1 Introduction

As a result of technological development and the Internet, it is a fact that the digital media industry has been going through a prosperous up-growth in recent decades. Originators rights and publishers reputation are troubled due to various infringement practices; particularly, media manipulations have occurred. Accordingly, verifying the authenticity of digital media has become a significant challenge. Digital watermarking is a technology that can be used to provide security in a wide variety of scenarios where digital content protection is required. Digital watermarking has been used in content authentication, owner identification, transaction tracking, copy control, among other applications [10]. Therefore, researchers focus on developing digital watermarking systems as a complement to cryptography [9] for the protection of digital content including images, audio, video, etc [24].

Image watermarking is a suitable alternative for copyright protection and authentication of images in famous communication environments such as the Internet, which is sensitive to illicit practices. Image watermarking is the process of imperceptibly embedding a piece of digital information known as watermark into a host image, also known as cover image. A watermark is a binary code that contains useful information about the image in which it is being embedded. After the embedding process, a watermarked image is produced, which can be stored or transmitted. Then, when it is required, the watermark is extracted and used in the specific application.

There are three essential features to be considered when new watermarking schemes are designed: imperceptibility, embedding capacity, and robustness.

  • Imperceptibility refers to the invisibility of a watermark. As the host image is modified to embed a watermark, the produced watermarked image will contain distortion. Therefore, host and watermarked images must be very similar in such a way that human eyes can perceive no visible changes. In other words, the watermarked image should not attract the attention of malicious people.

  • Embedding capacity is the maximum amount of information bits that can be embedded into the host image.

  • Robustness is the resistance level to attacks, i.e., the capacity of the method to extract the embedded watermark even if watermarked image went through attacks.

The primary constraint involved in digital watermarking is maintaining a trade-off among watermark robustness and embedding capacity while keeping the visual perception of the original image intact. However, watermarking scheme quality largely depends upon the choice of the watermark structure and insertion strategy.

Digital watermarking is usually classified according to robustness feature as fragile, semi-fragile, and robust [42]. In fragile schemes, watermarks are designed to be distorted even if watermarked image undergoes a minimum modification, i.e., fragile watermarks are vulnerable to any kind of manipulation. Therefore, fragile watermarks are primarily used to verify the integrity or authenticity of images. Semi-fragile watermarks tolerate a certain set of manipulations and are distorted with non-allowable attacks. Semi-fragile watermarks can be detected in scenarios where content preserving operations or incidental attacks occur; meanwhile, they are distorted with malicious attacks. Finally, robust watermarks are very difficult to remove from their corresponding watermarked images. Therefore, they are designed to survive against aggressive intentional attacks, making them suitable for copyright protection.

Watermarks can be embedded into the host image using two well-defined domains: spatial domain and frequency domain [37]. In spatial domain methods, watermarks are embedded by directly altering the pixel values of the host image, typically with least significant bit (LSB) replacements. This is much simple, straightforward, and less complex; however, it is not robust against attacks. In order to provide robustness, frequency domain watermarking techniques are used. In frequency domain methods, a transformed image is obtained by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Integer Wavelet Transform (IWT), Singular Value Decomposition (SVD), etc. Therefore, watermarks are embedded by modulating the coefficients of the corresponding transform. As a result, the watermarks are irregularly distributed over the whole image; therefore, it is difficult for the attackers to read or decode them.

Multiple watermarking methods, in which more than one watermark is embedded into the host image, arose to improve the performance of traditional watermarking methods. The improvement is obtained because watermarks can be designed to face different security problems simultaneously. In this paper, a dual watermarking scheme for multipurpose applications is introduced. The proposed scheme can provide image authentication and copyright protection at the same time. A robust watermark is embedded into the highest frequency sub-band of second-level DWT transform to provide copyright protection. Additionally, a fragile watermark is embedded into the high-frequency sub-bands to provide image authentication. Visual cryptography is applied over a secret image to generate a share, which is encoded as a robust watermark. The scheme security is improved by performing a host image mapping using a chaotic transformation. The proposed scheme effectively inserts information and takes advantage of frequency domain characteristics to obtain optimal performance. Experimental results show that the proposed dual watermarking scheme provides a watermark robustness and authentication accuracy improvement compared to other relevant schemes while obtaining competitive results regarding watermark imperceptibility.

The rest of this paper is organized as follows. Section 2 presents a review of relevant state-of-the-art watermarking methods. Section 3 provides a brief explanation of two techniques which are used in the proposed scheme: visual cryptography and Arnold transformation. Section 4 details the proposed scheme, including embedding and extraction processes. Obtained results and a comparison with relevant watermarking schemes are reported and discussed in Section 5. Finally, conclusions are drawn in Section 6.

2 Related work

Several image watermarking methods have been proposed in the literature, including robust and fragile approaches [1, 51].

Fragile image watermarking is an optimal solution to deal with image authentication as well as tampering localization issues. In fragile watermarking approaches, watermarks must be sensitive to any modification; then, watermarks are designed to be distorted when watermarked images undergo even slight modifications. Fragile watermarking schemes often embed authentication codes into the spatial domain [28, 45] or the high-frequency coefficients of some transformation [43, 44].

Conversely, robust watermarking schemes are typically employed to provide copyright protection since embedded watermarks are able to survive even if watermarked images undergo aggressive malicious attacks. Usually, robust watermarks are created using an image, logo, or copyright information related to the host image owner. The extracted watermark information can be employed in case of a dispute.

Some robust schemes incorporate the watermarks into the spatial domain [5, 40, 53, 59]; however, a limitation of watermarking methods based on spatial domain is that these methods do not provide enough robustness since watermarks are commonly embedded by directly altering the least significant bits of image pixels. Then, most robust watermarking methods operate in the frequency domain, where watermarks are embedded by manipulating coefficients obtained with some transformation such as DCT [12, 21, 22], DWT [29, 47, 60], etc. Another schemes modify some singular values provided by the SVD transformation [8, 52]. Recently, geometrically invariant methods have been proposed using Legendre-Fourier moments [17, 19, 20] to provide robustness against geometric attacks such as rotation, scaling and translation, offering superior performance when compared with previous methods. Frequency domain is preferred to provide robustness because watermarks are irregularly spread over the whole image when the corresponding inverse transformation is applied, making them difficult to remove. In order to improve watermark imperceptibility while maintaining robustness, some hybrid domain watermarking methods were proposed [3, 7, 14, 23, 25, 32, 34, 36, 46, 49]. Hybrid methods arose as an extension of frequency domain methods, then, two or more transformations are used. Commonly, a wavelet transform is first applied to the host image, then a frequency sub-band is selected and transformed using DCT. Finally, SVD transformation is applied to the DCT coefficients and some singular values are modified to embed the watermark bits [14, 49].

Recent state-of-the-art works [2, 11, 15, 16, 18, 27, 30, 31, 33, 38, 50, 56] indicate that watermarking methods’ performance can be improved by embedding multiple watermarks. As each embedded watermark may be designed to address a different problem, these schemes are called dual, multiple or multipurpose watermarking schemes. The first multipurpose watermarking scheme was introduced in [31]. The authors proposed a dual watermarking scheme in which robust and fragile watermarks are simultaneously embedded by quantizing some DWT coefficients. The scheme can perform copyright protection and basic image authentication at the same time. In [27], authors introduced a hybrid dual watermarking scheme that operates in the spatial and DCT domains. This scheme incorporates a visible watermark into the spatial domain and an invisible watermark into the frequency domain for copyright protection. A multiple robust watermarking method for color images is proposed in [33]. The authors embed robust watermarks by exploiting RGB and YCbCr color spaces, which improve robustness in the spatial domain. In [18] a multiple zero-watermarking method for color medical images is proposed. Gegenbauer moments of fractional orders are used to extract geometrically invariant features of medical images, enhancing watermark robustness against standard and geometric attacks. A zero-watermarking based method for copyright protection of color images is proposed in [56]. Three watermarks are created by an accurate selection of coefficients of decimal-order polar harmonic transforms, improving watermark robustness. The scheme security is enhanced by scrambling the watermarks using a chaotic system. In order to improve imperceptibility, a hybrid scheme based on DWT-DCT-SVD transformations was proposed in [50]. This scheme embeds two robust watermarks created with an image and textual information to provide copyright protection. In [11], two robust watermarks are embedded into the hybrid domain DWT-SVD. A genetic algorithm is used to select embedding locations, which benefits the scheme security for copyright protection. The schemes proposed in [16, 38] provide image authentication with tampering localization as well as reconstruction of tampered regions by incorporating authentication codes and recovery information as watermarks. In [15], two fragile watermarks, i.e., diffusion watermark and authentication watermark, are employed to provide high sensitivity against tampering manipulations and enhance the scheme security. Recently, a blind dual watermarking scheme for color image authentication and copyright protection was proposed in [30]. Two color spaces are employed to embed the watermarks. A robust watermark is embedded into the DWT transformation of YCbCr color space and a fragile watermark is embedded by replacing the LSBs of RGB color space.

Frequency domain offers versatility to incorporate whatever the type of watermark is. In this paper, the DWT frequency domain is exploited to achieve two applications: authentication (to detect and localize tampering on watermarked images) and copyright protection (to determine image owner). The proposed scheme merges and takes advantage of two state-of-the-art methods. A robust watermark is embedded into the quantized low-frequency coefficients and replaced into the highest sub-band of the DWT transform at the second resolution level, as it is exposed in [30]. Simultaneously, a fragile watermark is embedded into high-frequency DWT coefficients at the second resolution level using the strategy proposed in [43]. The security of the proposed scheme is enhanced by pre-processing the watermark and the host image, as explained in next section.

3 Preliminaries

The security of the proposed scheme relies on the use of secret keys and two techniques, i.e., visual cryptography and Arnold’s cat map transformation. Visual cryptography is used to obtain a share, which is embedded as a robust watermark; meanwhile, Arnold’s cat map is applied to the cover image to improve the security of the watermark embedding phase. These techniques are briefly explained next.

3.1 Visual cryptography

Visual cryptography theory was first introduced in [39]. The authors proposed a visual version of secret sharing in which an image is broken into n structured images known as shares. The obtained shares do not show any visual information about the input image. The image content can only be revealed by stacking k or more than k shares, where (kn). Any k − 1 shares combination will not provide information about the target image. The (k,n) visual secret sharing (VSS) scheme can be adapted and implemented to be used in a wide variety of application domains where security is required [57].

Some digital right management issues can be addressed by combining digital watermarking with visual cryptography techniques since a secret image can be used to get two shares using VSS. One of the obtained shares can be embedded as a watermark in the host image. Finally, when required, the share can be extracted and used to recover the secret image.

In this work, a (k = 2,n = 2) VSS scheme is used to generate two shares. Traditional (2,2) VSS scheme takes a binary image of size M × N and splits it into two shares, each one of size (2M × 2N). To perform this, image pixels are transformed into (2 × 2) sized blocks, i.e., each block contains four binary values. Thus, every pixel in the original image is encoded to produce two blocks. After all image pixels are encoded, the first set of blocks is used to create one share, and the remaining blocks are used to create an additional share. Original secret pixels can be recovered by overlapping the two corresponding blocks. If the compared blocks are similar, the decoded secret pixel is white; if the blocks are complementary, the decoded secret pixel is black.

To maintain a balance among watermarking properties, a special (2,2) VSS is used. The (2,2)-VCRG (visual cryptograms of random grids) proposed in [48] is employed to generate two shares. This technique is used because the obtained shares are of the same size as the input image, in contrast with traditional VSS, where the shares duplicate the input image size. The encoding process is performed with the help of Table 1. Every input pixel p is randomly encoded into two pixels r1 and r2. First, a binary value for r1 is randomly obtained. The probability of r1 = 0 is \(\frac {1}{2}\). Next, a binary value is set to r2 according to the input pixel p. If p is a white pixel (1), then r2 = r1. Nevertheless, if p is a black pixel (0), then r2 = r~1, where r~1 is the complement of r1. After all image pixels are encoded, two shares are obtained. The image content can be revealed by applying the decoding operation r1r2 from Table 1. An example of (2,2)-VCRG scheme is shown in Fig. 1, where Fig. 1a shows the input secret image, Fig. 1b and 1c are the obtained shares and Fig. 1d shows the decoded image, which reveals secret image content.

Table 1 Encoding / decoding operations of (2, 2)-VCRG scheme
Fig. 1
figure 1

Visual cryptography example using (2,2)-VCRG scheme

3.2 Arnold’s cat map

To enhance the scheme security, the host image pixels are scramble using a chaotic transformation. Chaos theory was first introduced to the watermarking field in [54]. The authors proposed a watermarking scheme in which a chaotic system Toral Automorphis is used.

Arnold’s cat map theory is a practical image transformation technique that reorders image pixels based on a chaotic system. It was introduced in [4]. Arnold’s cat map theory shows that image pixels can be apparently randomly organized, and after a number of enough iterations original image is returned, see Fig. 2.

Fig. 2
figure 2

Arnold transformation example over the Airplane image

The chaotic function is iteratively applied over the input image to relocate its pixels. Let T be the period of the function, where T depends on the image size [26]. When the chaotic function is applied to the image by T iterations, the original image is obtained, i.e., pixels recover their original positions.

From the above, if an image pixel has initial coordinates (x,y) into an image of size M × M [6], the next coordinates \((x^{\prime }, y^{\prime })\) are computed by the chaotic function using (1).

$$ \begin{bmatrix} x^{\prime} \\ y^{\prime} \end{bmatrix} = \begin{bmatrix} 1 & 1 \\ 1 & 2 \end{bmatrix} \cdot \begin{bmatrix} x \\ y \end{bmatrix} \text{mod} M $$
(1)

Chaotic transformations can be used to break local spatial similarity of images and obtain a larger number of significant coefficients when moving to the frequency domain (e.g., DCT, DWT coefficients), in contrast with those obtained when original images are transformed.

4 Proposed scheme

This section explains the proposed watermarking scheme in detail. The steps for dual watermark embedding, extraction and authentication phases are explained in Sections 4.14.2 and 4.3, respectively.

4.1 Embedding process

Figure 3 summarizes the principal stages of our watermark embedding process, where two main phases are well identified. On the one hand, robust watermark embedding uses the low-frequency DWT sub-band as a reference to embed the watermark into the highest frequency sub-band. On the other hand, a fragile watermark is incorporated into high-frequency DWT sub-bands. Watermarks are embedded based on two state-of-the-art works [30, 43] to take advantage of the frequency domain. A detailed explanation of this process is presented next.

  1. 1.

    Initially, the original host RGB image is used. Then, the blue component is selected to perform Arnold transformation several times. The blue component is used because modifications on this component are difficult to perceive by human eyes.

  2. 2.

    The secret image is processed using (2,2)-VCRG technique to generate two shares. Share 1 is selected to be embedded into the host image as a robust watermark.

  3. 3.

    DWT transform is applied at the 2nd resolution level over the obtained chaotic image channel to get LL2, LH2, HL2 and HH2 sub-bands [13, 35]. LL2 sub-band is used as reference to embed robust watermark into HH2 sub-band while LH2, HL2 and \(H{H^{w}_{2}}\) sub-bands are used to embed fragile watermark.

  4. 4.

    LL2 sub-band is divided into several non-overlapping blocks of size 8 × 8. Then, every block value is quantized with the help of the luminance quantization table commonly used in JPEG compression [55], which is shown in Table 2. Here each coefficient is divided by its corresponding value in the table.

  5. 5.

    Robust watermark is embedded into quantized QLL2 sub-band as next:

    $$ QLL^{w}_{2_{i}} = QLL_{2_{i}} + \alpha I_{w_{i}} $$
    (2)

    where:

    \(I_{w_{i}}\):

    is the i-th robust watermark bit.

    α:

    is a constant watermark scale factor. A high value improves watermark robustness, however, imperceptibility is decreased.

    \(QLL^{w}_{2_{i}}\):

    is the i-th watermarked coefficient corresponding to \(QLL_{2_{i}}\).

  6. 6.

    Finally, HH2 sub-band is replaced with the resultant \(QL{L^{w}_{2}}\) to obtain the watermarked sub-band \(H{H^{w}_{2}}\).

Fig. 3
figure 3

Proposed dual watermark embedding process

Table 2 Luminance quantization table

4.1.1 Fragile watermark embedding

  1. 1.

    Wavelet coefficients corresponding to sub-bands HL2, LH2, \(H{H^{w}_{2}}\) are concatenated into a one-dimensional vector C. Next, C is randomly permuted using a secret key to obtain vector \(C^{\prime }\). Previous permutations guarantee that coefficients corresponding to the same spatial location will be separated in \(C^{\prime }\).

  2. 2.

    \(C^{\prime }\) is split into sets of size d. Fragile watermark w is created by generating a random binary sequence with a secret key Kw. The created watermark is used as an authentication code and has the same dimension as the number of coefficients sets d.

  3. 3.

    Weighted mean mi corresponding to the i th coefficients set ci is computed using (3).

    $$ m_{i} = \sum\limits_{j=1}^{d}(-1)^{j} \lvert c_{i}(j) \rvert $$
    (3)

    where:

    ci(j):

    is the j th coefficient into set i.

    (− 1)j:

    is an operation used to improve scheme robustness against frequent image processing operations.

  4. 4.

    Next, weighted mean mi is modified to embed a watermark bit using (4). Here mi value is quantized to the immediate odd or even value according to the corresponding watermark bit wi.

    $$ {m^{w}_{i}} = \begin{cases} \lfloor m_{i}/Q \rfloor \cdot Q & \text{if} mod2(\lfloor m_{i}/Q \rfloor) = w_{i} \\ \lfloor m_{i}/Q \rfloor \cdot Q + Q & \text{if} mod2(\lfloor m_{i}/Q \rfloor) \neq w_{i} \end{cases} $$
    (4)

    where:

    Q :

    represents sensitivity of the tampering detection for different group sizes. It can be adapted, a higher value increases the sensitivity but decreases quality of watermarked image.

  5. 5.

    Weighted mean mi of the i th coefficients set ci is replaced with the corresponding watermarked mean \({m^{w}_{i}}\) by altering the wavelet coefficient with the maximum absolute value: \(c_{i,\max \limits }(j)\). As random permutation was previously applied, every set of coefficients should have at least one coefficient with highest absolute value. Then, \(c_{i,\max \limits }(j)\) is updated using (5).

    $$ c^{\prime}_{i,\max}(j) = c_{i,\max}(j) + (-1)^{j} \cdot sign (c_{i,\max}(j)) \cdot ({m^{w}_{i}} - m_{i}) $$
    (5)

    where:

    \(c^{\prime }_{i,\max \limits }(j)\) :

    is the watermarked coefficient and

    $$ sign(\text{c}) = \begin{cases} -1 & \text{if c} \leq 0 \\ 1 & \text{if c} > 0 \end{cases} $$
    (6)
  6. 6.

    After all coefficients with the highest absolute values in each set are updated, coefficients are reordered to their original positions by performing the inverse permutation using the same secret key.

  7. 7.

    Finally, the watermarked image channel is obtained by applying the inverse 2D-DWT transform over modified coefficients and performing the chaotic transformation to reallocate image pixels to their original positions.

4.2 Extraction process

The corresponding watermark extraction process is shown in Fig. 4. Two principal phases can be identified, i.e., the fragile watermark is extracted from high-frequency sub-bands of the second resolution level DWT transform to perform image authentication; meanwhile, low-frequency sub-band is used as a reference to extract the robust watermark from the highest frequency sub-band for copyright protection. A step-by-step detail of this process is presented next.

  1. 1.

    Initially, a watermarked (possibly manipulated) image is received. Then, the blue component is selected to perform Arnold transformation the same number of times as in the embedding process. Finally, the chaotic image channel is transformed into the frequency domain by applying DWT transform on two resolution levels.

  2. 2.

    LL2 sub-band is used as reference to extract robust watermark from HH2 sub-band and LH2, HL2 and HH2 sub-bands are used to extract fragile watermark.

  3. 3.

    LL2 sub-band is divided into 8 × 8 sized blocks for robust watermark extraction. Then, every block is quantized by dividing each coefficient by its corresponding value in the luminance quantization table, see Table 2.

  4. 4.

    Once all blocks are quantized, a quantized QLL2 sub-band is generated.

  5. 5.

    Robust watermark bits are extracted from HH2 sub-band using (7).

    $$ {RW_{i}} = (HH_{2_{i}} - QLL_{2_{i}} )/\alpha $$
    (7)

    Where:

    \(QLL_{2_{i}}\):

    is the i th coefficient in QLL2 sub-band.

    \(HH_{2_{i}}\):

    is the i th coefficient value in HH2 sub-band.

    α:

    is the same constant used in the watermark embedding process.

    RWi:

    is the i th extracted robust watermark bit.

  6. 6.

    After all robust watermark bits are extracted, Share 1 should be obtained. Then, the extracted share is used with the additional share to reveal the secret image, which can be identified by the host image owner.

  7. 7.

    Fragile watermark is extracted from the coefficients of high-frequency sub-bands. Then, the selected coefficients are concatenated, and a random permutation is performed using the same key as in the embedding process.

  8. 8.

    The sequence of permuted coefficients is divided into sets of d coefficients.

  9. 9.

    The weighted mean \(m^{\prime }_{i}\) of every coefficient set is computed.

  10. 10.

    A watermark bit \(w^{\prime }_{i}\) is extracted from the weighted mean of every set using (8).

    $$ w^{\prime}_{i} = mod2(\lfloor m^{\prime}_{i}/Q \rfloor) $$
    (8)
Fig. 4
figure 4

Proposed dual watermark extraction process

4.3 Authentication process

Image is authenticated as in [43] by following the next steps.

  1. 1.

    Original watermark sequence w is first generated using the same secret key as in the embedding process. Now, w and \(w^{\prime }\) are compared. If \(w^{\prime }\) matches with w, the image is considered authentic. Otherwise, tampering detection is performed with the next steps.

  2. 2.

    All extracted watermark bits in \(w^{\prime }\) that do not match their original ones w are identified. If the extracted watermark bit \(w^{\prime }_{i}\), corresponding to the i th set of coefficients, mismatches the original watermark bit wi, all coefficients of the corresponding i th set are labeled as tampered.

  3. 3.

    Permuted coefficients are relocated to their original positions by applying the corresponding inverse permutation. Now coefficients labeled as tampered are spread over the three high-frequency sub-bands. Then, tampered regions should have a high density of coefficients labeled as tampered. The remaining coefficients labeled as tampered should be distributed like random noise. However, some false positives can occur, and these coefficients can be stated as authentic.

  4. 4.

    Next, a binary authentication matrix Ma with the same dimensions as the sub-bands is created. Every coefficient in the position (i,j) of the three sub-bands LH2,HL2 and HH2 is scanned. If there is at least one coefficient labeled as tampered in any sub-band, then Ma(i,j) = 1.

  5. 5.

    The isolated bits 1 are removed from Ma with filtering. Then, to further eliminate incorrectly labeled coefficients from Ma, successive erosion and dilation are applied with a radius of R pixels and a square of size S × S. Now the tampered locations should be correctly identified.

  6. 6.

    Finally, matrix Ma is mapped to the spatial domain to highlight the tampered areas.

Parameter Q is the quantization step size and can be adapted for the sensitivity of the tampering detection; it defines the size of the structural elements used for erosion and dilation in step 5. A larger Q value must be used to increase the sensitivity, and it will also decrease the probability of false alarms. A solution must be found for specific applications.

5 Experimental results

This section presents several experiments that show the effectiveness of the proposed scheme. According to the used techniques, it is expected that results on the images will be highly effective against attacks such as compression, noise, filtering, as well as detection and location of tampered image regions.

Imperceptibility, fragile watermark, and robust watermark results of the proposed scheme are presented in Sections 5.15.3, and 5.2, respectively. Finally, Section 5.4 presents a comparison with relevant related works to show the advantages of the proposed scheme over similar schemes in terms of imperceptibility, watermark robustness and authentication accuracy.

Experiments were carried out using benchmark color images, most of which were taken from the USC-SIPI dataset [41]. Figure 5 shows test images. All images are of size 512 × 512. Although all images were tested in all experiments, this section presents most results using the well-known Lena image to have a concise presentation. A binary image logo of different sizes, i.e., 32 × 32, 64 × 64 and 128 × 128 is used in robust watermark embedding experiments. On the other hand, fragile watermarks are created by generating a pseudo-random binary sequence with a predefined secret key.

Fig. 5
figure 5

Test images

5.1 Imperceptibility results

Imperceptibility performance of the proposed dual watermarking scheme was evaluated using two well-known metrics: Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM). These metrics were selected since they are two common image quality assessment (IQA) metrics, which measure image similarity by directly comparing image pixels and image statistics [58].

Parameter α plays an important role in the proposed dual watermarking scheme. Watermark robustness is improved as parameter α increases; however, watermark imperceptibility is affected. For this reason, imperceptibility evaluation was performed by setting different α values, i.e., the watermarks were embedded by setting α from 1 to 1/16. Figures 6 and 7 show the imperceptibility results in terms of PSNR and SSIM metrics over different α values, respectively. It can be observed that as α value decreases, watermark imperceptibility is improved, obtaining PSNR values over 30dB. Best imperceptibility results are obtained when α value is set to 1/16, where the proposed scheme achieves more than 45dB over the six watermarked images. However, PSNR values decrease when α value is set to 1, obtaining \(\sim 30\)dB in average. For this reason, to maintain a trade-off between watermark imperceptibility and robustness, α value was established to 1/8, obtaining a PSNR average of \(\sim 45\)dB. Finally, it can be observed that results on the six images experience a small shift. Image characteristics are different, e.g., Lena image results are better than those obtained in Baboon image in terms of PSNR. This is because the Baboon image is considered a more complex image as it has high-contrast and textured regions compared with the Lena image.

Fig. 6
figure 6

Results of dual watermarked images in terms of PSNR using different α values

Fig. 7
figure 7

Results of dual watermarked images in terms of SSIM using different α values

5.2 Robust watermark results

Watermark robustness is essential to provide copyright protection in watermarking schemes. This section presents the experiments and obtained results related to robust watermarks. Several image processing attacks such as salt and pepper noise, JPEG compression, blurring, Gaussian noise, brighten, darken, torsion, scaling, collage and tone mapping attacks were applied into all watermarked images using different robust watermark sizes, i.e., 32 × 32, 64 × 64 and 128 × 128. After attacks took place, the robust watermark is extracted from the attacked image. Extracted watermark is used to reveal secret image using visual cryptography and compared with the corresponding embedded image using normalized correlation coefficient (NCC). It is expected that after attacks, extracted watermarks are visually perceptible, i.e., recovered watermarks must be very similar to original ones.

Some attacked images, as well as corresponding visual inspection of extracted watermarks after applying (2,2)-VCRG, are shown in Fig. 8. It can be observed that extracted watermarks are visually perceptible in most attacked images. The proposed robust watermark embedding is highly associated to the DWT HH sub-band at the second resolution level; thus, an extreme distortion on this sub-band will cause a watermark robustness loss. Despite different attacks were applied, most extracted watermarks were successfully extracted, i.e., the scheme provides enough watermark robustness since recovered watermarks can be recognizable by the human eye. This experimental assessment proves that the proposed watermarking scheme can be used to protect digital images strongly against most common image processing attacks, which is favorable to maintaining susceptible images’ value.

Fig. 8
figure 8

Robust watermark results. Each column of the figure lists an attacked image and the obtained secret image using the extracted robust watermark (share) after different attacks were applied, i.e, JPEG compression 50% (a), blurring (b), Gaussian noise (c), salt & pepper noise (d), brighten (e), visible watermark adding (f) and tone mapping (g)

An objective comparison of robust watermarking results is provided in Table 3. PSNR and NCC metrics are used to evaluate watermarks imperceptibility and extracted watermarks similarity with original watermarks. Several attacks were applied over all marked images using different robust watermarks sizes. It can be observed from Table 3 that as watermark size is increased, marked images quality decreases. It comes about because more information is embedded into the host image, however a larger watermark provides better robustness compared with a smaller watermark. It can also be observed that in most attacks a NCC value near to 1 is achieved, suggesting a strong relationship between embedded and extracted watermarks. However, a decreased performance is noted for torsion, scaling and tone mapping attacks. When images were attacked with geometric transformations such as torsion and scaling, the obtained watermarks achieved NCC values near to 0.8. This is because DWT is not geometrically invariant and although watermarks are still recognizable, better results can be obtained with geometrically invariant methods [17, 20]. On the other hand, when images were attacked with tone mapping attack, NCC values near to 0.3 were obtained. This is because the tone mapping attack maps one set of colors to another in order to approximate a high dynamic range (HDR) image, altering not only RGB color representation, but also high frequency detail, in which our watermarks are embedded.

Table 3 Imperceptibility and robust watermark results in terms of PSNR and NCC for different robust watermark sizes

5.3 Fragile watermark results

Authentication codes that were embedded as fragile watermarks are extracted from the high-frequency DWT coefficients. As a result, DWT provides high tampering detection rates while maintaining optimal images quality using smaller watermarks.

Authentication results are shown in Fig. 9. Figure 9(a), shows tampered images when applying three different malicious attacks, i.e., copy-move, blurring and visible watermark adding attacks. Authenticated images are shown in Fig. 9(b), where tampered regions are localized. Finally, authenticated images obtained after filtering are shown in Fig. 9(c). Authenticated images undergo a filtering stage as well as morphological operations to highlight tampered areas. Parameters used in filtering stage are the same used in [43], n = 2,d = 8 and Q = 8. From the above, a detection resolution of 2n × 2n = 4 × 4 pixels is achieved. This configuration allows the proposed scheme to detect tampered regions with an accuracy of \(\sim 0.99\).

Fig. 9
figure 9

Fragile watermark results. Attacked images with copy-move, blurring and collage attacks are shown in column (a) respectively. Authenticated images before filtering are listed in column (b). After filtering, authenticated images of column (c) are obtained

It can be seen that regardless of the applied attack, the scheme can detect and localize tampered regions in watermarked images accurately (nearly 100%). Experiments suggest that the proposed scheme provides enough watermark fragility, which is crucial to detect and localize tampered regions on watermarked images.

5.4 Dual watermarking schemes comparison

In order to show the advantages of the proposed scheme, this subsection presents a comparison among different dual watermarking methods previously proposed in the literature, including [2, 27, 30, 31, 33]. Table 4 shows a functionalities comparison among the six dual watermarking methods.

Table 4 Functionalities comparison among relevant dual watermarking schemes

Principal differences among the six schemes are detailed next. Initially, the proposed scheme, together with [2, 30, 31] provide image authentication and copyright protection, in contrast with [27, 33], where schemes are focused on watermark robustness for copyright protection, and authentication is not favored. This fact provides an advantage of the proposed scheme and [2, 30, 31] because if a watermarked image is tampered, schemes in [27, 33] will not be able to detect manipulations neither localize them. The six watermarking schemes provide copyright protection, however, [31, 33] require information about the host image to extract watermarks, then schemes are not blind. Another variation is that the proposed scheme, together with [2, 30, 31, 33], work with color images, then schemes can be used in a wide variety of scenarios. It can be observed that when a larger watermark is embedded, the proposed scheme achieves an optimal PSNR value of \(\sim \)40dB in average, which is similar to [30]. However, when a smaller watermark is embedded the proposed scheme provides a PSNR average value of \(\sim \)49dB, indicating that the proposed scheme is competitive with the state-of-the-art works. Finally, the proposed scheme together with [30] outperforms [2] in terms of authentication accuracy obtaining an accuracy value of 0.99, indicating that tampering image regions are well localized. Therefore, the proposed scheme can be used to effectively protect color images by incorporating fragile and robust watermarks without attracting the attention of malicious people.

6 Conclusions

In this paper, we presented a secure dual watermarking scheme for color images, providing image authentication and copyright protection. Two watermarks are embedded into the frequency domain using the DWT transform at the second resolution level of the blue component in RGB color space. A fragile watermark is embedded in high-frequency sub-bands, whereas a robust watermark is incorporated using the quantized low-frequency sub-band to replace the highest sub-band. The scheme’s robustness is tested by performing several image processing attacks such as salt & pepper noise, JPEG compression, blurring, Gaussian noise, tone mapping, etc. The recovered watermarks are visually recognizable after all attacks took place in most experiments. PSNR and NCC results proved the robustness of the scheme. On the other hand, authentication results show that image manipulations can be localized accurately.

The principal contribution of this research is that the proposed scheme allows the detection and localization of tampered regions when an image is manipulated while copyright protection is allowed. The scheme achieves competitive performance against relevant state-of-the-art works since results are competitive in terms of imperceptibility, watermark robustness and authentication accuracy. Furthermore, the scheme security is enhanced by using visual cryptography and chaotic transformation. Finally, host image information is not required to extract the embedded watermarks as it occurs in other schemes, so blind watermark extraction is also included.