1 Introduction

In recent years, watermarking has become a very important part of multimedia communication through internet [11, 13, 14, 19, 2123, 34, 37, 39]. In the absence of copyright protection, anyone can misuse the copyright material available through internet from any corner of the world [21]. The watermarking technology has its own advantages with which it can provide such protection to multimedia data. According to working domains, watermarking schemes can be divided into two categories, i.e. spatial domain and frequency domain. Frequency domain watermarking scheme can provide better robustness and embedding capacity as compare to spatial domain watermarking schemes [13]. In this paper, a frequency domain watermarking technique is proposed. A good watermarking scheme should carry the security of copyright content with sufficient robustness against geometric, non-geometric and compression types of attacks [14]. Singular Value Decomposition (SVD) based watermarking techniques [13, 14] have good robustness but fail in protecting rightful ownership [22, 34, 37]. Based on Principle Components (PCs) and wavelet transform, several improved SVD based models have been proposed [11, 19, 23, 39]. PC based watermarking techniques [11] provide assurance for rightful ownership but are very sensitive to any attack [21]. Thus, in the presence of attacks, robustness of such techniques becomes poor. In this technique, the scalar scale factor is not sufficient because of higher sensitivity of PCs against noise attacks and, therefore, each and every pixels of watermark image need individual scale factor. The scale factor required in this technique is two dimensional (2D) with same size as watermark image. Tuning of the scale factor matrix can be performed by using various optimization techniques such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and Differential Evolution (DE) [2, 8, 12, 21, 29, 31]. This scale factor is used to embed the PCs into the cover image to improve the robustness of the algorithm. Although the watermarking scheme based on combination of PCs and optimization technique are able to fulfill the requirements of good watermarking algorithms like robustness and rightful ownership, most of these optimization techniques are iterative in nature and require several iterations to obtain the optimum value of scale factor matrix. As a result, these iterative techniques require large computation time [21].

Candes and Donoho have given the Compressive sensing (CS) algorithm [3, 5], which becomes the breakthrough in sampling technique based on Nyquist theorem [25]. CS based watermarking algorithm is used for temper detection in [27] whereas this algorithm is applied to increase robustness with reduced set of measurements of watermark image in [18]. CS based technique has many desirable features like less computational complexity, security and robustness [32, 36, 38]. The computationally efficient CS based watermarking technique with different scrambling algorithm is implemented in [7, 28, 38]. Performance of CS based watermarking technique under additive white Gaussian noise and impulsive noise attack is mentioned in [35]. Better robustness and rightful ownership of CS based watermarking algorithm is presented in [6]. The watermarking for biometric data protection with CS is implemented in [25]. Double encrypted digital watermarking against Gaussian and shearing attacks is proposed in [15] with two layer security. It is mentioned in [1] that, the non-blind watermarking scheme is more robust than blind watermarking scheme and required in applications such as automated search of original media.

From the above discussion it is clear that the CS based watermarking technique can reduce computational complexity and increase robustness of algorithm. Thus, in this paper, a CS based non-blind watermarking algorithm is proposed which focuses on robustness, computational complexity reduction and rightful ownership with multiple levels of security.

Literature depicts that, better robustness and rightful ownership is offered by combination of PCs and optimization technique like PSO or GA based algorithm [8, 12, 21, 29, 31]. But these algorithms provide only single level of security with large execution time burden due to scale factor matrix. To overcome the time burden in algorithms [10, 21, 24], lesser number of iterations have been chosen which may not always allow to reach to the global solution. So, their proposed scheme may not give better response in terms of robustness and imperceptibility. Therefore, to remove the drawbacks of PSO or GA based watermarking algorithm, a novel CS-PCs based technique is proposed in this paper. In this algorithm, CS is applied on PCs of watermark image to generate the CS measurements. Singular values of CS measurements modify the singular values of HL subband of cover image to obtain watermarked image. Proposed CS-PCs (CS measurement of PCs) based scheme offers state of-the-art results in terms of execution time of watermarking algorithm, security and robustness. Moreover, use of scalar scale factor without any requirement of its optimization reduces the computational complexity of algorithm. In proposed algorithm CS is applied on the PCs of the watermark image which are to be embedded inside the cover image. In the proposed CS based algorithm, Gaussian random matrix Ф with circular shaped kernel [16] is applied on the PCs of watermark image to get linear CS measurements. These CS measurements can resist geometrical attacks.

The effectiveness of algorithm is also analyzed with cover images containing either more low frequency or more high frequency components. As the Orthogonal Matching Pursuit (OMP) algorithm is fast [25] as compared to recovery algorithms like l1 minimization, it is used in this paper to recover the PCs from its CS measurements.

In [5], Brannock et al. found that while watermarking with non-colored watermark image, the simpler wavelet transform like Haar performs better. In this paper, the performance analysis of proposed watermarking technique with orthogonal and biorthogonal wavelets including Haar transform is carried out. Analysis shows that, the effectiveness of wavelet family does not depend on the type of watermark but depends on the wavelet transform that is used in the watermarking scheme. In the proposed algorithm, study shows that in addition to the Haar wavelet other wavelet families also perform better for non-colored watermarks. Moreover, the performance also varies with change in type of cover image and different group of attacks.

The remaining paper is organized as follows: In section 2, a brief preliminary on compressive sensing (CS), singular value decomposition (SVD) with PCs and wavelet transform is presented. The security aspect of proposed algorithm is given in section 3. Section 4 contains the implementation of CS-PCs based proposed algorithm with a variety of cover images and its performance is tested in the presence of checkmark attacks. Moreover the experiment also includes execution time analysis with different wavelet family. The result and discussion for robustness, computational complexity and performance under various noise attacks are given in section 5. Finally the conclusions are mentioned in section 6.

2 Preliminaries

2.1 Compressive sensing

A signal x in R N can be defined in terms of basis vectors with dimension N × 1. It can become sparse signal when only k entries of x are non-zero, where k < M and M < < N. The signal has k number of nonzero coefficients, so to remove this redundancy the x can be represented as

$$ S=\varphi x $$
(1)

where signal S is the column vector of weighed coefficients in the φ domain with dimension N × 1. φ is basis matrix having dimension N × N [3]. The sparse representation of data x can be defined by equation

$$ x={\varphi}^TS $$
(2)

The sampling of data in an unconventional way is known as compressive sensing, which is represented by the following equation [33]

$$ y=\Phi S $$
(3)

where Ф is known as the random measurement matrix having dimension M × N with M < < N and y is measurement vector with dimension M × 1.

The Eqs. (1) to (3) can be combined in following consolidated form

$$ y=\Phi S = \Phi \varphi x=Cx $$
(4)

where C = Фφ is the matrix with dimension M × N, φ is a matrix for creating sparse data set and matrix Ф is the random measurement matrix.

It is necessary for matrix Ф to satisfy restricted isometric property (RIP) with order k to recover signal x perfectly from M measurements which is given by following equation

$$ \left(1 - {\delta}_k\right){\left\Vert x\right\Vert}_2^2\ \le\ {\left\Vert \Phi \mathrm{x}\right\Vert}_2^2\le\ \left(1 + {\delta}_k\right){\left\Vert x\right\Vert}_2^2 $$
(5)

where δ k  ∈ (0, 1) and x ∈ ∑ k , where ∑ k  = {x : ‖x0 ≤ k}

To recover the signal from random measurements a greedy algorithm is used which is theoretically and empirically given by Tropp et al. [26]. This algorithm is known as orthogonal matching pursuit (OMP). As this algorithm is faster and simpler to implement, it is used in this paper for the recovery of sparse signal set from measurement vectors. The OMP is a technique to find the solution of least square problem which can be defined mathematically by the following equation

$$ \widehat{x}= argmi{n}_x{\left\Vert y-\Phi x\right\Vert}_2 $$
(6)

where \( \widehat{x} \) is the unique solution of least square problem which provides the recovery of signal from the random measurement vector y.

2.2 Discrete wavelet transform

The discrete wavelet transform (DWT) decompose the signal into different frequency subbands. In image processing algorithms, it is plays a vital role because its decomposition follows the anisotropic properties of human visual system (HVS) [4]. DWT offer multiple levels [12] of decomposition which gives freedom to embed data at desired position. DWT is mainly used in the watermarking schemes to increase its robustness. In watermarking, components of watermark can be embedded in selected subands of cover image in such a way that they can be protected from different kinds of noise attacks. The different wavelet filters are used to decompose the signal into different frequency subbands. Popular wavelet filters are Haar, Daubechies, Coiflet, Bior and Symlet. Wavelet filters can also classified with different properties like orthogonal, biorthogonal, symmetrical and asymmetrical. Various wavelet filters perform differently for any particular algorithm therefore, choosing suitable wavelet for various algorithms is an important research issue.

First-level wavelet decomposition of the image produces four different frequency subbands denoted by LL, LH, HL and HH. The subband LL contains the lower frequency information and remaining three contains the higher frequency information of the image. Further levels of LL subband decomposition produces more frequency subbands. The watermark image can be embedded in any of the frequency subband to get some desirable properties in the watermarking algorithm. The watermarks embed into the low frequency subband (LL) are robust in presence of various image processing attacks whereas embedding in high frequency subbands (HH) improves the perceptual quality of watermarked image. Use of intermediate frequency subbands (LH and HL) provides the tradeoff between perceptual quality of watermarked image and robustness against the range of attacks.

2.3 Singular value decomposition

In linear algebra, the singular value decomposition (SVD) is a tool which decomposes the input matrix into three matrices. The image is a matrix of pixel values which are non-negative [21]. If SVD is applied on image A with dimension M × N, the three generated matrices can be define by the following equation

$$ A= US{V}^T $$
(7)

In Eq. (7) the matrix S’ is a diagonal matrix with dimension M × N, which contains the singular values of image A along the diagonal and the other elements are zero. It is also known as the set of luminance values of image A. The matrix U with dimension M × M and matrix V with dimension N × N are orthogonal matrices, also known as left and right singular values respectively. Here U represents the horizontal and V represents the vertical detail of respective image [19, 21]. The matrix formulation of Eq. (7) is given as

$$ A=\left(\begin{array}{ccc}\hfill {U}_{1,1}\hfill & \hfill \cdots \hfill & \hfill {U}_{1,M}\hfill \\ {}\hfill {U}_{2,1}\hfill & \hfill \dots \hfill & \hfill {U}_{2,M}\hfill \\ {}\hfill \vdots \hfill & \hfill \ddots \hfill & \hfill \vdots \hfill \\ {}\hfill {U}_{M,1}\hfill & \hfill \cdots \hfill & \hfill {U}_{M,M,}\hfill \end{array}\right)\left(\begin{array}{ccc}\hfill {\sigma}_{1,1}\hfill & \hfill 0\hfill & \hfill 0\hfill \\ {}\hfill 0\hfill & \hfill {\sigma}_{2,2}\hfill & \hfill 0\hfill \\ {}\hfill \vdots \hfill & \hfill \ddots \hfill & \hfill \vdots \hfill \\ {}\hfill 0\hfill & \hfill \cdots \hfill & \hfill {\sigma}_{M,N}\hfill \end{array}\right){\left(\begin{array}{ccc}\hfill {V}_{1,1}\hfill & \hfill \cdots \hfill & \hfill {V}_{1,N}\hfill \\ {}\hfill {V}_{2,1}\hfill & \hfill \dots \hfill & \hfill {V}_{2,N}\hfill \\ {}\hfill \vdots \hfill & \hfill \ddots \hfill & \hfill \vdots \hfill \\ {}\hfill {V}_{N,1}\hfill & \hfill \cdots \hfill & \hfill {V}_{N,N}\hfill \end{array}\right)}^T $$

SVD is used in the watermarking due to its stability property which state that a large variation in the singular values does not occur if small perturbation is add inside the image. Moreover the properties of SVD such as invariance of non-zero singular values of a matrix under transformations like transpose, translation, flip and rotation make it more popular in various algorithms of image processing. The product of matrices US, in Eq. (7) is known as the principle components (PCs) of the image [11]. In proposed algorithm, CS is applied on PCs of watermark image to get more layers of security. These CS measurements of PCs of watermark are named as CS-PCs measurements of watermark.

3 Three layer security – an application scenario of proposed algorithm

In this paper, a robust and imperceptible watermarking algorithm is proposed which has three layers of security. This proposed scheme can be used for different applications. One such possible application scenario of proposed algorithm is given in Fig. 1 and described below.

Fig. 1
figure 1

Three layer security scheme for watermark data

User A is the super user who is having all the rights of watermark content with top secret Key 1 along with key 2 and 3. This user can extract the secret watermark data by these three keys using the data received from channel. In case if the super user A receives the malicious data, secret watermark data will not be detected. Therefore, this user sends a request to the transmitter for stopping the transmission. Super user can also distribute the rights of secret watermark data to different users in the local channel with different levels of securities. Users B, C, D and E can get the secret watermark data from super user A and extract it with respective rights. Suppose, any one of the user is not able extract the watermark due to malicious attack, the user sends request signal to the super user A for stopping the transmission towards that local channel. Here, as users B and E are having only the key 3, the super user A sends the secret watermark data extracted by key 1 and 2 to these users. The users C and D are having key 2 and 3, so the super user A transmit them a secret watermark data after extracting it by the top secret key 1. These users can further transmit secret watermark data after extracting it by key 2 to the users like F, G, H and I having the key 3 through other local channel. This user will not be able to extract the secret watermark data if there is any malicious attack. As a result of this, respective users send a request signal to the user C or D for stopping the transmission. Moreover, as no one from the authenticated group of users are having top secret key 1, so they cannot bypass the super user A for extracting the secret watermark data. If user J attacks the secret watermark data and tries to retransmit over the channel; then any authenticated user, on receiving it, may send a request to super user A for stopping the transmission.

4 Proposed method

The speed of internet is increasing rapidly as it has reached to fourth generation and beyond. Therefore, the watermarking algorithms based on time consuming optimization techniques may not be suitable in high-speed applications. To achieve better performance in terms of robustness and rightful ownership, the need for watermarking algorithms employing PCs and optimization technique has been highlighted in several recent literatures [21, 29]. Such techniques inherently suffer from the problem of time burden [10, 21, 24]. Moreover, the use of single layer of security in [10, 21, 24] may not be sufficient for smart malicious attacks. Thus, the main requirements for any fast watermarking scheme are less response time, more robustness and security.

The watermarking technique based on PCs (reliable SVD) protects rightful ownership and removes the false-positive problem of SVD based watermarking algorithms [11]. PCs embedded inside the cover image makes this technique less robust as they are sensitive to any attack which may largely change these values [21]. For this PCs based algorithm, lack of proper selection method for scale factor leads to poor robustness for smaller value of scale factor whereas the larger value of scale factor leads to poor imperceptibility [21]. Therefore, simultaneously better robustness and imperceptibility could not be achieved with PCs based watermarking algorithm alone. To solve this problem, many researchers have used 2D scale factor to embed the watermark inside the cover image which need optimization technique [21, 29]. These approach removes the problem of robustness in the PCs based watermarking algorithms, but require more execution time. The performance of algorithms [10, 21, 24], is limited as less number of iterations are selected to overcome the time burden.

The random sampling of the signal and sparsity are the popular approach for robustness enhancement [32]. As shown in [33], the random Gaussian matrix used in CS is capable of acquiring the information of the signal and the retrieval of clear signal is not possible without this sensing matrix. Also, it is mentioned in [36] that ‘Nowadays where security has prime significance the CS based cryptography systems are rigorously used’. Inspired by the existing works [32, 33, 36], in the proposed algorithm, CS is incorporated in the PCs based watermarking technique. This leads to better robustness and imperceptibility without increasing the execution time burden. It is demonstrated in [38] that compressive sensing can be used as a tool to achieve better robustness, imperceptibility and anti-attack capability in image watermarking algorithm. Moreover, two layer of security is achieved in image watermarking using CS measurements in [15]. Therefore to take the benefit of rightful ownership protection by PCs and to reduce execution time, CS is used with PCs in our proposed scheme. Here, the random measurement matrix is applied on the PCs of the watermark image to get linear measurements. These linear measurements carry the transformed PCs of watermark which are more robust as compared to original PCs. The singular values of these linear measurements are embedded inside the cover image which uses a scalar scale factor for any type of cover image or noise attack.

So, in the proposed algorithm CS is used with PCs which does not use any optimization technique to get suitable scale factor and hence it requires less execution time. Moreover, the use of CS not only increases the robustness of the watermarking scheme but also provides the rightful ownership protection. The conceptual diagram of proposed embedding algorithm is given in Fig. 2.

Fig. 2
figure 2

The conceptual diagram of proposed embedding algorithm

In this section, the embedding and extraction schemes of the proposed watermarking algorithm are described. Moreover, execution time and robustness analysis based on different wavelet families will be discussed in next section.

4.1 Watermark embedding process

The PCs, UwΣw of watermark image w is transformed to the domain of Random measurement matrix Ф and orthogonal matrix φ. As a result of this, linear CS measurement vector Y is generated. The singular value ΣwM of the CS measurement vector Y is embedded inside the HL subband of the cover image C, which is used to provide the three layers of security in watermarking scheme. Figure 3 shows the block diagram for the proposed embedding process and the mathematical steps for this scheme are as follows:

Fig. 3
figure 3

Block diagram of proposed watermark embedding technique

  1. Step 1:

    Apply the singular value decomposition on the watermark image w, to get the principle components.

    $$ w = {U}_w{\sum}_w{V}_w^{\prime } $$

    in above equation the matrix product (U w w ) is the PCs of the watermark image.

  2. Step 2:

    Apply DCT as an orthogonal transform on the PCs of the watermark image to get the sparse data set for compress sensing

    $$ S = \varphi \left({U}_w{\sum}_w\right)=DCT\left({U}_w{\sum}_w\right) $$
  3. Step 3:

    Apply Gaussian random matrix Ф on the sparse data set S of PCs of watermark image column wise, which is giving the measurement vector Y

    $$ Y=\varPhi (S) $$
  4. Step 4:

    Apply SVD on linear measurement vector Y, to generate the singular value of measurement vector Σ wM

    $$ Y={U}_{wM}{\sum}_{wM}{V}_{wM}^{\prime } $$
  5. Step 5:

    Apply first level of DWT on the cover image C, to get the four subbands (LL, LH, HL, HH). Apply SVD on the HL subband to get its singular values ∑ HL

    $$ {C}_{HL}={U}_{HL}{\sum}_{HL}{V}_{HL}^{\prime } $$
  6. Step 6:

    Modify the ∑ HL with ∑ wM to embed the watermark content in the cover image

    $$ \overline{\sum_{HL}}={\sum}_{HL}+\alpha \ast {\sum}_{wM} $$
  7. Step 7:

    Apply inverse SVD to get the modified subband HL of cover image

    $$ {U}_{HL}\overline{\sum_{HL}}{V}_{HL}^{\prime }={C}_{HL}^{\ast } $$
  8. Step 8:

    Apply inverse wavelet transform with modified wavelet subband HL to get the watermarked image C*

4.2 Checkmark attacks

Unique checkmark attacks are used to achieve uniform performance comparison of various watermarking algorithms. Therefore, in this paper, unique checkmark attacks based on stirmark benchmark [20] are used. These attacks are divided in different categories like Denoising, geometrical, watermark copy, compression and de-synchronization.

Checkmark attacks like geometrical, non-geometrical and compression are applied on watermarked images. These noisy watermarked images at the receiving end are checked using security keys by user at various stages. After successful authentication, the copyright watermark is available to authorized user. The steps for the proposed extraction process are discussed in the following sub section.

4.3 Watermark extraction process

To recover the watermark from noisy watermarked image the orthogonal matrices of linear measurement vector, random measurement matrix and the right singular matrix of the watermark image are required. The OMP algorithm is used to recover the PCs from the linear measurement values. Figure 4 shows the block diagram for the proposed extraction process. The mathematical steps for this scheme are as follows:

Fig. 4
figure 4

Block diagram of proposed watermark extraction technique

  1. Step 1:

    Apply wavelet transform on the noisy watermarked image and generate the modified subband HL. Perform SVD decomposition on HL subband to generate the modified singular value as \( \overline{\sum_{HL}^{*}} \)

$$ {C}_{HL}^{\ast }={U}_{HL}^{\ast}\overline{\sum_{HL}^{\ast }}{V}_{HL}^{\prime \ast } $$
  1. Step 2:

    Recover the singular values ∑ wM of linear measurements of PCs of the watermark image using the modified singular value \( \overline{\sum_{HL}^{*}} \) as

$$ {\sum}_{wM}^{\ast }=\left(\overline{\sum_{HL}^{\ast }}-{\sum}_{HL}\right)/\alpha $$
  1. Step 3:

    Generate the linear measurement vector Y using the right and left singular matrices, U wM   and V wM (security key-1) along with recovered singular matrix Σ* wM

$$ {U}_{wM}{\sum}_{wM}^{*}{V}_{wM}^{\prime }=Y $$
  1. Step 4:

    The measurement matrix, Ф which is used as security key-2 and recovered Y reproduce the sparse data set S of the PCs column wise with the help of OMP algorithm. Further apply inverse DCT on sparse dataset S to generate PCs of watermark image

$$ \begin{array}{l}S = OMP\ \left(\varPhi, Y\right)\\ {}{U}_W^{*}{\sum}_w^{*} = \mathrm{IDCT}\ (S)\end{array} $$
  1. Step 5:

    Apply inverse SVD on recovered PCs and right singular matrix V w, (security key-3) to extract the watermark image w*

$$ {U}_w^{\ast }{\sum}_w^{\ast }\ {V}_w^{\prime }={w}^{\ast } $$

5 Experimental results and discussion

The experimental results for the CS-PCs based watermarking algorithm along with test images and performance measures are discussed in this section. The characteristic of various types of cover image and watermark image is discussed in subsection 5.1. The performance measures like MSE, PSNR and NC are explained in subsection 5.2. In subsection 5.3, the robustness and perceptual quality of the proposed scheme with Haar wavelet in the presence of variety of checkmark attacks is presented. The effect of using symmetric, asymmetric, orthogonal and non orthogonal wavelets on the robustness of extracted watermark is discussed in subsection 5.4. Comparison of execution time of algorithm with different wavelets in the presence of variety of noise attacks, and its suitability with video standard H.264 is presented in subsection 5.5. The robustness of proposed algorithm is compared with the PSO based watermarking scheme in subsection 5.6.

5.1 Cover and watermark images

The performance of any watermarking algorithm may vary with the different types of input images. Therefore in this paper, the algorithm is tested for two different types of cover images. Cameraman image contains majority of low frequency components whereas Goldhill image contains high frequency components. Moreover, the analysis is also carried out with different noise attacks and wavelet families on different types of cover images.

In Fig. 5, Cameraman and Goldhill cover images having dimension 512 × 512 and Peppers watermark image with dimension 256 × 256 are shown. Use of peppers image as a watermark along with different types of cover images shows the performance of proposed algorithm under the mixture of different frequency components in the watermark image.

Fig. 5
figure 5

The cover images (a) Cameraman which has low frequency majority contents (b) Goldhill which has high frequency majority contents, and the watermark image (c) Peppers which has nearly equal low and high frequency contents

5.2 Performance measures

The normalized correlation (NC) is the parameter which measures the similarity between original watermark image (w) and extracted watermark image w*. Mathematical formula [21] of NC is given in Eq. (8).

$$ NC=\frac{{\displaystyle {\sum}_{i=1}^N}{\displaystyle {\sum}_{j=1}^N}\left({w}_{ij}-\overline{w}\right)\left({w}_{ij}^{*}-{\overline{w}}^{*}\right)}{\sqrt{{\displaystyle {\sum}_{i=1}^N}{\displaystyle {\sum}_{j=1}^N}{\left({w}_{ij}-\overline{w}\right)}^2}\ \sqrt{{\displaystyle {\sum}_{i=1}^N}{\displaystyle {\sum}_{j=1}^N}{\left({w}_{ij}^{*}-{\overline{w}}^{*}\right)}^2}} $$
(8)

where, \( \overline{w}=\frac{1}{N^2}{\displaystyle {\sum}_{i=1}^N{\displaystyle {\sum}_{j=1}^N{w}_{ij}}} \) and \( {\overline{w}}^{*}=\frac{1}{N^2}{\displaystyle {\sum}_{i=1}^N{\displaystyle {\sum}_{j=1}^N{w}_{ij}^{*}}} \)

The value of NC lies in between 0 and 1. The NC = 1 shows that the extracted watermark is exactly equal to the original watermark. The imperceptibility of watermarked image is evaluated by peak signal-to-noise ratio (PSNR) given in equation below

$$ PSNR=10\ { \log}_{10}\frac{255^2}{MSE} $$
(9)

where mean square error (MSE) is defined as

$$ MSE = \frac{1}{M^2}{\displaystyle {\sum}_{i=1}^M{\displaystyle {\sum}_{j=1}^M{\left[H\left(i,j\right)-{H}^{*}\left(i,j\right)\right]}^2}} $$

where the H and H* are the original cover image and watermarked image.

5.3 Robustness and perceptual quality analysis with copyright verification

The CS-PCs measurements of watermark image are embedded inside the HL subband of Haar wavelet transform applied on cover image. To check the robustness of watermarking algorithms the standard benchmark attacks known as checkmark attacks [20] are used. These attacks are applied on the watermarked image to verify the versatility of the algorithm against various categories of noise like geometric, non-geometric and JPEG compression.

The non-geometric group of checkmark attacks applied on watermarked image and respective robustness offered by the proposed algorithm is mentioned in Tables 1 and 2.

Table 1 The attack analysis of proposed algorithm (with Haar wavelet) for different values of scale factor with Median filtering and Gaussian filtering in terms of NC values of extracted watermark and execution time T1 and T2
Table 2 The attack analysis of proposed algorithm (with Haar wavelet) for different values of scale factor with Average filtering, sharpening and Histogram equalization in terms of NC values of extracted watermark and execution time

The attack analysis of proposed algorithm against median and Gaussian filtering attacks applied on the Cameraman and Goldhill watermarked images with different scale factors is tabulated in the Table 1. The execution time analysis of the algorithm will be discussed in subsection 5.4. In case of median filtering attack, increasing the size of window from 3 × 3 to 7 × 7, the robustness of algorithm also increases for cameraman cover image. In the influence of Gaussian filtering attack the algorithm performs well for both the types of cover images as NC values are above 0.9 for all scale factors. The robustness against sharpening, histogram equalization and average filtering attacks are mentioned in the Table 2. The NC is above 0.97 in case of sharpening attack for both the types of cover image. Unlike all other types of attacks the robustness against histogram equalization decreases as the value of scale factor increases.

The performance analysis of proposed algorithm against geometric attacks like Gaussian noise, salt & pepper noise, rotation, scaling and cropping is given in Tables 3 and 4.

Table 3 The attack analysis of proposed algorithm (with Haar wavelet) for different values of scale factor against Rotation and Gaussian noise in terms of NC values of extracted watermark and execution time
Table 4 The attack analysis of proposed algorithm (with Haar wavelet) for different values of scale factor with scaling, cropping and Salt & pepper in terms of NC values of extracted watermark and execution time

Robustness of algorithm is much better against the rotation attacks with various degrees like 0.25°, −0.25° and 0.2° as the NC values are above 0.9 for both the types of cover images which is given in Table 3. The correlation is above 0.8 for each of the cover image at most of the scale factors against the Gaussian noise attack with variance 0.01. The performance against scaling, cropping and salt & pepper noise attacks is shown in Table 4. With 25 % cropping on both the watermarked images, the proposed scheme is giving NC value above 0.95. In scaling, the dimension of watermarked image is reduced to half, i.e. from 512 × 512 to 256 × 256, the algorithm offered NC value above 0.81 with Cameraman as cover image and above 0.86 for Goldhill as cover image. Salt and pepper noise with noise density 0.01 the NC value obtained is above 0.8.

JPEG compression is used in many applications like video streaming, telemedicine and live conferences. Image quality requirement for various applications is different e. g. medical imaging requires high quality of image whereas high image quality is not needed for the applications such as video streaming or live conferences which can reduce the data rate or the transmission bandwidth. The proposed watermarking technique can also work well with variations of quality level of JPEG compression indicated in terms of quality factor. In this paper, the algorithm is tested with different quality factors which are varied from 10 to 90.

The proposed algorithm performs well for both high and low values of quality factors. Table 5 shows the performance of the algorithm under JPEG compression for the span of compression values in terms of various quality factors. High values of NC are obtained under high as well as low values of quality factors with Goldhill and cameraman cover images.

Table 5 The attack analysis of proposed algorithm (with Haar wavelet) for different values of scale factor with JPEG compression in terms of NC values of extracted watermark and execution time

To check the rightful ownership ability of proposed algorithm, SVD decomposition is applied on the watermark image to generate the orthogonal matrix V T. Inverse SVD is applied on this orthogonal matrix V T of claimed watermark and received PCs to extract the watermark image. Pepper is embedded in the cover image as the watermark image as shown in Fig. 6a which is the authentic watermark. If orthogonal matrix V T is generated with the same embedded watermark image then inverse SVD of its combination with the received PCs generate the watermark shown in Fig. 6b. If the Baboon image shown in Fig. 6c is used to generate the orthogonal matrix V T in place of authenticate watermark, the algorithm generates the imperceptible image as shown in Fig. 6d. The orthogonal matrix V T is used of Saturn image in Fig 6e, then the recovered image generated by the algorithm is given in Fig 6f. When any malicious person or systems tries to extract the watermark this kind of imperceptible image will be generated by proposed algorithm which indicates that the user is unauthorized.

Fig. 6
figure 6

Watermark images (a) Authenticate original watermark image pepper (b) Recovered watermark image pepper from orthogonal matrix of image a (c) baboon image (d) Imperceptible image display by the algorithm with the use of orthogonal matrix of image c (e) Saturn Image (f) Imperceptible image display by the algorithm with the use of orthogonal matrix of image e

5.4 Effect of wavelet families on robustness of proposed algorithm

In [5], different families of wavelet are used in watermarking algorithm where the watermark is embedded inside the HL and LH subbands of cover image. Here, the robustness of algorithm was compare with different wavelet filters like Haar, Daubechies, Bior, Symlets, coiflets, and reversible Bior for non-colored watermark images,. The analysis shows that the simpler wavelet like Haar wavelet transform outperform over any of the complicated wavelet transform.

In this paper, the robustness analysis of proposed algorithm is carried out with three wavelets Haar, Bior 6.8 and Symlet8. The Haar wavelet is asymmetric, orthogonal and biorthogonal. Robustness analysis with this wavelet is given in Tables 1, 2, 3, 4 and 5. For selected types of noise attacks, the experiment is carried out with bior6.8 which is symmetric and biorthogonal wavelet shown in Tables 6 and 7. The Symlet8 wavelet is near symmetric, orthogonal and biorthogonal for which the analysis is given in Tables 8 and 9.

Table 6 The attack analysis of proposed algorithm (with bior6.8 wavelet) for different values of scale factor with median filtering, JPEG compression and Gaussian noise in terms of NC values of extracted watermark and execution time
Table 7 The attack analysis of proposed algorithm (with bior6.8 wavelet) for different values of scale factor with Rotation in terms of NC values of extracted watermark and execution time
Table 8 The attack analysis of proposed algorithm (with symlet8 wavelet) for different values of scale factor with JPEG compression, Median filtering and Gaussian noise in terms of NC values of extracted watermark and execution time
Table 9 The attack analysis of proposed algorithm (with symlet8 wavelet) for different values of scale factor with Rotation in terms of NC values of extracted watermark and execution time

The quality of watermarked image is verified by calculating PSNR which is above 30 dB for both cover images. The PSNR is calculated for both types of cover images with different wavelets given in Table 10. The analysis shows that the value of PSNR is more than 31 dB for all the scale factors. The value of PSNR is larger for low frequency cover image (cameraman) as compared to high frequency cover image (Goldhill). The visual quality of watermarked image is there in Fig. 7.

Table 10 The PSNR value of watermarked images with different value of scale factor for Different wavelets
Fig. 7
figure 7

Watermarked images (a) Low frequency image Cameraman (b) High frequency image Goldhill

To compare the performance of proposed algorithm with different wavelet families, some attacks are chosen from the geometric, non-geometric and JPEG compression group. From geometric type of attacks, the rotation and Gaussian noise are selected. The median filtering with window size 3 × 3 and Gaussian noise with variance 0.01 are taken from non-geometric cluster of attack. For JPEG compression the quality factor Q = 30 is chosen. In Figs. 8, 9, 10 and 11 the graphical analysis is presented to compare the robustness of proposed algorithm for various wavelets families. In Fig. 8, the non-geometric median filtering attack is applied to verify the performance of different wavelets in which the Symlet8 wavelet outperforms over other wavelets for both the cover images. For JPEG compression attack (Q = 30), both the Bior6.8 and Symlet8 wavelets perform better as compare to Haar wavelet with Cameraman and Goldhill cover images which is shown in Fig. 9a and b respectively. In the presence of rotation geometric attack (0.25°) the robustness of algorithm improves gradually with increasing the value of scale factor with Haar wavelet for both the cover images shown in Fig. 10. In Fig. 11a it is shown that the Haar wavelet performs better as compared to other complex wavelets for cameraman cover image in presence of Gaussian attack (variance = 0.01) whereas for Goldhill cover image also the Haar wavelet performs better except for the scale factor 0.02. For Goldhill cover image, the performance with Bior6.8 and Symlet8 wavelets are close to Haar wavelet as shown in Fig. 11b.

Fig 8
figure 8

Effect of non-geometric Checkmark attack: Median Filter (3 × 3) applied to watermarked images generated with different wavelets such as Haar, Bior6.8 and Symlet8 applied on (a) Low frequency Cameraman Cover image and (b) High frequency Goldhill Cover image

Fig. 9
figure 9

Effect of JPEG compression (QF = 30) attack: applied to watermarked image generated with different wavelets such as Haar, Bior6.8 and Symlet8 applied on (a) Low frequency Cameraman Cover image and (b) High frequency Goldhill Cover image

Fig. 10
figure 10

Effect of geometric Checkmark Rotation (0.25°) attack: applied to watermarked image generated with different wavelets such as Haar, Bior6.8 and Symlet8 applied on (a) Low frequency Cameraman Cover image and (b) High frequency Goldhill Cover image

Fig 11
figure 11

Effect of Checkmark Gaussian noise (variance = 0.01) attack: applied to watermarked image generated with different wavelets such as Haar, Bior6.8 and Symlet8 applied on (a) Low frequency Cameraman Cover image and (b) High frequency Goldhill Cover image

The analysis shows that, the Haar wavelet is suitable against geometric type of noise attacks whereas Sym8 and Bior6.8 perform better against the non-geometric noise and JPEG compression types of attacks for different classes of cover images.

5.5 Execution time analysis of proposed scheme and comparison with existing methods

The execution time is an important parameter for any watermarking algorithm, particularly when it is used as a part of application like content identification and protection of video content, forensic, piracy deterrence and content filtering. The execution time can be divided into four parts post processing time, watermark embedding time, watermark extraction time and post processing time. The extraction and embedding time have prime importance because they are the part of a continuous process. In this paper, the time analysis is divided in two parts one part contains embedding and extraction time of algorithm whereas second part contain CS measurement generation and recovery time analysis. In [9], it is noted that the embedding time is 0.39 s and extraction time is 0.2496 s which is better than the algorithm proposed in [11] where these values are 1.0764 and 1.3884 s respectively.

In Tables 1, 2, 3, 4, 5, 6, 7, 8 and 9, the column “T1” shows the embedding and extraction time, whereas column “T2” shows the CS measurement generation and recovery time of proposed algorithm. The PSNR values for different watermarked image with different scale factors are given in Table 10. In Table 11, the average value of embedding and extraction time T1 of proposed algorithm is compared with existing methods [9, 11] which demonstrate that the algorithm is computationally efficient. In [17] the time analysis of fast watermarking scheme for H.264 video standard is given, in which the embedding and extraction time are 5.578 s and 5.448 s respectively with payload around 3 K bytes. These embedding and extraction time are much larger as compared to the proposed algorithm even with higher payload of around 6 K bytes. Moreover, the decoding time is 18.817 s for algorithm in [17] whereas this time with proposed algorithm is only 4 s. So, proposed scheme can become substitute of conventional fast watermarking scheme for video standard H.264 with better security.

Table 11 Computational time comparison among proposed and existing methods

As the execution time of proposed algorithm varies from one wavelet to other, the time analysis for the different wavelet filters in the presence of different kind of attacks are given in Figs. 12, 13, 14 and 15.

Fig. 12
figure 12

Embedding and extraction time comparison of proposed algorithm for low frequency Cameraman cover image against various attacks like Median filtering (non-geometric), JPEG compression, Rotation (geometric) and Gaussian noise (removal)

Fig. 13
figure 13

CS measurement generation and recovery comparison of proposed algorithm for low frequency Cameraman cover image against various attacks like Median filtering (non-geometric), JPEG compression, Rotation (geometric) and Gaussian noise (removal)

Fig. 14
figure 14

Embedding and extraction time comparison of proposed algorithm for high frequency Goldhill cover image against various attacks like Median filtering (non-geometric), JPEG compression, Rotation (geometric) and Gaussian noise (removal)

Fig. 15
figure 15

CS measurement generation and recovery time comparison of proposed algorithm for high frequency Goldhill cover image against various attacks like Median filtering (non-geometric), JPEG compression, Rotation (geometric) and Gaussian noise (removal)

The execution time analysis of proposed algorithm with various wavelets against rotation, median filtering, Gaussian noise and JPEG compression attacks are given in Figs. 12, 13, 14 and 15. For Cameraman cover image, comparison of embedding and extraction time T1 and the CS measurement generation and recovery time T2 of the proposed algorithm with different wavelet are shown in Figs. 12 and 13 respectively. The same analysis for Goldhill cover image is given in Figs. 14 and 15. For different types of noise attacks, the algorithm with Haar wavelet takes extraction and embedding time T1 varying between 0.38 and 0.4 s whereas CS measurement generation and recovery time T2 is varying between 4.7 and 4.9 s for both the types of cover images. These timings are minimal as compared to other wavelets.

5.6 Comparison of proposed method with existing watermarking techniques

The proposed watermarking scheme not only outperforms over the existing time efficient fast watermarking technique but also more robust than watermarking technique based on reliable SVD [9, 30]. Comparison of proposed algorithm and watermarking technique based on reliable SVD with PSO and without PSO is given in Table 12. The NC values for the algorithm against various attacks like sharpening, JPEG compression, median filtering and Gaussian filtering with different window size are also compared with existing methods.

Table 12 The comparative analysis of NC values of proposed work with the existing algorithms [9, 30]

For JPEG compression attack with quality factor Q = 10, Algorithm in [30] gives the NC value as 0.43 whereas the proposed algorithm gives NC value as 0.9828. For most of attacks the proposed algorithm perform better than existing methods except sharpening, scaling and JPEG compression (Q = 80) attacks. The best performance of various algorithms against the different attacks is shown by highlighted text in the Table 12.

6 Conclusion

In applications like video streaming, telemedicine and video conferencing, the watermarking algorithms based on optimization techniques are not suitable as their computational complexity is more due to iterative nature. Therefore in this paper, a compressive sensing and principle component based image watermarking algorithm is proposed. This algorithm is computationally efficient as well as robust against various types of noise attacks. Moreover, copyright protection provided by this watermarking algorithm is more due to three layers of security provided by the compressive sensing and principal components techniques. To verify the robustness of algorithm, the geometric, non geometric and compression types of checkmark attacks are applied with different scale factors on embedded watermark image. The algorithm is also tested with two different classes of cover images: one having majority of low frequency components and other having majority of high frequency components. The experimental results show that the NC values are close to 0.9 against most of the attacks. It is also observed that the NC value is above 0.95 for JPEG compression with quality factor Q = 10.

For efficient embedding and extraction of watermark by proposed algorithm, the analysis with various types of orthogonal, non-orthogonal, symmetric and non symmetric wavelets is carried out against different noise attack. It is observed that Sym8 and Bior6.8 perform better for non-geometric and JPEG compression attacks whereas the Haar wavelet performs better for geometric type of noise attacks. The comparison of computational time is showing that embedding and extraction time of the proposed algorithm is about 0.4 s which is much less than the watermarking algorithms proposed in literature [9, 11]. The overall execution time of proposed algorithm for payload of 6 K bytes with Haar filter is around 5 s which is less as compared to existing method [17]. Therefore, the proposed algorithm can be included with video standard H.264 as watermarking algorithm. The algorithm requires lesser execution time with Haar wavelet as compared to other wavelets. Moreover, the comparative analysis shows that algorithm outperforms over the various reliable SVD based watermarking algorithms proposed in the literature [9, 30]. In proposed algorithm, the linear measurement matrix of watermark is embedded into HL subband of cover image. The performance analysis of proposed algorithm can be further investigated with different subbands at various levels of wavelet decomposition. Moreover, the DCT is used to generate sparse data set for CS in proposed algorithm; the same can be further examined using wavelet transform as sparse dataset generator for CS which may possibly improve the performance.