1 Introduction

Internet and digital image processing mutually has contributed to distribution of digital content over network. But duplication, unauthorized copying, modification and reproducing of data are some major issues lead to privacy and security problems. So protecting the content is major requirement for data security over various networks. There is urgent need to provide security of content against unauthorized users/persons [1]. Digital watermarking is confirmed to be best technique to secure digital data by embedding secret information inside it, So later it can retrieved by authorized persons/users intended to use for it. Robustness, imperceptibility and capacity are the major requirement of watermark [2]. So watermark should not be tampered or altered by any unauthorized person [3]. To make image more secure, two different kinds of watermarks are embedded inside it so that robustness and security can be maintained. This type of scheme is known as multiple watermarking systems. Main motive to design such type of method is to provide better protection against tamper-resistance, intellectual property ownership and securing multimedia documents. Digital watermark can be in form of image, audio or video. Further watermark should wear all common watermarking attacks without losing invisibility. So based on all discussed point or need, we have introduced multiple watermarking technique by using optimization and security technique.

Here, proposed method includes following contributions:

  • Using combination of NSCT, RDWT and SVD all together make the technique robust and invisible. RDWT is better than DWT due to shift invariance nature of image. Moreover NSCT provide rich directionality for better reconstruction of images [4].

  • Combined embedding of different kind of watermarks together in same image provide better identity authentication [5, 6].

  • Dragonfly algorithm is based on behavior of dragon fly. It starts with set of random solutions and to optimize the solutions. There are five stages in dragon fly life span, separation, alignment, cohesion, attraction towards food and disruption from the enemies [7]. Stages are as follow:

Different stages in Dragonfly algorithm are:

Alg. 1: Optimization of embedding factor

  1. a.

    Separation

    The separation of N swarms is the sum of the separation and the current individual and jthneighbor. It can be computed using equation (1).

    $$Ri=-\sum\nolimits_{j=1}^{N}X-{X}_{j}$$
    (1)
  2. b.

    Alignment:

    The swarms align together to move forward collectively. The velocity of each swarm matches with the velocity (V) of the others.

    $${A}_{i}=\frac{\sum_{j=1}^{N}{V}_{j}}{N}$$
    (2)

    \({A}_{j}\) is the velocity of jth neighbor.

  3. c.

    Cohesion: Attraction force of swarms toward the center

    $${C}_{i}=\frac{\sum_{j=1}^{N}{V}_{j}}{N}-X$$
    (3)
  4. d.

    Attraction towards food: All the swarms get attracted towards the food (F). This is represented in Eq. (4).

    $$X_i=X^+-X$$
    (4)
  5. e.

    The distraction outward toward an enemy is

    $$G_i=X^-+X$$
    (5)

    X is the position of enemy.

Using these five parameters given in Eq. (1) to (2) the exploration and exploitation can be achieved. The proper tuning of all these parameters results into the optimal solution. Thus, the step vector and position for dragon flies is computed using eq.(vi)and (vii) respectively.

$${dx}_{t+1}=({rR}_{i}+{aA}_{i}+{xX}_{i}+{cC}_{i}+{gG}_{i})$$
(6)
$${X}_{t+1}={X}_{t +1}+{dx}_{t+1}$$
(7)

In the above equation t is the iteration count and i represent the ith fly. If a dragon fly does not has any neighbor then the levy flight is used to update the position as given in Eq. (8).

$${X}_{t+1}={X}_{t}+Levy(d)\times {X}_{t}$$
(8)

Where Levy(X) = \(0.01\times \frac{u1\times \alpha }{{|u2|}^{\frac{1}{\beta }}}\)

\(u1\) and \(u2\) are randomly selected numbers in the range [0, 1], 𝛽 is a constant

(9)

Where 

  • Arnold scrambling scheme is used to provide additional confidentiality of the data [8]. Recovery of mark data is not possible even it is extracted by unauthorized persons.

  • MSVD provides a replacement of wavelet filter bank. Compared to other decomposition MSVD require fewer computations. MSVD do not have basic function similar to other transformation, but its decomposition depends upon the dataset used [9].

  • Finally, the suggested scheme outperforms the typical watermarking schemes in the aspect of robustness to common attacks, while it offers the invisibility, capacity and security of the media data at the same time.

Remaining paper is organized in following way: Section 2 describes the review of literature of related technique. Section 3 describes the procedure of watermark embedding, extraction, optimization for both watermarks. Result outcomes are represented in Section 4. Finally, conclusion and future plan are discussed in Section 5.

2 Literature survey

Some related watermarking schemes are discussed below.

Digital image watermarking technique using DWT, DCT and SVD is developed by Kumar et al. [10]. Firstly, reference image is calculated by finding out the contrast and threshold value of image. Further properties of original image are extracted using reference image. Finally, mark is embedded using appropriate watermark strength which is produced by fuzzy logic system. Further, technique is also tested using Logic genetic algorithm. Scheme is noted to be robust and imperceptible due to selection of appropriate embedding strength. A hybrid robust watermarking method is introduced by Garg et al. [11]. Further, artificial bee colony (ABC) optimization is applied. Initially, DWT(1st level) decomposes cover image followed by application of DCT on cover image. Further, watermark is decomposed by DCT. Finally secret data is embedded using optimized embedding factor obtained using ABC (artificial bee colony). Performance of algorithm is calculated by various parameters. Experimental values show that PSNR is more than 40 and NC > 0.9 against most of common watermarking attacks. Begum et al. [12] has introduced hybridized image watermarking scheme using DCT,DFT,DWT and SVD. Further, encryption technique is applied on watermark before dividing into n-blocks. Furthermore, encrypted blocks of watermark are inserted into randomly selected n number of blocks for cover images. Finally, application of inverse transforms result into watermarked image. However, reverse of scheme leads to watermark recovery. Deeba et al. [13] has introduced a watermark method using discrete cosine transform(DCT) in sparse domain. Initially watermark is transformed by DCT. Here watermark is transformed by DCT. Further, best embedding position is find out by using K-SVD algorithm. Finally, DCT information of watermark is inserted into selected sparse coefficient of cover image. It has been observed that performance of technique is up to mark against various checkmark attacks.A stationary wavelet transform (SWT) based digital watermarking technique is described by Pourhadi et al. [14]. Further watermark is embedded based on the optimized value calculated using combine use of Bat optimization algorithm (BAT) and Speed up Robust Feature (SURF).Zhang et al. [15] introduced a robust secure watermarking method using discrete cosine transform(DCT),multi-level discrete wavelet transform(DWT) and Particle swarm optimization (PSO). Initially watermark is scrambled by Arnold transform technique. Then cover image and encrypted watermark are decomposed by multilevel DWT and DCT. Further, low and high frequency sub bands are selected to embed singular values. This technique is found to be better in term of high capacity and robustness along with imperceptibility. Amiri et al. [16] has proposed image securing method using non subsampled counterlet transform(NSCT) and stationary wavelet transform(SWT) along with singular value decomposition(SVD). Further, scaling factor is evaluated using particle swarm optimization (PSO). Firstly host image is diffused using NSCT followed by SWT. Then, SVD is applied to evaluate singular value. However watermark is decomposed by SWT before applying SVD. Finally, process of watermark embedding takes place using optimized scaling factor.A hybrid technique using DWT, DCT along with Fuzzy-BPN is introduced by Agarwal et al. [6]. Firstly, 8 × 8block size of host image is selected to find out the DCT component. Next, luminance and contrast sensitivity for the same is evaluated. Permutated watermark is embedded into 3rd level DWT component of cover image. Further, robustness is measured against eight different watermarking attacks. Method is found robust against attacks. Furthermore scheme is less complex in term of watermark processing. In [17], author has developed a multiple image watermarking technique in transform domain. Embedding of two watermarks inside cover image result into enhanced security. Further, text watermark is encrypted before embedding process. Algorithm is found robust against various considered attacks. A watermarking method using scale invariant feature transform(SIFT) in NSCT domain is introduced by Hua et al. [18]. Initially, feature point having high variance for cover image is selected for embedding watermark into cover image. Further method is found to be better capture quality and temper resistance against common watermarking attacks. A DWT based watermarking scheme is introduced by Meenpal [19]. Further SPIHT technique helps to detect suitable coefficients for imperceptible embedding of watermark. Further, security of technique is enhanced using Arnold transform. On the basis of obtained experiments results, it has been found that technique is robust against common watermarking attacks. Further, method provides better tradeoff against robustness, imperceptibility and security. Wang et al. [20] has described watermarking method using bandelet transform(BT)in NSCT domain. Further, performance of method is checked under four grey scale and eight color images. Furthermore, technique is found to be imperceptible and having better visual quality. This study addresses the challenges of imperceptibility, robustness, security, and capacity in digital image watermarking. The proposed intelligent hybrid method employs Contourlet Transform (CNT) for frequency domain transfer, SVD transformation, and dynamic scaling factors determined by PSO for enhanced robustness without compromising transparency. A novel approach is introduced to bolster security and mitigate the False Positive Problem (FPP) in SVD-based watermarking. Experimental results showcase excellent imperceptibility (PSNR 57.31 dB), notable robustness against diverse attacks, ample capacity, and enhanced security, all without false positive detection errors [21]. In addressing multimedia security concerns, this paper [22] presents an efficient hybrid digital image watermarking scheme employing two stages of Singular Value Decomposition (SVD). The embedding stage utilizes SVD followed by block-based SVD (B-SVD), while the extraction stage relies on SVD on the entire image and B-SVD. The proposed scheme enhances watermarking requirements, increases capacity, and improves watermark detection, robustness, and security. Performance evaluation based on correlation coefficient (Cr) and Peak Signal-to-Noise Ratio (PSNR) demonstrates the scheme's effectiveness with Cr reaching 0.9975 and PSNR at 45.8605. Comparative analysis underscores its superiority over recent schemes in terms of security and performance under attacks. In this paper [23], the utilization of Deep Neural Networks (DNNs) has surged across various domains, prominently in Computer Vision (CV). Particularly in the realm of Medical Image Analysis, DNNs have proven instrumental. However, the susceptibility to adversarial attacks poses a substantial threat to the robustness of vision systems. This paper explores a unique facet of digital watermarking, presenting it as a potential black-box adversarial attack, and termed watermarking attacks. The study underscores the risks posed by widespread watermark use for security purposes to vision systems. The moment-based local image watermarking method is applied to MRI, CT-scans, and X-ray images. Testing on leading CV models, including DenseNet 201, DenseNet169, and MobileNetV2, reveals the proposed attack achieving over 50% success, unveiling the potential vulnerabilities in current vision systems against watermarking attacks.This paper [24] addresses the challenge of poor robustness in medical image watermarking against geometric attacks. It introduces a zero watermarking algorithm based on KAZE-DCT for enhancing the security of medical images. The approach involves extracting feature vectors using KAZE-DCT, obtaining feature sequences through perceptual hashing, and encrypting multi-watermark images using chaotic mapping. The zero watermarking technology is then applied for watermark embedding and extraction. The algorithm demonstrates effective watermark extraction and exhibits robustness against common and geometric attacks, as evidenced by experimental results. This paper [25] introduces a novel watermarking technique for digital images using convolutional neural networks (CNNs). The approach involves extracting latent features from cover and secret images through an encoder network, concatenating them to create a marked image. On the receiver side, a de-noising auto encoder network removes noise variations from the received image and extracts the secret mark image using a CNN. The proposed technique achieves imperceptible hiding of images and demonstrates superior performance in terms of visual quality and robustness compared to state-of-the-art schemes, as evidenced by simulation results and performance comparisons.

3 Proposed method

Here, all the process is divided into three sections: Searching for optimal embedding factor, embedding and security and finally recovery and decryption process. All the process in described in alg1 to alg3 (Fig. 1).

Fig. 1
figure 1

Watermark (a) embedding (b) extraction process

Alg. 1: Optimization of embedding factor (α)

Optimization of scaling factor is calculated using Eq. (1-9).

Alg. 2: Embedding of marks data

Embedding procedure:

  1. 1.

    Segmentation applied to host image (HI) (dimension: 512 × 512)

    (10)

    where 

  2. 2.

    NSCT applied on maximum entropy (‘W’) segment of image.

    $${[W}_{U1},{W}_{U2},{W}_{U111}{,W}_{U112,}{W}_{U121,}{W}_{U122}]\leftarrow \mathrm{NSCT }[{\text{W}}]$$
    (11)

    Where \({W}_{U1},{ W}_{U2}\) is low frequency sub-bands and \({W}_{U111}{,W}_{U112,}{W}_{U121,}{W}_{U122}\) are high frequency sub-bands.

  3. 3.

    \({W}_{U121}\) is selected for RDWT1st level transform

    $${[W}_{A1},{W}_{H1},{W}_{V1}{,W}_{D1 }]\leftarrow \mathrm{RDWT }[{W}_{S121}]$$
    (12)

    Here

    \({W}_{A1 ,}{W}_{H1},{W}_{V1}{and W}_{D1}\) are the RDWT sub-bands.

  4. 4.

    Singular vector calculation:

    $$\begin{array}{c}{\lbrack U}_{WA1,}S_{WA1,}V_{WA1}\rbrack\leftarrow\mathrm{SVD}{\lbrack W}_{A1}\rbrack\\{\lbrack U}_{WH1,}S_{WH1,}V_{WH1}\rbrack\leftarrow\mathrm{SVD}\lbrack W_{H1}\rbrack\end{array}$$
    (13)
  5. 5.

    QR encoding on adhar card number watermark

    $$SW2\leftarrow Rencoding\;(adhar\;card\;number(watermark))$$
    (14)
  6. 6.

    NSCT decomposition (1st level) on watermark SW1& SW2

    $$\begin{array}{c}\lbrack P1_{T1},\;P1_{T2},\;P1_{B111},\;P1_{B112},\;P1_{B121},\;P1_{B122}\rbrack\leftarrow NSCT\;\lbrack SW1\rbrack\\\lbrack P2_{T2},\;P2_{B111},\;P2_{B112},\;P2_{B121},\;P2_{B122},{\rbrack\leftarrow NSCT\;\lbrack SW2\rbrack}\end{array}$$
    (15)
  7. 7.

    \({P1}_{B121}\) and \({P2}_{B121}\) (1st level RDWT transform)

    $$\begin{array}{c} \left[{P1}_{A1},{P1}_{H1},{P1}_{V1},{P1}_{D1}\right] \leftarrow RDWT \left[{P1}_{B121}\right] \\ \left[{P2}_{A1},{P2}_{H1},{P2}_{V1},{P2}_{D1}\right] \leftarrow RDWT \left[{P2}_{B121}\right]\end{array}$$
    (16)

    Where \({P1}_{A1,}{P1}_{H1,}{P1}_{V1,}{P1}_{D1}\mathrm{ and }{P2}_{A1},{P2}_{H1}{,P2}_{V1},{P2}_{D1}\) are sub-bands of SW1 and SW2 respectively.

  8. 8.

    Singular vector of \({P1}_{A1}\) and \({P2}_{H1}\).

    $$\begin{array}{c}\lbrack U_{P1A1,}\;S_{P1A1,}\;V_{P1A1}\rbrack\leftarrow SVD\;\lbrack P1_{A1}\rbrack\\\lbrack U_{P2H1,}\;S_{P2H1,}\;P_{P2A1}\rbrack\leftarrow SVD\;\lbrack P2_{H1}\rbrack\end{array}$$
    (17)
  9. 9.

    Embedding process for both watermarks as

    (18)
    (19)
  10. 10.

    Inverse SVD, RDWT, NSCT and sub-sampling operation are applied which result into watermarked image (Ws).

  11. 11.

    Watermarked image is encrypted using Henon Map encryption.

    $${W}_{s}\to {W}_{R}$$

Alg. 3: Recovery of marks data

  1. 1.

    Sub-image with maximum entropy (IX) is selected from watermarked image ‘WR’.

  2. 2.

    NSCT on IX:

    $${[I}_{X1},{I}_{X2},{I}_{XB111,}{,I}_{XB112,}{I}_{XB121},{I}_{XB122}] \leftarrow \mathrm{NSCT }[{I}_{X}]$$
    (20)

    Where

    \({I}_{X1},{ I}_{X2}\): Low frequency sub band.

    \({I}_{XB111}{, I}_{XB112,}{I}_{XB121},{I}_{XB122}\): Sub-band with high frequency.

  3. 3.

    1st level RDWT decomposition

    $$\left[{I}_{XA1,}{I}_{XH1},{I}_{XV1},{I}_{XD1}\right]\leftarrow \mathrm{RDWT }[{I}_{XB121}]$$
    (21)
  4. 4.

    SVD for \({I}_{XA1}{and I}_{XH1}\)

    $$\begin{array}{c}{[U}_{{\text{IXA}}1} ,{S}_{{\text{IXA}}1},{V}_{{\text{IXA}}1}]\leftarrow {\text{SVD}}[{I}_{XA1}]\\ { [U}_{{\text{IXH}}1},{S}_{{\text{IXH}}1},{V}_{{\text{IXH}}1]} ]\leftarrow {\text{SVD}}[{I}_{XH1}]\end{array}$$
    (22)
  5. 5.

    Recovery of both watermarks

    (23)
  6. 6.

    Inverse RG1 and RG2.

  7. 7.

    Watermark1 (RW1)&waternark2 (RW2)recovered using inverse of RDWT and NSCT.

4 Experimental outcomes

In our work, one cover image ‘rice.bmp’ (https://www.bing.com/images/search?q=baboon%20watemarkr&qs=n&form=QBIR&qft=%20filterui%3Alicense-L2_L3_L4&sp=-1&pq=baboon%20watemarkr&sc=1-16&cvid=CD8F7EB89C4E4918A02268D75138377D&first=1&tsc=ImageBasicHover) of size ‘512 × 512.Two watermark images ‘cpuh.bmp’ (http://www.cpuh.in) having size and Adhar card number having size ‘256 × 256’ and ‘128 × 128’ respectively are considered for experiment. Performance is evaluated with peak signal to noise ratio (PSNR) [26], normalized correlation(NC) [26]. All the experiments are performed using MATLAB 16a. PSNR evaluate the alteration between original cover image and marked data. NC value finds out the robustness by measuring resemblance between the original and recovered mark images. Notation for watermarks is denoted as NC(1) and NC(2) respectively. Pictorial representation of host, watermarks and marked image is represented in Fig. 2. Encrypted and recovered marked image is shown in Fig. 3. However Extracted watermarks are shown in Fig. 4. Further, performance evaluation based on various attack is shown in Fig. 5. Experimental results are presented in Tables 1, 2, 3, 4 and 5. Performance of technique under various cover images is shown in Table 1. Highest value of PSNR is 51.2967 dB against NC, NPCR, UACI and SSIM [27] having values 0.9802, 0.9962, 0.282 and 0.999862 respectively. Performance of technique against various filters is represented in Table 2. It has been observed that the best value of NC is 1under almost all filters. Further robustness comparison of method is represented in Table 3. Under salt and pepper attack, our best value obtained is 0.9999 as compared to techniques [27,28,29,30] having values 0.851,0.98,0.9962 respectively. Further, under Gaussian Blur attack, proposed techniques has bestvalue is 0.9988 as compared to other compared technique [27,28,29,30] having values 0.994,0.9906,0.96,0.9999respectively. Further under median filter, best value is obtained as 0.9968. Next, techniques [27,28,29,30] has obtained values as 0.883,0.9892,0.998 respectively against JPEG compression(QF = 25). However, we have achieved better value ie. 0.996 against same attacks. Further, under histogram equalization we have obtained best value as 0.9958 as compared to other techniques [27,28,29,30] having values 0.9654 and 0.998. We have best NC value for cropping(12%) is 0.9999 as compared to other compared technique [27,28,29,30] having value 0.9984. Further, we have best NC values for speckle noise and average filtering are 0.9999 and 0.9998 respectively. Under rotation attack we have value as 0.9989 as compared to other method [27,28,29,30] having NC values 0.832, 0.9973 respectively. Finally under scaling attack, we have also achieved better performance than other compared technique [27,28,29,30]. Tables 4 and 5 represent NPCR and UACI value comparison against various cover images related to other work [31,32,33,34] without optimization. Table 6, Table 7 represent NPCR and UACI value comparison against various cover images related to other work [31,32,33,34] after applying optimization. Tables 6 and 7 clearly demonstrate better value than other compared techniques. However Table 8 represent comparisons of average NPCR and UACI values with other related work [35, 36]. Result clearly represents our better value than other related techniques. Finally, Fig. 6 represents the NPCR and UACI value comparison between proposed and compared technique [27,28,29,30] after applying optimization. It is clear from the comparison that we have better range of values for NPCR and UACI than other reported techniques [27,28,29,30]

Fig. 2
figure 2

a Cover image b Image watermark c adhar card number d Watermarked image

Fig. 3
figure 3

a Encrypted watermarked image b Decryptedwatermarked image

Fig. 4
figure 4

Extracted (a) logo and (b) adhar card number

Fig. 5
figure 5

Attacked watermarked and extracted watermarks

Table 1 Performance of method against various cover images
Table 2 Performance of method against various filters
Table 3 Comparison of improved robustness with related works
Table 4 NPCR value comparison between proposed and compared technique (Without scaling factor optimization)
Table 5 UACI value comparison between proposed and compared technique (Without scaling factor optimization)
Table 6 NPCR value comparison between proposed and compared technique (Scaling factor optimization)
Table 7 UACI value comparison between proposed and compared technique (Scaling factor optimization)
Table 8 Average UACI and NPCR value comparison between proposed and compared technique (after scaling factor optimization)
Fig. 6
figure 6

Comparison of UACI value with other compared techniques (scaling factor optimization)

5 Conclusions

In this paper security of digital data is resolved using presented hybrid watermarking technique using NSCT-RDWT-SVD to resolve security problems. Initially, cover and watermarks are decomposed by NSCT-RDWT and SVD. Next, we find out best optimized value using Dragonfly optimization for imperceptibly embedding watermark inside cover image. Furthermore, watermarked data is secured using Henon Map. Performance of our method is evaluated using different parameters. Moreover, experimental outcomes based on various images clearly confirm the better performance in term of robustness and imperceptibility. Further best value of PSNR and NC is 51.2967 dB and 1 respectively. Future plan is to check the performance for various color images against different distortions and parameters.