1 Introduction

As communication networks quickly expand, digital image transmission over the Internet is increasing day by day. It is becoming progressively prevalent in our digital world, with the rise of social media, streaming services and other online platforms that allow users to share and utilize digital images. Telemedicine is a fast-evolving field of clinical care where medical data is transmitted via interactive media for consultations and occasionally for remote medical treatments or tests. In order to send medical images from one location to another and provide medical expertise, tele-radiology is an important area of telemedicine. Digital communication technology is initially unreliable for secure online image communication due to disturbances generated across the communication channel and different hacker actions. Due to the value of the medical images and the high cost of data collection, security of the medical image has become essential. Although there are several data hiding systems developed for tele-radiology applications, image watermarking techniques are employed to protect patient confidentiality. Digital image watermarking has become increasingly important due to the ease of copying and distributing digital images over the Internet. It is used in various applications to provide copyright protection, image authentication, tamper detection, and content identification.

Digital image watermarking [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16] is the process of embedding a digital watermark, which is a unique identifier or code, into an image to protect its authenticity, ownership, or copyright. The watermark can be visible or invisible, and it is difficult to remove or alter without damaging the image quality. While designing an image watermarking algorithm, parameters such as capacity, security, imperceptibility and robustness must be considered. Several image watermarking techniques have been proposed in the literature. Recent techniques in digital image watermarking are based on deep learning, transform and compressive sensing techniques. Deep learning-based watermarking [2, 6] uses deep learning models to embed a watermark into an image. The models can be trained to embed the watermark in a way that makes it more robust to various image processing attacks. In multi-layer watermarking, multiple watermarks are embedded into an image at different layers. Each layer has a different level of complexity, making it more difficult for attackers to remove or alter the watermarks. Compressive sensing-based watermarking [12] uses compressive sensing theory to embed a watermark into an image. The technique is more efficient than traditional watermarking methods and provides better resistance to various attacks.

Transform domain watermarking involves embedding the watermark into cover image in the transform domain using the discrete cosine transform (DCT) [17], discrete wavelet transform (DWT) [1], RDWT [4, 18], lifting wavelet transform (LWT) [19] and integer wavelet transform (IWT) [20]. The transform domain provides a more robust and efficient way to embed the watermark. Researchers also proposed watermarking techniques based on the combination of these transforms to achieve better imperceptibility and robustness. To provide robust watermarking technique, these transforms are also combined with singular value decomposition (SVD) such as DWT-SVD [21], DWT-DCT-SVD [22], RDWT-SVD [4], LWT-SVD [14, 19] and IWT-SVD [20]. Security of watermarking algorithms can be enhanced by applying encryption of watermark during embedding. Various encryption techniques are utilized in image watermarking to enhance the security [18, 23]. Many techniques have been suggested in the literature for authentication and copyright protection of gray scale images, while for color images, limited schemes have been proposed in the literature.

Table 1 tabulates the recent proposed techniques and its objective, limitations based on hybrid transforms. A review of the literature indicates that an appropriate combination of transform domain techniques can increase the robustness of the image watermarking scheme, and a scrambled watermark can offer additional security. Therefore, this paper introduces a dual image watermarking based on RDWT-RSVD-MRFO using Henon mapping encryption in YCbCr color space. Luminance component of cover image is utilized to embed both watermarks. Strength factor is optimized using MRFO. During embedding, both watermarks are encrypted using Henon mapping to enhance the security of proposed method. To assess the imperceptibility and robustness of proposed method, quality metrics such as PSNR, SSIM, Kullback–Leibler divergence (KL DIV), Jensen–Shannon divergence (JS DIV), NC and bit error rate (BER) are calculated.

Table 1 Literature survey of some recent state-of-the-art image watermarking schemes

There are several benefits of the below-mentioned state of the literature survey but many issues yet needed to be resolved. Following are the problems listed below:

  1. (1)

    Lack of security is the major concern in most of the existing schemes. To provide the copyright protection, watermarks need to be secured with proper encryption techniques.

  2. (2)

    Capacity is another concern of dual image watermarking technique. High capacity is the need of efficient watermarking scheme.

  3. (3)

    Balance among the resilience, imperceptibility and capacity is the vital requirement of watermarking. So, to achieve a balance between these parameters an optimized scaling factor is needed.

  4. (4)

    Computational complexity and cost are high in many of the previously existing techniques.

  5. (5)

    In several techniques, shift-variant and slow DWT is used to transform the images.

  6. (6)

    False-positive problem is another major concern of many techniques.

Following are the major contributions of the proposed work:

  1. (1)

    YCbCr color space is preferred over conventional RGB as Y (luminance) component contains the collective brightness of all three channels, i.e., R, G and B. Any forgery or alteration in Y component can be visible through naked eye. YCbCr color space also has very less effect of noise.

  2. (2)

    RDWT is used in place of traditional DWT as RDWT is having the property of shift invariance. It is also used to enhance the capacity of the proposed method.

  3. (3)

    RSVD is used in place of SVD as computational complexity of RSVD is less. SVD requires more memory spaces in comparison with RSVD. SVD is also cost inefficient mechanism.

  4. (4)

    Henon encryption is used to secure the watermark images. The proposed watermarking method is free from false-positive problem.

  5. (5)

    Dual watermarks are used to further enhance the security of the presented work.

  6. (6)

    Scaling factor plays an important role in optimizing robustness, imperceptibility, and capacity. So, to get the optimum scaling factor a novel fitness function is used and optimized value is obtained by applying MRFO.

Rest of the paper is organized in six sections. Preliminaries are discussed in Sect. 2. Watermark embedding and extraction processes are presented in Sect. 3. Quality metrics used to evaluate the performance of the proposed scheme is mentioned in Sect. 4. Section 5 presents the simulation results in terms of imperceptibility, robustness, computational complexity, capacity and security. Comparison with existing techniques is presented in Sect. 6, while conclusion of proposed method is drawn in Sect. 7.

2 Preliminaries

2.1 Conversion of Color Spaces

For ‘real world’ images, RGB is the most popular color model. Nevertheless, the RGB color model is ineffective when dealing with actual image processing (such as modifying an image’s color or intensity). To tackle these kinds of image processing applications, the YCbCr color space was developed along with several other color models [10]. Compared to RGB color space, YCbCr is more resistant to attacks. YCbCr color is obtained from RGB color space using Eq. (1):

$$\left[ {\begin{array}{*{20}c} Y \\ {Cb} \\ {Cr} \\ \end{array} } \right] = \left[ {\begin{array}{*{20}c} {0.299 0.587 0.114} \\ { - 0.169 - 0.331 0.500} \\ { 0.500 - 0.419 - 0.081} \\ \end{array} } \right] \times \left[ {\begin{array}{*{20}c} R \\ G \\ B \\ \end{array} } \right] + \left[ {\begin{array}{*{20}c} 0 \\ {128} \\ {128} \\ \end{array} } \right]$$
(1)

RGB color is converted from YCbCr color space using Eq. (2):

$$\left[ {\begin{array}{*{20}c} R \\ G \\ B \\ \end{array} } \right] = \left[ {\begin{array}{*{20}c} {1.00 - 0.00 1.40} \\ {1.00 - 0.34 - 0.71} \\ {1.00 1.77 0.00} \\ \end{array} } \right] \times \left[ {\begin{array}{*{20}c} Y \\ {Cb - 128} \\ {Cr - 128} \\ \end{array} } \right]$$
(2)

2.2 Redundant Discrete Wavelet Transform

The DWT decomposes the signal into coarse coefficients and detail coefficients in order to analyze a digital image at various frequency bands with various resolutions. DWT utilizes high-pass filter and low-pass filter with down-sampling along rows and columns of an image to decompose it into sub-bands. This down-sampling procedure may remove image details that could be valuable but are not necessary to replicate the image. The loss of coefficients due to down-sampling, alters the image slightly and decreases the probability of reproduction of the image. To overcome DWT’s shift-variant property, researchers have proposed RDWT which is shift-invariant [4]. By forgoing down-sampling and up-sampling, RDWT solves the shift variance issue with DWT and boosts embedding capacity.

2.3 Randomized Singular Value Decomposition

The concept of approximation matrix factorization utilizing random projections is explored by the advanced form of SVD known as RSVD [33]. RSVD of a matrix X is given as:

$$X_{k} = \hat{U}\hat{\Sigma }\hat{V}^{T}$$
(3)

In Eq. (3), \(\hat{U}\) and \(\hat{V}\) are orthonormal matrices, k is target rank, and \(\hat{\Sigma }\) is diagonal matrix whose diagonal elements represent singular values.

There are two stages to the RSVD method. The first stage involves random sampling to produce a reduced matrix whose range is approximation of the range of the input matrix X. By employing the randomization strategy in this stage, a nearly optimal basis matrix A is obtained. By projecting X to low-dimensional space, we can obtain another matrix Z as shown in Eq. (4):

$$Z = A^{T} X$$
(4)

In the second stage, the reduced matrix is factorized by taking SVD of Z.

$$Z = \tilde{U}\Sigma V^{T}$$
(5)

In Eq. (5), \(\tilde{U}\) is approximation of left singular matrix \(\hat{U}\).

2.4 Henon Mapping

Classical dynamic system in discrete time domain was proposed by Henon [34]. A point \(\left( {x_{i} ,y_{i} } \right)\) transforms into \(\left( {x_{i + 1} ,y_{i + 1} } \right)\) using Henon mapping as shown in Eq. (6):

$$\left\{ {\begin{array}{l} {x_{i + 1} = 1 - ax_{i}^{2} + y_{i} } \\ {y_{i + 1} = bx_{i} } \\ \end{array} } \right.$$
(6)

The Henon mapping can be seen to be a chaotic map made up of the variables \(x\) and \(y\), where \(a\) and \(b\) are Henon map parameters. Henon map can produce confusion and histogram uniformity for image encryption. Henon map has near-optimal randomization characteristics and is computationally effective [35]. For Henon map encryption, control parameters ‘a’ and ‘b’ play an important role. Suitable values of control parameters generate the encrypted image which appears meaningless and we cannot decipher any information of original image. Here, a = 1.4 and b = 0.34 are chosen for encrypting the images.

2.5 Manta Ray Foraging Optimization

MRFO is a metaheuristic optimization [3, 5] technique that draws inspiration from the manta rays’ intelligent foraging patterns [36]. Manta rays utilize three foraging strategies, notably the chain, cyclone and somersault, to search for food. In order to find a globally optimal solution to the problem, the MRFO algorithm imitates these foraging strategies.

2.5.1 Chain Foraging

Manta rays establish a foraging chain by forming a line with their heads and tails. A larger concentration of plankton, which is the main food source for manta rays, is considered by MRFO as the best solution. Manta ray update their position iteratively with respect to the manta rays in front of it and the best solution obtained so far. The chain foraging mathematical model is explained in Eq. (7):

$$p_{i}^{t + 1} = \left\{ {\begin{array}{*{20}l} {p_{i}^{t} + r_{1} \cdot \left( {p_{best}^{t} - p_{i}^{t} } \right) + \alpha \cdot \left( {p_{best}^{t} - p_{i}^{t} } \right)\quad i = 1} \\ {p_{i}^{t} + r_{2} \cdot \left( {p_{i - 1}^{t} - p_{i}^{t} } \right) + \alpha \cdot \left( {p_{best}^{t} - p_{i}^{t} } \right) \quad i = 2,3,..., N_{pop} } \\ \end{array} } \right.$$
(7)

where \(p_{i}^{t}\) is the individual’s position at time ‘t’, \(p_{best}^{t}\) is the best position, \(N_{pop}\) represents the population size, \(\alpha = 2 \cdot r_{3} \cdot \sqrt {{\text{log}}\left( {r_{4} } \right)}\) is the weight coefficient, and \(r_{i} \in \left[ {0,1} \right] i = 1,2,3,4\) are random values.

2.5.2 Cyclone Foraging

Manta rays spiral toward them after finding where their food supply is and reposition themselves to be in that area, which is the best location so far. Mathematically, cyclone foraging formulated as shown in Eq. (8):

$$p_{i}^{t + 1} = \left\{ {\begin{array}{*{20}l} {p_{best}^{t} + r_{5} \cdot \left( {p_{best}^{t} - p_{i}^{t} } \right) + \beta \cdot \left( {p_{best}^{t} - p_{i}^{t} } \right) \quad i = 1} \\ {p_{best}^{t} + r_{6} \cdot \left( {p_{i - 1}^{t} - p_{i}^{t} } \right) + \beta \cdot \left( {p_{best}^{t} - p_{i}^{t} } \right) \quad i = 2,3, \ldots , N_{pop} } \\ \end{array} } \right.$$
(8)
$$\beta = 2 \cdot \exp \left( {r_{7} \cdot \frac{{\left( {iter_{\max } - iter + 1} \right)}}{{iter_{\max } }}} \right) \cdot \sin \left( {2\pi r_{7} } \right)$$
(9)

In Eq. (9), \(iter_{max}\) and \(iter\) are maximum iteration and current iteration, respectively, \(r_{i} \in \left[ {0,1} \right] i = 5,6,7\) are random values, and \(\beta\) is weight coefficient.

In order to fully utilize the region around food, spiral foraging primarily uses food as a reference point. Manta rays will randomly begin searching for different areas with higher densities of planktons if they see low-density planktons. It can be mathematically expressed as shown in Eq. (11):

$$p_{rand} = lb + r_{8} \cdot \left( {ub - lb} \right)$$
(10)
$$p_{i}^{t + 1} = \left\{ {\begin{array}{*{20}l} {p_{rand} + r_{9} \cdot \left( {p_{best}^{t} - p_{i}^{t} } \right) + \beta \cdot \left( {p_{best}^{t} - p_{i}^{t} } \right)\quad i = 1} \\ {p_{rand} + r_{10} \cdot \left( {p_{i - 1}^{t} - p_{i}^{t} } \right) + \beta \cdot \left( {p_{best}^{t} - p_{i}^{t} } \right)\quad i = 2,3, \ldots , N_{pop} } \\ \end{array} } \right.$$
(11)

\(lb\) and \(ub\) are lower and upper bounds of search region, \(p_{rand}\) is random position in the search region and given by Eq. (10), and \(r_{i} \in \left[ {0,1} \right] i = 8,9,10\) are uniformly distributed random values.

Hence, the behavior of the cyclones helps in MRFO exploration and exploitation.

2.5.3 Somersault Foraging

In somersault strategy, to get closer to the location of the meal, Manta rays somersault around it and update their position around the best pivot point obtained thus far. Mathematical model of somersault foraging strategy is expressed by Eq. (12):

$$p_{i}^{t + 1} = p_{i}^{t} + S \cdot \left( {r_{11} \cdot p_{best}^{t} - r_{12} \cdot p_{i}^{t} } \right) \quad i = 1,2,3, \ldots .,N_{pop}$$
(12)

where \(S\) is somersault factor, and \(r_{i} \in \left[ {0,1} \right] i = 11,12\).

The two control factors that must be carefully adjusted to ensure the MRFO performs well are the population size (\(N_{pop}\)) and the maximum number of iterations (\(iter_{max}\)).

3 Proposed Methodology

In this section, an optimized dual watermarking technique based on RDWT-RSVD-MRFO and encryption using Henon mapping is introduced. RGB color space of cover image is converted into YCbCr color space, and luminance component is further utilized to embed dual watermarks. 3-level RDWT applied on luminance component of cover image and LH, HL sub-bands is further processed with RSVD. 1-level RDWT applied on both watermarks and before performing RSVD on their sub-bands, LH and HL sub-bands, is encrypted using Henon mapping. Singular values of two sub-bands of cover image are modified by utilizing singular values of watermarks with suitable strength factor. The strength factor utilized to embed watermarks is optimized using MRFO technique. To generate watermarked image, inverse RSVD and inverse RDWT are applied and converted back into RGB color space. For watermark extraction, inverse process of embedding is followed. Embedding and extraction procedure of proposed scheme is shown in Figs. 1 and 2.

Fig. 1
figure 1

Watermark embedding process block diagram

Fig. 2
figure 2

Extraction process of proposed watermarking scheme

3.1 Embedding Procedure

Detailed watermark embedding procedure to embed a grayscale image and a text image watermark is listed below:

  1. 1.

    Convert the RGB cover image into YCbCr color space as expressed in Eq. (13):

    $$\left[ {cover\_img_{Y} ,cover\_img_{Cb} ,cover\_img_{Cr} } \right] \leftarrow RGBtoYCbCr\left( {cover\_img} \right)$$
    (13)
  2. 2.

    Perform 1-level RDWT on luminance component to divide it into four sub-bands as shown in Eq. (14):

    $$\left[ {LL_{1} ,LH_{1} ,HL_{1} ,HH_{1} } \right] \leftarrow RDWT(cover\_img_{Y} )$$
    (14)
  3. 3.

    \(LL_{1}\) sub-band of luminance component which is obtained from above step is again processed with 2-level RDWT which decomposes it into several sub-bands as expressed in Eqs. (15) & (16):

    $$\left[ {LL_{2} ,LH_{2} ,HL_{2} ,HH_{2} } \right] \leftarrow RDWT(LL_{1} )$$
    (15)
    $$\left[ {LL_{3} ,LH_{3} ,HL_{3} ,HH_{3} } \right] \leftarrow RDWT(LL_{2} )$$
    (16)
  4. 4.

    \(HL_{3}\) and \(LH_{3}\) sub-bands generated after 3-level RDWT are utilized to embed both watermarks. RSVD is applied on both sub-bands to decompose it into three matrices as shown in Eqs. (17) and (18):

    $$\left[ {U_{{HL_{3} }} ,S_{{HL_{3} }} ,V_{{HL_{3} }}^{T} } \right] \leftarrow RSVD\left( {HL_{3} } \right)$$
    (17)
    $$\left[ {U_{{LH_{3} }} ,S_{{LH_{3} }} ,V_{{LH_{3} }}^{T} } \right] \leftarrow RSVD\left( {LH_{3} } \right)$$
    (18)
  5. 5.

    Consider grayscale image and a text image as watermark and 1-level RDWT is applied on both watermarks as expressed in Eqs. (19) and (20) to divide it into four sub-bands.

    $$\left[ {LL_{W1} ,LH_{W1} ,HL_{W1} ,HH_{W1} } \right] \leftarrow RDWT\left( {watermark\_1} \right)$$
    (19)
    $$\left[ {LL_{W2} ,LH_{W2} ,HL_{W2} ,HH_{W2} } \right] \leftarrow RDWT\left( {watermark\_2} \right)$$
    (20)
  6. 6.

    Select \(HL_{W1}\) of first watermark and perform Henon mapping on the band to encrypt this sub-band expressed as Eq. (21):

    $$\widehat{HL}_{W1} \leftarrow henon\_map\_enc\left( {HL_{W1} } \right)$$
    (21)
  7. 7.

    Encrypt \(LH_{W2}\) of second watermark using Henon mapping shown in Eq. (22) on this sub-band.

    $$\widehat{LH}_{W2} \leftarrow henon\_map\_enc\left( {LH_{W2} } \right)$$
    (22)
  8. 8.

    Decompose encrypted \(\widehat{HL}_{W1}\) and \(\widehat{LH}_{W2}\) into three sub matrices by applying RSVD on it as expressed in Eqs. (23) and (24):

    $$\left[ {U_{{HL_{W1} }} ,S_{{HL_{W1} }} ,V_{{HL_{W1} }}^{T} } \right] \leftarrow RSVD\left( {\widehat{HL}_{W1} } \right)$$
    (23)
    $$\left[ {U_{{LH_{W2} }} ,S_{{LH_{W2} }} ,V_{{LH_{W2} }}^{T} } \right] \leftarrow RSVD\left( {\widehat{LH}_{W2} } \right)$$
    (24)
  9. 9.

    To embed first watermark into \(HL_{3}\) of cover image, modify the singular value of \(HL_{3}\) by multiplying strength factor ‘\(\alpha\)’ obtained by MRFO with singular value of \(\widehat{HL}_{W1}\) shown in Eq. (25):

    $$S_{{HL_{3} }}^{*} = S_{{HL_{3} }} + \alpha *S_{{HL_{W1} }}$$
    (25)
  10. 10.

    \(LH_{3}\) of cover image is selected to embed the second watermark. Optimized strength factor ‘\(\alpha\)’ multiplied with singular value of \(\widehat{LH}_{W2},\) and the product is added with singular value of \(LH_{3}\) expressed as Eq. (26):

    $$S_{{LH_{3} }}^{*} = S_{{LH_{3} }} + {\upalpha }*S_{{LH_{W2} }}$$
    (26)
  11. 11.

    Perform inverse RSVD to rebuild the sub-bands \(HL_{3}\) and \(LH_{3}\) after modification of their singular values as mentioned in Eqs. (27) and (28):

    $$HL_{3}^{*} \leftarrow IRSVD\left( {U_{{HL_{3} }} ,S_{{HL_{3} }}^{*} ,V_{{HL_{3} }}^{T} } \right)$$
    (27)
    $$LH_{3}^{*} \leftarrow IRSVD\left( {U_{{LH_{3} }} ,S_{{LH_{3} }}^{*} ,V_{{LH_{3} }}^{T} } \right)$$
    (28)
  12. 12.

    Apply 3-level inverse RDWT to get back luminance component of watermarked image expressed as Eq. (29):

    $$watermarked_{Y} \leftarrow IRDWT\left( {LL_{3} ,LH_{3}^{*} ,HL_{3}^{*} ,HH_{3} } \right)$$
    (29)
  13. 13.

    Combine chrominance and luminance components to generate the watermarked image as mentioned in Eq. (30):

    $$watermarked\_img_{YCbCr} \leftarrow combine\left( {watermarked_{Y} ,cover\_img_{Cb} ,cover\_img_{Cr} } \right)$$
    (30)
  14. 14.

    Convert YCbCr color space into RGB color space to get the final watermarked image as shown in Eq. (31):

    $$watermarked\_img_{RGB} \leftarrow watermarked\_img_{YCbCr}$$
    (31)

3.2 Extraction Procedure

To extract the embedded watermarks from the watermarked image, reverse process of embedding procedure is followed. Steps involved in extraction of watermarks are listed below:

  1. 1.

    Conversion of received color watermarked image into YCbCr color space shown in Eq. (32):

    $$\begin{aligned} &\left( {watermarked\_img_{Y} ,watermarked\_img_{Cb} ,watermarked\_img_{Cr} } \right)\\ &\quad \leftarrow RGBtoYCbCr\left( {watermarked\_img} \right)\end{aligned}$$
    (32)
  2. 2.

    Further, perform 3-level RDWT on luminance component of watermarked image as expressed in Eq. (33) to decompose it into several sub-bands:

    $$\left[ {LL_{WM3} ,LH_{WM3} ,HL_{WM3} ,HH_{WM3} } \right] \leftarrow RDWT\left( {watermarked\_img_{Y} } \right)$$
    (33)
  3. 3.

    To extract the embedded watermarks from received watermarked image, apply RSVD on \(LH_{WM3}\) and \(HL_{WM3}\) to decompose it into three matrices expressed as Eqs. (34) and (35):

    $$\left[ {U_{{HL_{WM3} }} ,S_{{HL_{WM3} }} ,V_{{HL_{WM3} }}^{T} } \right] \leftarrow RSVD\left( {HL_{WM3} } \right)$$
    (34)
    $$\left[ {U_{{LH_{WM3} }} ,S_{{LH_{WM3} }} ,V_{{LH_{WM3} }}^{T} } \right] \leftarrow RSVD\left( {LH_{WM3} } \right)$$
    (35)
  4. 4.

    Extract singular value of HL sub-band by using \(S_{{HL_{WM3} }}\), \(S_{{HL_{3} }}\) and strength factor ‘\(\alpha\)’ using Eq. (36):

    $$S_{{HL_{EXT} }} \leftarrow \left( {S_{{HL_{WM3} }} - S_{{HL_{3} }} } \right)/\alpha$$
    (36)
  5. 5.

    By using \(S_{{LH_{WM3} }}\), strength factor ‘\(\alpha\)’ and \(S_{{LH_{3} }}\), extract LH sub-band singular value as expressed in Eq. (37):

    $$S_{{LH_{EXT} }} \leftarrow \left( {S_{{LH_{WM3} }} - S_{{LH_{3} }} } \right)/\alpha$$
    (37)
  6. 6.

    Perform inverse RSVD to rebuild sub-bands by utilizing corresponding extracted singular values using Eqs. (38) and (39):

    $$HL_{EXT} \leftarrow IRSVD\left( {U_{{HL_{W1} }} ,S_{{HL_{EXT} }} ,V_{{HL_{W1} }}^{T} } \right)$$
    (38)
    $$LH_{EXT} \leftarrow IRSVD\left( {U_{{LH_{W2} }} ,S_{{LH_{EXT} }} ,V_{{LH_{W2} }}^{T} } \right)$$
    (39)
  7. 7.

    Decrypt both extracted sub-bands using Henon mapping as shown in Eqs. (40) and (41):

    $$\widehat{HL}_{EXT} \leftarrow henon\_map\_dec\left( {HL_{EXT} } \right)$$
    (40)
    $$\widehat{LH}_{EXT} \leftarrow henon\_map\_dec\left( {LH_{EXT} } \right)$$
    (41)
  8. 8.

    Apply 1-level inverse RDWT to extract first watermark by using Eq. (42):

    $$extracted\_watermark_{1} \leftarrow IRDWT\left( {LL_{W1} ,LH_{W1} ,\widehat{HL}_{EXT} ,HH_{W1} } \right)$$
    (42)
  9. 9.

    Extract second watermark by applying 1-level inverse RDWT as expressed in Eq. (43):

    $$extracted\_watermark_{2} \leftarrow IRDWT\left( {LL_{W2} ,\widehat{LH}_{EXT} ,HL_{W2} ,HH_{W2} } \right)$$
    (43)

3.3 Optimization Procedure for Image Watermarking using MRFO

The strength factor has a significant impact on the watermarking scheme’s visual quality and robustness. A minor decrease in the value of strength factor improves the watermarked image’s perceptual quality, but significantly degrades the recovered watermark image quality. Similarly, when the strength factor has a high value, the visual quality degrades but the robustness is improved. Consequently, it is essential to find the appropriate strength factor value that makes a compromise between invisibility and robustness for embedding with singular values. To provide the highest level of visual quality and robustness for each image, a different strength factor value is required. The issue of determining the ideal strength factor to avoid the conflict between invisibility and robustness can also be resolved by employing bio-inspired optimization techniques. In this paper, optimized strength factor is calculated using MRFO technique to modify the singular values of sub-bands of cover image using singular value of watermark’s sub-band.

A single objective function-based MRFO is employed in the optimization process of the proposed watermarking technique to determine the strength factor. For each iteration of the MRFO, the strength factor value is analyzed after applying various attacks. To create the suitable fitness function, the robustness of the watermarked image and its visual quality should be assessed. Objective function of proposed scheme of watermarking is defined in Eq. (44):

$$\begin{aligned} obj\_fun &= \frac{PSNR}{{100}} + \frac{1}{{\left( {\mathop \sum \nolimits_{i = 1}^{k} NC_{1i} + \mathop \sum \nolimits_{i = 1}^{k} NC_{2i} } \right)}}\\ &\quad + \left( { - \left( {\frac{KL DIV + JS DIV + BER}{3}} \right)} \right)\end{aligned}$$
(44)

where k is the total number of attacks applied on watermarked image.

Upper bound range and lower bound range of PSNR [Eq. (45)], NC [Eq. (46)], KL DIV [Eq. (47)], JS DIV [Eq. (48)] and BER [Eq. (49)] are mentioned below:

$$55 \le PSNR \le 65$$
(45)
$$0.9 \le NC_{1} ,\quad NC_{2} \le 1$$
(46)
$$1.2\exp \left( { - 06} \right) \le {\text{KL DIV}} \le 1.7{\text{exp}}\left( { - 05} \right)$$
(47)
$$3.2\exp \left( { - 07} \right) \le JS DIV \le 2.6{\text{exp}}\left( { - 06} \right)$$
(48)
$$0 \le BER \le 0.6$$
(49)

Several attacks are considered for watermarked image to calculate the optimal strength factor using MRFO. Steps followed during MRFO to obtain strength factor are described below.

  1. 1.

    Initialize the somersault factor (S), total number of population (\(N_{pop}\)), maximum number of iteration (\(iter_{max}\)).

  2. 2.

    Define the objective function of optimization problem and range of variables.

  3. 3.

    Randomly initialize Manta ray position and find best solution by calculating objective function.

  4. 4.

    Start the loop for \(i = 1:N_{pop}\), till the end.

  5. 5.

    Estimate the fitness value and update the Manta ray position according to it.

  6. 6.

    If \(Rand > 0.5\), cyclone foraging strategy is performed.

    If \(\frac{iter}{{iter_{max} }} < Rand\), update the Manta ray position according to Eq. (11)

    else update the Manta ray position according to Eq. (8)

  7. 7.

    If \(Rand < 0.5\), chain foraging strategy is applied and Manta ray position is updated according to Eq. (7)

  8. 8.

    Calculate the objective function and update the best position obtained so far.

  9. 9.

    Perform somersault foraging and update the position according to Eq. (12).

  10. 10.

    If stopping criteria is satisfied, select the best solution among all; otherwise, repeat steps (5)–(10).

In the proposed scheme, strength factor is calculated by considering \(N_{pop} = 10\), \(iter_{max} = 50\), S = 2, and lower and upper bound as according to Eqs. (45)–(49). Flowchart of the MRFO to obtain an optimized scaling factor for proposed scheme is shown in Fig. 3.

Fig. 3
figure 3

Flowchart of MRFO to obtain an optimized scaling factor for the proposed scheme

4 Quality Metrics

To evaluate the performance of proposed technique, quality metrics used here are PSNR, SSIM, NC, BER and two new imperceptibility parameters KL DIV, JS DIV. PSNR, SSIM, KL DIV and JS DIV are used to measure imperceptibility, whereas NC and BER are used to evaluate robustness of proposed algorithm. Invisibility of an embedded watermark in watermarked image is known as imperceptibility. Embedded watermark must be invisible so that human eye cannot distinguish between cover image and watermarked image. Different parameters to assess imperceptibility of watermarking schemes are available in the literature. Robustness is defined as the resistance against attacks or modifications.

PSNR: one of the most common parameters to evaluate imperceptibility is PSNR. It is calculated between cover image and watermarked image. Mathematically, PSNR can be expressed as given by Eq. (50) and is calculated in decibel:

$$PSNR\left( {cov\_img,wmarked\_img} \right) = 10 \times log_{10} \left[ {\frac{{3 \times 255^{2} }}{{mse_{R} + mse_{G} + mse_{B} }}} \right]$$
(50)

where \(mse\) is mean square error and is calculated using Eq. (51) between watermarked image and cover image. The width and height of both images are denoted by \(M\) and \(N\):

$$mse\left( {cov\_img,wmarked\_img} \right) = \frac{1}{M \times N}\mathop \sum \limits_{x = 1}^{M} \mathop \sum \limits_{y = 1}^{N} \left( {cov\_img - wmarked\_img} \right)^{2}$$
(51)

SSIM: it is a metric for comparing the similarity of two images. Instead of focusing on a pixel-by-pixel difference, SSIM aims to evaluate the structural similarity between the two images. It is expressed as Eq. (52):

$$SSIM = \frac{{\left( {2\mu_{cov\_img} \mu_{wmarked\_img} + C_{1} } \right)\left( {2\sigma_{cov\_img,wmarked\_img} + C_{2} } \right)}}{{\left( {\mu_{cov\_img}^{2} + \mu_{wmarked\_img}^{2} + C_{1} } \right)\left( {\sigma_{cov\_img}^{2} + \sigma_{wmarked\_img}^{2} + C_{2} } \right)}}$$
(52)

where \(\mu_{cov\_img}\) is average of cover image, \(\mu_{wmarked\_img}\) is average of watermarked image, \(\sigma_{cov\_img,wmarked\_img}\) is covariance of watermarked image and cover image, \(\sigma_{cov\_img}^{2}\) is variance of cover image, \(\sigma_{wmarked\_img}^{2}\) is variance of watermarked image, and \(C_{1}\) and \(C_{2}\) are constants.

KL DIV: the distance between the cover and watermarked signal’s histograms is calculated using KL divergence. It can be calculated using Eq. (53):

$$KL Div\left( {cover, watermarked} \right) = \smallint p_{watermarked} \left( x \right)log\frac{{p_{watermarked} \left( x \right)}}{{p_{cover} \left( x \right)}}dx$$
(53)

where \(p_{watermarked}\) and \(p_{cover}\) are probability of watermarked signal and cover signal respectively [13].

JS DIV: by extending KL divergence, JS divergence determines a symmetrical score and distance between two probability distributions. Mathematically, it can be expressed as Eq. (54):

$$JS Div\left( {x,y} \right) = \frac{1}{2}KL Div\left( {x,p} \right) + \frac{1}{2}KL Div\left( {p,y} \right)$$
(54)

where \(p = \frac{1}{2} \times \left( {x + y} \right).\)

To evaluate robustness of watermarking technique, parameters NC and BER are utilized. NC and BER are calculated between original watermark and extracted watermark.

NC: the correlation between the extracted watermark image and the original watermark image is measured by NC. The NC value ranges from -1 to 1. If the extracted watermark image is nearly identical to the original watermark image, the correlation value will be close to 1, whereas a correlation value of -1 indicates that the extracted watermark image is negative to the original watermark image. NC is given by Eq. (55):

$$NC = \frac{{\mathop \sum \nolimits_{x = 1}^{M} \mathop \sum \nolimits_{y = 1}^{N} \left( {wmark - \mu_{wmark} } \right) \times \left( {ext\_wmark - \mu_{ext\_wmark} } \right)}}{{\sqrt {\mathop \sum \nolimits_{x = 1}^{M} \mathop \sum \nolimits_{y = 1}^{N} \left( {wmark - \mu_{wmark} } \right)^{2} } \times \sqrt {\mathop \sum \nolimits_{x = 1}^{M} \mathop \sum \nolimits_{y = 1}^{N} \left( {ext\_wmark - \mu_{ext\_wmark} } \right)^{2} } }}$$
(55)

where \(\mu_{wmark}\) is the mean of original watermark and \(\mu_{ext\_wmark}\) is the mean of extracted watermark.

BER: BER is the ratio of number of error bits to the total number of transmitted bits. Mathematically, it can be expressed as Eq. (56):

$$BER = \frac{Number \,of\, error\, bits}{{Total \,number\, of \,transmitted\, bits}}$$
(56)

5 Simulation Results and Discussion

Evaluation of proposed scheme is performed using MATLAB software. Performance of proposed technique is evaluated using various test images of size 512 × 512 which includes medical and non-medical images. Medical images include Brain CT Scan, Fundus, Ultrasound and X-Ray. Non-medical images include Airplane, Barbara, Goldhill, Mandrill, Pepper, Sailboat and Zelda images. MNNIT logo and MNNIT text watermark grayscale images of size 512 × 512 are used as watermarks. Before embedding, both watermarks are encrypted using Henon mapping and these encrypted images are then embedded in cover image. NC values are calculated for both extracted watermarks, while BER is measured only for text watermark. Imperceptibility analysis, robustness analysis along with capacity analysis, computational complexity and security analysis of proposed technique is discussed below. Simulation results of presented scheme are also compared with some existing state-of-the-art schemes.

5.1 Imperceptibility Analysis

To measure the imperceptibility of proposed method, parameters PSNR, SSIM, KL DIV and JS DIV are utilized. Table 2 shows the corresponding cover images with watermarked images and extracted watermarks. PSNR, SSIM, NC for all twelve test images under no attack are shown in Table 2. If PSNR and SSIM values are more than 30 dB and 0.90, respectively, the watermarking approach is considered to have better imperceptibly [18]. It is clear from Table 2 that proposed scheme attains PSNR above 60 dB for all cover images and SSIM above 0.99 which shows the presented technique provides better imperceptibility in terms of PSNR and SSIM. KL DIV and JS DIV are listed in Tables 4 and 5 for eight test images. Minimum KL DIV value of 2.57 × \(10^{ - 6}\) and minimum JS DIV value of 6.42 × \(10^{ - 7}\) are achieved for Barbara image without attacks. NC values for all extracted watermarks are above 0.99 without attacks which show that the extracted watermarks and original watermarks are almost similar. Lowest attained BER value is 0.59% for Goldhill image, and highest BER value is 0.61 for ultrasound 1 image under no attacks.

Table 2 Watermarked images with corresponding PSNR and SSIM values and their respective extracted watermarks with NC values under no attack

5.2 Robustness Analysis

To assess the robustness of proposed scheme, various noise attacks, filtering attacks, geometric attacks are applied on all test images. Twenty-two attacks are utilized for robustness analysis such as Gaussian noise (var = 0.01), salt and pepper noise (0.01), speckle noise (var = 0.01), median filter (3 × 3), Gaussian low-pass filter {(3 × 3), (5 × 5)}, average filter {(3 × 3), (5 × 5)}, Poisson noise, rotation (30°, 60°), horizontal flipping, vertical flipping, histogram equalization, JPEG compression (QF = 10, 50, 90), JPEG 2000 (CR = 12), sharpening, shearing, motion blur and Gamma correction. Attacked watermarked images and its corresponding watermarks are shown only for Barbara image. Table 3 shows the Barbara image when subjected to different attacks and its corresponding extracted watermarks. It is evident from Table 3 that proposed scheme is able to withstand various attacks and embedded watermarks are extracted successfully.

Table 3 Barbara image and corresponding extracted watermarks under various attacks

Imperceptibility and robustness analysis considered under different noises and attacks are shown in Figs. 4, 5, 6, 7, 8, 9, 10 and 11 for all cover images. PSNR of all cover images is calculated by considering different attacks and shown in Figs. 4, 5, 6 and 7. It is clear from these figures that PSNR value is above 25 dB under most of the attacks such as median filter, salt and pepper noise, Gaussian noise, Poisson noise, speckle noise, Gaussian low-pass filter, average filter, sharpening, JPEG compression and Gamma correction.

Fig. 4
figure 4

PSNR of Barbara, Brain CT Scan, Fundus and Goldhill images subjected to different attacks

Fig. 5
figure 5

PSNR values under various attacks for Barbara, Brain CT Scan, Fundus and Goldhill images

Fig. 6
figure 6

Values of PSNR for different cover images under various attacks

Fig. 7
figure 7

Ultrasound, X-ray and Zelda cover image’s PSNR values

Fig. 8
figure 8

SSIM of Barbara, Brain CT Scan, Fundus and Goldhill images subjected to different attacks

Fig. 9
figure 9

SSIM values under various attacks for Barbara, Brain CT Scan, Fundus and Goldhill images

Fig. 10
figure 10

Values of SSIM for different cover images under various attacks

Fig. 11
figure 11

Ultrasound, X-ray and Zelda cover image’s SSIM values

For filter attacks, maximum attained PSNR value is 51.89 dB for Fundus image under Gaussian low-pass filter (3 × 3) and minimum value of PSNR 26.40 dB for Barbara image under average filter (5 × 5) attack. In case of noise attacks, highest obtained PSNR value is 61.43 dB for Ultrasound 1 image under Poisson noise and lowest value is 24.32 dB of Zelda image under speckle noise. Under several attacks, SSIM values for all cover images are shown in Figs. 8, 9, 10, 11. Performance of proposed scheme attains SSIM value above 0.85 under most of attacks except few attacks. In case of filter attacks, SSIM value 0.9989 is highest for Brain CT Scan image under Gaussian low-pass filter and SSIM value 0.7284 for Barbara image under average filter. Considering various attacks, KL DIV and JS DIV are calculated for Barbara, Brain CT Scan, Fundus and Goldhill cover images which are tabulated in Table 4. Smaller the value of KL DIV and JS DIV, better is the imperceptibility of scheme. For cover images Ultrasound 1, Ultrasound 2, X-ray and Zelda, KL DIV and JS DIV are presented in Table 5. It is clear from the values of KL DIV and JS DIV calculated under several attacks which are very small, and it infers that proposed scheme performs well in terms of imperceptibility.

Table 4 KL DIV and JS DIV calculated value for Barbara, Brain CT Scan, Fundus and Goldhill cover images under several attacks
Table 5 KL DIV and JS DIV calculated value for Ultrasound, X-ray and Zelda cover images under several attacks

NC values are calculated for both the extracted watermarks, while BER is calculated only for text image watermark and expressed in percentage. NC and BER for all cover images are calculated and presented in Tables 6 and 7. For noise attacks, highest NC value is 0.9999 under Poisson noise for most of the images and lowest NC value is 0.9990 for Zelda test image under speckle noise with variance = 0.01. Lowest BER value 0.59% is achieved for Goldhill image under speckle noise. In case of filtering operations, lowest NC value is 0.9963 for Ultrasound 1 image under average filter (5 × 5) operation and highest NC value of 0.9999 is achieved for first watermark under median and Gaussian LPF for most of the test images. Lowest BER value of 0.72% is obtained for Fundus image under Gaussian LPF (3 × 3) operation.

Table 6 NC and BER values for Barbara, Brain CT Scan, Fundus and Goldhill cover images under several attacks
Table 7 NC and BER values for Pepper, Sailboat and Ultrasound 1 cover images under several attacks

When test images are subjected to geometric attacks, minimum NC value of 0.9983 is obtained for Ultrasound 1 image under rotation (60°) attack and maximum NC value of 0.9999 is achieved under flipping attacks for most of the test images. BER value of 0.60% is lowest for X-ray image under shearing attack. In case of image processing operations, lowest NC value of 0.9957 for ultrasound 1 image under motion blur (45, 45) operation is attained. Highest NC value of 0.9999 is achieved under JPEG compression operation for most of the images. Lowest BER value of 0.34% is attained for Fundus image under histogram equalization operation.

It is clear from Tables 6 and 7 that NC values under different attacks for all cover images are above 0.99, which shows the proposed scheme performs satisfactory in terms of robustness. BER for most of the test images under various attacks is below 1.5% which shows the proposed scheme withstand attacks without degrading the quality of extracted text image watermark.

5.3 Embedding Capacity Analysis

Main advantage of RDWT is that the size after decomposing the image at various levels does not change. After three-level RDWT, the size of the third-level sub-band for the 512 × 512 host image remains the same, and the third-level sub-band of the host image is used for watermark embedding. Watermark image size remains same as 512 × 512 after applying 1-level RDWT in the embedding procedure. The ratio of total number of pixels of watermark to the total number of cover image’s pixel is defined as the capacity of watermarking scheme.

Thus, the capacity of proposed scheme is \(\frac{512 \times 512}{{512 \times 512}} = 1\), which shows the technique has high capacity. Embedding capacity comparison of proposed scheme with related works is presented in Table 14.

5.4 Computational Complexity Analysis

Computational complexity is analyzed in terms of execution time and is expressed in seconds. Embedding time including encryption in proposed schemes takes 1.3985 s, while extraction time including decryption takes 0.6653 s. Thus, total execution time for proposed scheme is 2.0638 s. Comparison of computational complexity of proposed scheme with existing works is listed in Table 15. It is clear from comparison that proposed scheme is computationally efficient.

Performance of proposed technique is also assessed by optimizing the strength factor using particle swarm optimization (PSO) technique [19], and parameter values for different cover images under no attacks are listed in Table 8. Strength factor is calculated by using objective function expressed in Eq. (44). Maximum PSNR value of 60.36 dB is obtained for Brain CT Scan image, and minimum value of 58.21 dB is attained for Goldhill image. Highest SSIM is 0.9999 for Mandrill and Ultrasound 1 image. NC value is 0.9999 for first watermark, while in case of second watermark, NC is 0.9998. Graphical comparison of PSNR values obtained using MRFO and PSO technique is shown in Fig. 12. It is clear from Fig. 12 that MRFO technique provides better PSNR values in comparison with PSO for different images.

Table 8 Performance of proposed technique for different images under no attacks by utilizing PSO technique
Fig. 12
figure 12

Comparison of PSNR values for different images using PSO and MRFO

5.5 Security Analysis

Henon map is used to enhance the security of proposed technique. Henon attractor is referred as the collection of all points for which the iterations of each point in a particular quadrilateral encircle the Henon attractor. Given that its formulas mentioned in Eq. (6) have a maximum power of 2, it is an illustration of a quadratic strange attractor. The nonlinearity and dissipation are controlled by the parameters ‘a’ and ‘b’. Henon attractor is shown in Fig. 13 for control parameter values a = 1.4 and b = 0.34. Security analysis of proposed scheme is evaluated in terms of Lyapunov exponent (LE) [9] and correlation coefficient (CC). The LE and CC is a well-known metric for quantifying the chaotic behavior of dynamical systems. The LE calculates how much two closely spaced trajectories diverge from one another. A positive LE denotes a system’s excessive sensitivity to initial conditions and chaotic motion, whereas a negative LE denotes a system’s stability and non-chaotic motion. Mathematically, LE is expressed as Eq. (57):

$$LE = \mathop {\lim }\limits_{p \to \infty } \frac{1}{p}\mathop \sum \limits_{i = 1}^{p - 1} {\text{ln}}\left| {f\left( {x_{i} } \right)} \right|$$
(57)

where \(f\) is Henon map. The LE values of Henon map for different images with a = 1, b = 1 and a = 1.4, b = 0.34 are listed in Table 9. Maximum LE is obtained for Ultrasound 2 with LE1 = 8.92, LE2 = 12.63.

Fig. 13
figure 13

Henon attractor for control parameter value a = 1.4, b = 0.34

Table 9 LE values for different images using Henon map encryption

The CC measures the distance between two chaotic sequences that are produced from the chaotic map under slightly varied initial conditions and system characteristics. It is expressed as Eq. (58):

$$CC\left( {P,Q} \right) = \frac{{E\left[ {\left( {P - \mu_{P} } \right)\left( {Q - \mu_{Q} } \right)} \right]}}{{\sigma_{P} \sigma_{Q} }}$$
(58)

\(\mu_{P}\) and \(\mu_{Q}\) are the mean of chaotic sequences P and Q, \(\sigma_{P}\) and \(\sigma_{Q}\) are the standard deviation of P and Q, respectively. Two chaotic sequences are said to be close to one another, if CC values are close to ‘1’ and sequences are entirely different, if CC values are close to ‘0’. CC values for different images with a = 1, b = 1 and a = 1.4, b = 0.34 are listed in Table 10. It is evident from Table 10 that CC values are very close to ‘0’ for parameter values a = 1.4, b = 0.34. Thus, the proposed technique provides enhanced security for a = 1.4, b = 0.34.

Table 10 CC values of Henon map with varying parameter values of a and b for different images

6 Comparison with Existing Techniques

Performance of suggested method is compared with some recent state-of-the-art watermarking techniques presented in [15, 18, 23,24,25, 28, 31, 38,39,40]. Table 11 presents the PSNR, SSIM and NC comparison for Airplane, Mandrill, Pepper and Sailboat images without attacks. Comparison is shown for those images which are common in all techniques. It is clear from Table 11 that proposed method performs better in terms of imperceptibility. Average percentage improvement is 13.76% for PSNR when compared with existing mentioned techniques. For NC without attacks, average percentage improvement is 4.3% in case of non-medical images. Under no attacks, PSNR and SSIM values comparison of medical image is listed in Table 12. For medical image, average percentage improvement is 41.35% in terms of PSNR. Robustness comparison of proposed method with other methods for medical and non-medical images is tabulated in Tables 13 and 16, respectively. NC value comparison is shown for those attacks only which are common in existing methods. Dash is shown for those attacks or cover images where analysis is not reported. From Tables 13 and 16, it is clear that obtained NC values are 0.99 for proposed technique when subjected to various attacks. Average percentage improvement is 0.62% for medical image in terms of NC when no attack is applied. From robustness comparison, it is depicted that proposed method performs better when subjected to various attacks.

Table 11 Comparison of PSNR, SSIM and NC values of proposed scheme with some existing techniques for non-medical images
Table 12 Comparison of imperceptibility analysis for medical image with related works
Table 13 Robustness comparison of proposed scheme with state-of-the-art schemes for medical image in terms of NC

Embedding capacity of proposed technique is compared with embedding capacity of state-of-the-art techniques and is presented in Table 14. Proposed scheme utilized RDWT and dual watermarks for embedding, and hence, embedding capacity of ‘1’ is achieved. Existing schemes achieve capacity near about 0.25. So, it can be concluded that proposed scheme provides higher embedding capacity as compared with existing techniques.

Table 14 Comparison of embedding capacity with existing schemes

Computational complexity of proposed scheme is listed in Table 15 along with complexity of existing schemes mentioned in [24, 25, 40]. Embedding time shown here also includes the encryption time and is expressed in seconds. Extraction time includes the decryption time and is shown in table. Scheme mentioned in [24] takes 14.8116 s for execution, while [40] takes 5.9894 s. Scheme [25] takes 2.0683 s during execution, while proposed scheme takes total 2.0638 s. It is evident from Table 15 that proposed scheme is computationally efficient as compared to existing schemes (Table 16).

Table 15 Computational complexity comparison in terms of total execution time with related techniques
Table 16 Robustness comparison of proposed method with state-of-the-art watermarking techniques for non-medical images in terms of NC values subjected to several attacks

7 Conclusion

In this paper, an optimized dual image watermarking based on RDWT-RSVD using MRFO technique with Henon mapping is proposed. Dual watermarks are utilized for embedding to enhance capacity and security of proposed technique. Luminance component of YCbCr color space is used for embedding. To achieve a balance among robustness, capacity and imperceptibility, an optimum strength factor is chosen by MRFO technique. Additionally, the proposed technique further enhances the security by encrypting dual watermarks before embedding using Henon map. Extensive experiments are performed on various medical and non-medical images demonstrating that proposed technique provides superiority when compared with existing schemes in terms of embedding capacity, imperceptibility and robustness. Performance of proposed technique is also evaluated by obtaining optimized strength factor using PSO. The proposed scheme is computationally efficient as compared to state-of-the-art schemes. Average PSNR value for 100 images is 60.57 dB with SSIM value of 0.9998 using MRFO, while using PSO, average PSNR value of 58.56 dB is obtained with SSIM value of 0.9997. Overall results show that MRFO performs better in comparison with PSO. In future, machine learning techniques can be applied to optimize scaling factor which can further enhance the performance of proposed watermarking scheme.