1}^{N} D_{n}(r,c) \omega_{n}(r,c)\right\Vert_{2}^{2} \right. \\ & \left\{ + \lambda \left\| M \odot \omega(r,c) \right\|_{2}^{2} \right\}, \qquad \text{s.t.} \sum\limits_{n=1}^{N} \omega_{n}(r,c) = 1, \end{aligned} $$
(1)

where \(W^{NS}_{E}\) is the noise-suppressed watermark calculated using Algorithm 3; Dn and ωn are the nth database image and its associated coefficient, respectively; λ is the tunable parameter that balances the contribution of both terms, and M is the diagonal matrix whose elements are calculated as follows:

$$ \small M_{n,n} = \left \| W^{NS}_{E}(r,c)- D_{n}(r,c)\right \|_{2}, \quad 1\leq n \leq N. $$
(2)

Equation (1) is the optimization (minimization) problem that needs to be minimized efficiently to generate optimal reconstruction coefficients. For this purpose, the (1) is re-written in matrix form as follows:

$$ \begin{aligned} \omega^{\ast}(r,c) &= \mathop {\arg \min }\limits_{\omega(r,c)} \left \{ \left\Vert W^{NS}_{E}(r,c) - D(r,c) \omega_{n}(r,c) \right\Vert_{2}^{2} \right. \\ &~~~~ \left. + \lambda \left \| M \odot \omega(r,c) \right \|_{2}^{2} \right \}, \end{aligned} $$
(3)

here, D is the matrix in which each column represents one database image.

Following [3], (3) can analytically be solved as follows:

$$ \omega^{\ast}(r,c) = \left (Q(r,c) + \lambda \omega^{2} \right ) \setminus \overrightarrow{N}. $$
(4)

In (4), \(\overrightarrow {N}\) is the N size column vector which holds value 1 and “∖” symbolize left matrix division operator; and term Q(r,c) express covariance matrix for \(W^{NS}_{E}(p,q)\). Where,

$$ Q (r,c) = A^{T}A. $$
(5)

In (5), A is calculated as follows:

$$ A = W^{NS}_{E}(r,c) ones(N,1)^{T} - D(r,c). $$
(6)

Further, the coefficients are re-scaled to satisfy the constraint \({\sum \limits _{n}^{N}} \omega _{n}(r,c) = 1\).

After optimization, the obtained reconstruction weights are again associated with the same set of database patches to generate an attack-free HQ output patch (WAF(r,c)). Mathematically, it is calculated as follows:

$$ W^{AF}(r,c) = \sum\limits_{n=1}^{N}D_{n}(r,c)\omega_{n}(r,c). $$
(7)

Finally, all reconstructed patches are merged to form the complete image, i.e., WAF. The above IR process in the form of pseudo-code is given in the Algorithm 4.

Algorithm 3
figure c

Calculation of noise suppressed watermark (\(W^{NS}_{E}\)).

Algorithm 4
figure d

Image reconstruction algorithm.

5 Experiments

5.1 Experimental setup and performance metrics

Several experiments and comparisons have been executed to investigate the proposed WMS’s effectiveness. The performance of the proposed watermarking scheme in terms of robustness and imperceptibility is evaluated based on five metrics, namely Normalized Cross-Correlation (NC), Bit Error Rate (BER), Normalized Absolute Error (NAE), Peak Signal to Noise Ratio (PSNR), and Structure Similarity Index (SSIM). In experiments, the most commonly used grayscale images, ‘Lena,’ ‘Man’, and ‘Sailboat’ of size 512 × 512 pixels, are picked as host images (or CI). A facial image of size 256 × 256 pixels are taken from the FEI [38] database as the WI. As the proposed IR technique also needs some images which should be of the same domain as the WI to generate the attack-free HQ watermark, therefore, the 360 images are randomly chosen from the FEI database.

As parameter tuning also plays a vital role in the performance of the proposed WMS, hence, the optimal settings of all parameters are derived experimentally in this paper. For the embedding and extraction process, the optimal value of scaling factor α is experimentally set to 0.01. Figure 4 presents the experimental results used for finding the optimal value of α. These results are computed on CI for different α values under no attack. It can be analyzed from these results that the PSNR value is more significant at 0.006, but the NC value is less at this point. However, the NC value at α = 0.013 is very good, but PSNR is average. Therefore, the value of α is set to 0.01 as it gives good PSNR and NC values which maintain a better trade-off between these performance metrics. Similarly, based on experiments, the value of τ and λ is set to 160 and 10, respectively. The PSNR and SSIM results, as shown in Figs. 5 and 6, are considered to find the optimal settings of τ and λ. These results are computed for WI under Gaussian noise = 0.001. Patch size and overlap between patches are taken as 16 × 16, and 12 pixels, respectively.

Fig. 4
figure 4

The PSNR and NC values of the proposed WMS for varying scale factor α

Fig. 5
figure 5

The impact of parameter τ on the performance (PSNR and SSIM) of the proposed WMS

Fig. 6
figure 6

The impact of parameter λ on the performance (PSNR and SSIM) of the proposed WMS

5.2 Performance analysis

To validate the effectiveness of the proposed algorithm, its performance is compared with several existing watermarking algorithms including Ansari et al. [1], Islam et al. [13], Ahmadi et al. [2], Zhang et al. [42], Liu et al. [19], Salehnia et al. [35] and Jyothsna et al. [6]. Detailed analysis is given below:

5.2.1 Robustness analysis

Normalized cross-correlation (NC) is a metric to measure the robustness of the algorithm. It compares the similarity between original WI and extracted WI. It is computed as follows:

$$ NC = \frac{{\sum}_{i=1}^{I}{\sum}_{j=1}^{J} W(i,j)W_{E}(i,j)}{\sqrt{{\sum}_{i=1}^{I}{\sum}_{j=1}^{J} W(i,j)}\sqrt{{\sum}_{i=1}^{I}{\sum}_{j=1}^{J} W_{E}(i,j)}}, $$
(8)

where, W and WE represent original watermark and extracted watermark, respectively; I × J is the dimension of watermarks; and (i,j) denotes pixel in the image.

The range of NC is [-1, + 1], where, value -1 represents negative similarity and + 1 indicates that the extracted watermark and original watermark are the same. A value of NC close to or greater than 0.75 is considered acceptable. We evaluated the robustness of the proposed scheme by analyzing the NC value between the original watermark and the extracted watermark without attack, which is near 1. In experiments, the watermarked image becomes distorted under a variety of geometric and image processing attacks such as filtering, noise, rotation, cropping, scaling, JPEG-Compression, and histogram equalization. Table 2 shows the experimental results in terms of NC under different attacks with different degrees. These results show that the robustness of the watermark before applying the IR technique is poor under many attacks but after applying the proposed IR technique the image quality gets enhanced and the NC value become excellent. We can see in the table that the NC values of the Gaussian, Average, and Median filters are above 0.99 at window size 3 × 3. Similarly, the proposed scheme has strong robustness at different densities of noise as well as at different degrees of JPEG-Compression. Besides rotation at 15 degrees, all attacks have an NC value greater than 0.94.

Table 2 NC values of the proposed scheme with IR and without IR under various attacks

Further, for performing the comparative analysis, NC values of the proposed scheme and several competitive methods including [1, 2, 13], and [19] under various types of benchmark attacks for different CIs are illustrated in Tables 34 and 5. Using the same CI, WI, and same scaling factor the proposed scheme showed stronger robustness than [19]. We can see in Table 3, especially, against a scaling coefficient 0.125, salt & pepper noise, and speckle noise with an intensity of 0.03 the proposed scheme showed great results compared to this work. Another comparison with [13] which carried the same CI but with the binary logo as a watermark for the embedding. The proposed scheme outperformed the method [13] under filters (median and average) and Gaussian noise at 0.005 variance. Moreover, [1, 2] performed satisfactorily under various types of attacks but not better than the proposed scheme. Using the JA-fi algorithm, [6] generates an optimized scaling factor that performs well against noise but not better than the proposed algorithm. Additionally [6] exhibits limited robustness against rotating and scaling

Table 3 Comparison of the proposed scheme with different existing methods for NC values on host image ‘Lena’ under different attacks
Table 4 Comparison of the proposed scheme with different existing methods for NC values on host image ‘Man’ under different attacks
Table 5 Comparison of the proposed scheme with different existing methods for NC values on host image ‘Sailboat’ under different attacks

In addition, BER and NAE are other parameters used to measure the robustness of an algorithm. BER is the error rate between the original watermark and the extracted watermark. The error rate can be defined as the ratio of the number of watermark bits that are manipulated during watermarking to the total number of bits of the watermark. The range value in BER is between 0 and 1. If the BER value is close to 0 then the error rate will be very low hence the algorithm’s robustness will be high. Calculation of BER is as follows:

$$ BER(W,W_{E}) = \frac{\text{Number of erroneous bits}}{\text{Total number of bits} } \times 100 $$
(9)

Another parameter to measure the robustness of algorithm is normalised absolute error (NAE). The algorithm with a higher value of NAE is of poor quality, whereas the algorithm with a lower value is of great quality. Calculation of NAE is as follows:

$$ NAE = \frac{{\sum}_{i=1}^{I}{\sum}_{j=1}^{J}|W(i,j)-W_{E}(i,j)|}{{\sum}_{i=1}^{I}{\sum}_{j=1}^{J}|W(i,j)|} $$
(10)

Tables 6 and 7 illustrate that the proposed WMS performed better in comparison of [19] and one can conclude that the scheme proposed in this paper has outperformed in terms of robustness against geometric and image processing attacks on a various types of host images.

Table 6 Performance comparison on BER metric
Table 7 Performance comparison on NAE metric

5.2.2 Imperceptibility analysis

Imperceptibility is a performance metric that assesses how closely the WI and the CI are the same. It is measured using two parameters: PSNR and SSIM. PSNR is a popular metric that determines how close a WI is to CI and is derived using Mean Square Error (MSE). MSE is used to find out how much of a difference is between CI and WI. A lower MSE value indicates that the CI and WI are more similar, implying that the images have a high PSNR value. It is formulated as:

$$ MSE = \frac{1}{I{\ast}J}\sum\limits_{i=1}^{I}\sum\limits_{j=1}^{J}[W(i,j)-W_{E}(i,j)]^{2}. $$
(11)
$$ PSNR = 10~{\ast}~\log \frac{255^{2}}{MSE}. $$
(12)

The PSNR is primarily concerned with the transparency of the image but does not take into account the visual quality. The visual quality of a watermarked image is measured by SSIM. It is another metric of imperceptibility that calculates the structural similarity of a WI. Its value varies between [0,1] and if a value is close to 1 it means that it is almost the same as the original image. Following is the formula for SSIM calculation

$$ SSIM = \frac{(2\mu_{i}\mu_{j})+c_{1}(2\sigma_{i}j)+c_{2}}{({\mu_{i}}^{2}{\mu_{j}}^{2}+c_{1})({\sigma_{i}}^{2}{\sigma_{j}}^{2}+c_{2})}. $$
(13)

As the proposed WMS mainly focused on robustness and image quality, therefore, in this work, the PSNR and SSIM are computed between the original WI and extracted WI rather than CI and WI. From Tables 8 and 9, it can be analyzed that the proposed WMS performs better than [19] for different images under various.

Table 8 Performance comparison on PSNR(dB) metric
Table 9 Performance comparison on SSIM metric

5.2.3 Visual analysis

In the visual perceptibly of the watermark or any change on the watermarked image due to the watermarking process is tested by human eyes. The visual analysis results are presented in Fig. 7. Three random cover images in Fig. 7(a), (d) and (g) are chosen and three different watermark images Fig. 7(b), (e) and (h) are embedded on them respectively. The resulted watermarked images are presented in Fig. 7(c), (f) and (i) in which the there are no visual trace of watermarks. Hence, the proposed scheme is capable to sustain the visual quality of the watermarked images.

Fig. 7
figure 7

Visual analysis of test images

6 Conclusions

A new robust image watermarking scheme based on the transform domain DWT-HD-SVD using an image reconstruction (IR) technique is presented in this paper for producing a high-quality watermark image (WI) from the extracted attacked one. Simulation results computed in terms of PSNR, NC, BER, SSIM, and NAE metrics confirm that the proposed watermarking scheme has stronger robustness than the other compared algorithms. These results also illustrate that the proposed scheme shows remarkable robustness against various image processing and geometric attacks especially noise, filtering, histogram equalization, and scaling.