1 Introduction

With the development of digital media and Internet technology, multimedia contents are becoming more significant, popular and they enrich people's everyday life. However, this advantage of digital media content is also their major disadvantage in terms of copyright infringement and unauthorized use of data content. Digital watermarking [11, 14, 29] has been rapidly developed during the past two decades, which can provide efficient solutions for copyright protection, ownership identification, certification of data authenticity, tracking of digital content copies, copy and access controls, etc. In this paper, we concentrate our research topic on robust image watermarking technique for copyright protection and ownership authentication.

Digital image watermarking is a technique to embed a secret signal (watermark) within a specific image (cover image) and extract the secret message at the destination, thereby protecting the image from signal processing attacks during the transmission process. From visual perceptual aspect, image watermark technology can be classified as visible and invisible watermark. The visual watermark runs the risk of being removed. Currently the majority of techniques used fall into the class of invisible watermark. For the reason that the embedding locations are secret, the invisible watermarks are more secure and robust than the visible watermarks. The most important properties of image watermarking techniques include imperceptibility, robustness, security and data capacity. Many watermark methods have been proposed mainly to improve the former two. Owing to robustness and imperceptibility being in conflict with each other, how to maintain a balance between them is key issue in the watermark research activities. In addition original cover images or watermark signals are not always available, the watermark detection or extraction may be performed without the original data. Therefore, an effective robust and invisible blind watermarking scheme is still urged nowadays. Researchers seek to develop a novel watermark scheme that can preserve good imperceptibility while ensuring high security and resisting malicious attacks.

Image watermarking can be implemented in spatial or frequency domain. Spatial domain methods insert watermark signals in cover image by directly changing pixel values. In general, spatial domain schemes have the advantages of low complexity and easy implementation but they tends to be susceptible to attacks. Compared to spatial domain, transform domain schemes in which the watermark signals are hidden by altering frequency coefficients of a transformed image, are generally considered to be robust against attacks. However, their data capacities are very limited since the embedding of high-capacity watermark in the frequency domain would degrade the image quality significantly. The most widely used transforms include discrete cosine transform (DCT) [8, 17, 22,23,24,25,26, 28], discrete wavelet transform (DWT) [41, 42], discrete Fourier transform (DFT) [38,39,40], and singular value decomposition (SVD) [7, 10, 16, 37], etc. Transform domain methods are very popular for exploiting the spectral characteristics of image transforms and human visual perception. Das et al. [8] presented a novel blind watermarking algorithm in DCT domain using the correlation between two DCT coefficients of adjacent blocks in the same position. A robust blind watermarking technique based on DCT coefficient modification was proposed by Parah et al. [28], where the difference between two DCT coefficients of the adjacent blocks at the same position was needed to be calculated. Lin et al. [17] introduced an improved image watermarking technique in which the watermark was embedded into a digital image by modifying the low-frequency coefficients in DCT frequency domain. A new approach based on CRT for watermarking of images in the DCT domain for authentication and copyright protection was addressed by Patra et al. [23]. Verma et al. [41] provided a new approach for watermark extraction using support vector machine (SVM) with principal component analysis (PCA) based feature reduction where the original cover image was decomposed up to three level using lifting wavelet transform (LWT) and low-pass sub-band was selected for data hiding purpose. The wavelet transform provides excellent spatial-frequency localization and multi-resolution properties. Energy compaction capability of DCT is useful for adjusting invisibility constraints. By reason of its own intrinsic properties, SVD is widely utilized as watermark embedding domain in the literature, especially in the key steps of watermark embedding. In watermark methods based on SVD, the watermark bits are usually inserted into the singular values or singular vectors of the cover signal. Su et al. [37] suggested a novel watermarking algorithm based on the improved compensation of SVD in which the watermark bit was embedded into 4 × 4 block by modifying the second row first column and the third row first column elements of U component. Chung et al. [7] developed a watermarking algorithm in which the watermark was embedded into U and V components of the SVD. Fan et al. [10] designed a watermarking scheme that the watermark is embedded by changing the relation between the second and third coefficients in the first column of U component of SVD. Lai [16] presented an improved SVD-based watermarking scheme where the watermark was embedded into the selected blocks by modifying the entries in U orthogonal matrix of each block.

In recent decades, various robust image watermark methods have been proposed. In these schemes, image transforms are indispensable. Transform domain watermark techniques are effective in terms of stronger robustness and higher imperceptibility. Some researchers have suggested the use of two or three transforms to develop new watermarking schemes. Multiple domain image watermarking of combining two or more transforms has been developed in the direction of providing more robust and imperceptible, such as DWT+SVD [1, 4, 5, 20, 21, 46], DWT+DCT [6, 13, 15, 27], DCT+SVD [3, 9, 18], DWT+DCT+SVD [12, 30,31,32,33,34,35, 44]. Zheng et al. [46] developed a blind watermark method of combining DWT and SVD where the watermark is embedded by modifying the singular values in U components of SVD. Makbol et al. [20] used DWT-SVD image transform and human visual system to improve performance of watermarking scheme where watermark was embedded by modifying several elements in its U matrix. Ahn et al. [4] introduced an image watermarking scheme where the watermark bits were embedded into the target blocks by modifying the first column coefficients of the left singular vector matrix of SVD decomposition. DWT and SVD were employed in a robust and secure watermarking scheme by Irshad et al. [5]. Agoyi et al. [1] developed a novel watermarking scheme based on DWT, chirp z-transform (CZT) and SVD. Kumar et al. [15] proposed a new watermarking algorithm for digital images by cascading of biorthogonal wavelet transforms (BWT) and DCT where embedding of watermark data was done in middle frequency component by comparison-based correlation technique. Ali et al. [3] described a digital image watermarking algorithm based on a combination of DCT and SVD, the advantage of the algorithm is that it automatically chooses the appropriate multiple scaling factors. Ling et al. [18] addressed a watermarking scheme based on a hybrid of SVD and DCT. Elayan and Ahmad [9] developed a DCT-SVD based digital image watermarking scheme that made use of Arnold transform with a view to improving the robustness against different types of attacks while preserving the perceptual quality. Singh et al. [34] presented a secure multiple watermarking method based on DWT, DCT and SVD, where the watermark was embedded in the singular values of DWT subbands. Singh [30] provided a new robust hybrid multiple watermarking technique using fusion of DWT, DCT and SVD which provided extra level of security with the acceptable performance in terms of robustness and imperceptibility. Singh et al. [31] proposed a robust and blind watermarking scheme based on DWT-SVD and DCT with Arnold cat map encryption for copyright protection. Hu et al. [12] presented a novel scheme to implement blind image watermarking based on the feature parameters extracted from a composite domain including DWT, SVD and DCT. Singh et al. [32] developed a hybrid image watermarking technique based on DWT, DCT and SVD against signal processing attacks.

The main limitation of the existing image watermarking techniques for copyright protection is difficult to obtain a favorable trade-off between imperceptibility and robustness. To take full advantage of image transforms, we design a novel combination of DWT, DCT and SVD for robust and invisible blind image watermarking. More specifically, we select LL component in DWT domain for purpose of improving the robustness and transparency of watermarking using multiscale analysis. A number of particular middle frequency coefficients in DCT domain are chosen for watermark embedding considering the capacity of resistance to low-pass filtering, noise addition, JPEG compression, etc. and the visual quality of watermarked images according to human visual system (HVS). In SVD domain, The largest singular value is modified to embed the watermark bit for the robustness of watermarking against diversified image processing attacks. In recent literatures, most authors concentrated on embedding binary watermarking into the gray-level cover images for protecting multimedia data. For binary image watermark, there are generally two ways to implement the watermarking [13]. One is to map chosen frequency coefficients to a dichotomized field in accordance with the bit value. The quantization index modulation (QIM) [13] is the most common technique in this way. The other way is to modify specific coefficients into paired groups so that each binary bit is manifested by the relationship of the paired groups [8, 46]. In this work, we employ the latter for its universality and flexibility.

The main purpose of this work is to develop a DWT-DCT-SVD based robust and invisible blind image watermarking scheme for obtaining a better tradeoff between imperceptibility and robustness requirements. The use of selected medium-frequency DCT coefficients, optimal embedding strength and flexible embedding strategy provides better adaptability and greater robustness in resisting image processing operations. In the proposed scheme, the LL subband of cover image in DWT domain is segmented into 8×8 blocks and each block is processed by DCT transform. In each block of DCT coefficients, certain middle frequency coefficients are selected to compose a modulation matrix. And then the modulation matrix is decomposed by SVD transform, the largest singular value is made use of embedding watermark. Based on analyzing the relationship between the quality degradation of the watermarked image and the accuracy of the recovered watermark, the optimal watermark embedding strength is estimated using least squares curve fitting technique. The security of the proposed watermarking scheme is improved using logistic chaotic map. The main highlights of this paper are those a watermarking scheme based on a new blend of DCT and SVD in DWT domain is presented and it provides an alternative to optimizing embedding strength technique.

This paper is organized as follows. We present the fundamental concepts and theories in Section 2. Section 3 depicts the proposed watermarking scheme in detail. Section 4 provides the experimental results and analysis, shows the superiority in comparison with other existing techniques and briefly discusses with the proposed scheme. Section 5 summarizes and concludes the paper.

2 Background Theory

The proposed work based on DWT, DCT, SVD, logistic chaotic map and least-squares curve fitting requires certain mathematical concepts. Hence, a brief description of these mathematical theories is discussed as follows.

2.1 Discrete Wavelet Transform (DWT)

Discrete Wavelet Transform is an important and powerful signal processing technique used to divide signals into 4 separate subbands, namely LL (approximation details), HL (horizontal details), LH (vertical details) and HH (diagonal details) sub-bands [36]. The process can be repeated to obtain multi-scale wavelet decomposition. An image may be filtered by 2D DWT into approximation and detail with multiple-levels, which reveals a multi-resolution perspective. The advantages of DWT include excellent localization in time and frequency domains, symmetric spread distributions, multi-resolution characteristics and in accord with the principle of HVS. DWT is widely applied to image processing. In this work, it helps us to achieve preferable robustness and invisibility properties of the proposed watermarking scheme.

2.2 Discrete Cosine Transform

The discrete cosine transform (DCT) was introduced by Ahmed et al. [2]. Considering the case of a gray-scale image f(x,y), 0 ≤ x, y ≤ N − 1. The forward two-dimensional DCT can be expressed as [19]:

$$ F\left( u, v\right)=\alpha (u)\alpha (v)\sum_{x=0}^{N-1}\sum_{y=0}^{N-1} f\left( x, y\right) \cos \left[\frac{\left(2 x+1\right)\pi}{2 N} u\right] \cos \left[\frac{\left(2 y+1\right)\pi}{2 N} v\right] $$
(1)

where u, v=0, 1, 2,... , N-1. The 2D DCT is a symmetric and orthogonal transformation. α(u), α(v) and the inverse 2D DCT are defined in (2) and (3).

$$ \alpha (u)=\left\{\begin{array}{c}\hfill \begin{array}{cc}\hfill 1/\sqrt{N}\hfill & \hfill u=0\hfill \end{array}\hfill \\ {}\hfill \begin{array}{cc}\hfill \sqrt{2/ N}\hfill & \hfill u\ne 0\hfill \end{array}\hfill \end{array}\right.\kern0.5em \alpha (v)=\left\{\begin{array}{c}\hfill \begin{array}{cc}\hfill 1/\sqrt{N}\hfill & \hfill v=0\hfill \end{array}\hfill \\ {}\hfill \begin{array}{cc}\hfill \sqrt{2/ N}\hfill & \hfill v\ne 0\hfill \end{array}\hfill \end{array}\right. $$
(2)
$$ f\left( x, y\right)=\sum_{u=0}^{N-1}\sum_{v=0}^{N-1}\alpha (u)\alpha (v) F\left( u, v\right) \cos \left[\frac{\left(2 x+1\right)\pi}{2 N} u\right] \cos \left[\frac{\left(2 y+1\right)\pi}{2 N} v\right] $$
(3)

The DCT is better at providing energy compaction and decorrelation, and widely used in image compression and signal processing. The DCT helps separate an image into different frequency bands as low frequency (LF), medium frequency (MF) and high frequency (HF) of differing importance (with respect to the image's visual quality) as shown in Fig. 1. Their distributions are from top left to bottom right in a DCT coefficient block as illustrated in Fig. 1(b) and (c). It is observed that the most energy of an image is focused on the low frequency zone (bright region) and the high frequency components corresponding to darker area as shown in Fig. 1(b) have extremely small values and only contain a small ratio of total energy. The watermark signals embedded in DCT coefficients may produce different distortions. The objective image quality metrics mean squared error (MSE) and peak signal-to-noise ratio (PSNR) are considered, they are inversely proportional to each other according to (16). Watermark embedding in DCT domain can be expressed as

$$ {F}_s^{\hbox{'}}={F}_s Q $$
(4)
Fig. 1
figure 1

2D DCT transform of a photograph 'lena'

where Fs and Fs' are the matrices of selected DCT coefficients for embedding and corresponding modified DCT coefficients, Q is a set of the weighting factors provided by the watermark signals. It is well known that low frequency coefficients in DCT domain are usually a great deal larger in magnitude than the terms of medium and high frequency regions, depicted by Fig. 1. The fact suggests that the low frequency components play a relatively more important role in the determining image quality. If Fs be from low frequency zone, the MSE of Fs' tends to become larger in value and the corresponding PSNR value tends to lower according to (4), (3) and (16), namely the modifications Fs' caused by same Q in the significant low frequency coefficients should induce more prominent visible impairments to the original image than ones in the unimportant high frequency components. Therefore, the low frequency coefficients are usually avoided in watermarking. On the other hand, if Fs comes from high frequency components with smaller magnitudes, they carry certain image details and can be filtered out easily by lossy JPEG compression and signal processing attacks, although the modifications of watermark embedding can cause insignificant image degradation, the robustness is very poor. Thus the high frequency components are also often omitted in watermarking. In order to achieve a good compromise between imperceptibility and robustness of the proposed scheme, that is with lesser effect on the visual perceptibility of the image and stronger resistance to common attacks, it follows that most adaptive DCT coefficients to be employed for embedding are those in medium frequency region, as displayed in Fig. 1(c) (marked by gray).

2.3 Singular Value Decomposition

For any m×n matrix A∈Rm×n with rank r≤min(m,n), there exist two orthogonal matrices U∈Rm×m and V∈Rn×n such that

$$ A= U{\left(\begin{array}{cc}\hfill D\hfill & \hfill 0\hfill \\ {}\hfill 0\hfill & \hfill 0\hfill \end{array}\right)}_{m\times n}{V}^T $$
(5)

where D∈Rr×r is a square diagonal matrix, namely D=diag(σ1, σ2,..., σr), with positive diagonal entries called the singular values of A and arranged in decreasing order: σ1 ≥ σ2 ≥ ... ≥ σr > 0. The orthogonal matrices U and V are not unique, but the singular values σi are. The columns of U and V are referred to as the left-singular vectors and right-singular vectors of A, respectively. SVD is a powerful tool for factorizing matrices that has been frequently applied to digital signal and image processing applications. SVD has particular characteristics, such as good stability. When a data matrix is distorted, the value of its elements or entries changes but the singular value of the matrix has little change. Moreover, singular value has the invariance to translation, zoom and mirror transformation. The stability of SVD, that is being invariant to small perturbations in an image, plays a vital role in signal processing. In watermarking techniques based on SVD, most of watermark embedding procedures are built on the use of singular values or singular vectors.

2.4 Image Encryption using Logistic Chaotic Map

To improve the security of the proposed watermarking scheme, watermark images should be encrypted before embedding. On account of the properties of highly sensitive to initial conditions and parameter values and the ergodicity, chaos maps are widely used in image encryption. Logistic map is a simple and broadly researched chaotic dynamic system. The one-dimensional logistic chaotic map is described as

$$ {L}_{n+1}=\mu {L}_n\left(1-{L}_n\right) $$
(6)

Where Ln represents the population at any given generation n and branch parameter μ∈(0,4] represents the growth rate. Different sequence will be generated with different initial values and parameters. It has been found that the sequence iterated with an initial value L0∈(0,1) for the values of parameter μ∈(3.5699456, 4] according to (6) is highly chaotic in nature, namely the sequence is neither periodic nor convergent. For this reason, the one-dimensional logistic chaotic map is adopted as in this paper. The encryption and decryption processes using logistic chaotic map are expressed as follows.

$$ \begin{array}{cc}\hfill {W}_{en}={W}_{or}\oplus CS\hfill & \hfill {W}_{or}={W}_{en}\oplus CS\hfill \end{array} $$
(7)

Where wen and wor are the encrypted and the original binary watermark sequence, respectively. ⊕ denotes XOR operation and CS is the binarization of a chaotic sequence generated from (6). The initial state value L0 and parameters μ of logistic chaotic map are kept as the secret key. Image encryption using 1D chaotic logistic map is illustrated in Fig. 2. Fig. 2(a)-(c) show three examples including the original watermark images and their corresponding encrypted versions, respectively. As can be seen from them, encrypted watermark images exhibit excellent uncorrelated and random-like (non-periodic) properties.

Fig. 2
figure 2

Three examples of image encryption using logistic chaotic map

2.5 Least-Squares Curve Fitting technique

The least squares curve fitting technique is to search the best-fitting curve for some discrete data points by minimizing the sum of the squares of the errors between actual data and fitting function. The most general fitting function is polynomial and can be expressed as

$$ \hat{y}= p(x)={C}_0+{C}_1{x}^1+{C}_2{x}^2+\dots +{C}_k{x}^k=\sum_{j=0}^k{C}_j{x}^j $$
(8)

where Cj, j=0, 1, 2,..., k are polynomial coefficients for the best-fitting curve. Assuming that we have several discrete data (x1, y1), (x2, y2), ... , (xn, yn) and p(x) is a function for fitting a curve. The residual for each data point (xi, yi) is computed by the difference between the actual data yi and the fitting function p(xi) as follows

$$ {r}_i={y}_i- p\left({x}_i\right)={y}_i-\sum_{j=0}^k{C}_j{x}_i^j $$
(9)

The least-squares solution gives the Cj, j=0, 1, 2,..., k that minimize \( {\left|\left| r\right|\right|}_2^2 \), namely

$$ \left({C}_0,{C}_1,\dots, {C}_k\right)=\begin{array}{cc}\hfill \arg \hfill & \hfill \min \left\{\sum_{i=1}^n{r}_i^2\right\}\hfill \end{array}=\begin{array}{cc}\hfill \arg \hfill & \hfill \min \left\{\sum_{i=1}^n{\left({y}_i-\sum_{j=0}^k{C}_j{x}_i^j\right)}^2\right\}\hfill \end{array} $$
(10)

where n is the number of data points (xi, yi) and k is the order number of assumed function.

3 Proposed watermarking scheme

In this section, The proposed watermarking scheme based on DWT-DCT-SVD hybrid domain is elaborated in details. Let I and W denote the gray-scale cover image of size M×N and the binary watermark image of size L×L, respectively. The proposed watermarking scheme mainly includes watermark encryption, watermark embedding, watermark extraction and watermark decryption.

3.1 Watermark encryption

Before embedding the watermark image into the original cover image, the original binary watermark image W with the size L×L is scrambled using logistic maps with certain secret key (L0, μ) to generate a one-dimensional chaotic watermark sequence W en (i) for i=1, 2, . . . , L×L according to (6) and (7). This results in a watermark image without semantic meaning which comprises values of zeros and ones as shown in Fig. 2.

3.2 Watermark embedding process

The proposed watermark embedding procedure is shown in Fig. 3. It can be described in detail as follows:

Fig. 3
figure 3

Block diagram of the proposed watermark embedding process

Step 1: Perform first-level Haar 2D-DWT on the cover image I of size M×N. This produces an approximation coefficient matrix LL (low frequency subband) and three detail coefficient matrices HL, LH, and HH (high frequency subbands).

Step 2: Divide the LL coefficient matrix into non-overlapping blocks {Bk} of size 8×8, k=1, 2, ..., (M/16×N/16).

Step 3: For each block Bk, k=1, 2, ..., (M/16×N/16):

  1. (1)

    Implement forward 2D-DCT transform to obtain a coefficient matrix D.

  2. (2)

    Zigzag scan coefficient matrix D to produce a vector a=[a1, a2,..., a64] and its 8 components (13th, 16th, 17th, 18th, 19th, 20th, 21th, 25th) are extracted to construct a modulation matrix MM with 2 rows and 4 columns.

Zigzag scanning and mapping pattern of modulation matrix generation is shown in Fig. 4.

  1. (3)

    Split modulation matrix MM into two same size submatrices MM1 and MM2 with 2 rows and 2 columns as shown in Fig. 4.

  2. (4)

    Apply SVD transform to each of two submatrices and extract their largest singular values λ1 and τ1 as follows:

Fig. 4
figure 4

Zig-zag scanning, mapping pattern and partitioning of selected coefficients (marked by green)

$$ \begin{array}{cc}\hfill \left[\begin{array}{ccc}\hfill {U}_i\hfill & \hfill {S}_i\hfill & \hfill {V}_i\hfill \end{array}\right]= SVD\left({MM}_i\right)\hfill & \hfill i=1,2\hfill \end{array} $$
(11)
$$ \begin{array}{cc}\hfill {S}_1=\left[\begin{array}{cc}\hfill {\lambda}_1\hfill & \hfill \hfill \\ {}\hfill \hfill & \hfill {\lambda}_2\hfill \end{array}\right]\hfill & \hfill {S}_2\hfill \end{array}=\left[\begin{array}{cc}\hfill {\tau}_1\hfill & \hfill \hfill \\ {}\hfill \hfill & \hfill {\tau}_2\hfill \end{array}\right] $$
(12)
  1. (5)

    Assume the mean value of λ1 and τ1 is equal to E, i.e. E=(λ11)/2. The encrypted watermark sequence bits W en (i) for i=1, 2, . . . , L×L are embedded by modifying the largest singular values λ1 and τ1 according to the following criterion:

$$ \begin{array}{ccccc}\hfill if\hfill & \hfill {W}_{en}=1\hfill & \hfill then\hfill & \hfill {\lambda}_1^{\hbox{'}}= E\times \alpha \hfill & \hfill {\tau}_1^{\hbox{'}}= E/\alpha \hfill \\ {}\hfill if\hfill & \hfill {W}_{en}=0\hfill & \hfill then\hfill & \hfill {\lambda}_1^{\hbox{'}}= E/\alpha \hfill & \hfill {\tau}_1^{\hbox{'}}= E\times \alpha \hfill \end{array} $$
(13)

where λ'1 and τ'1 are the modified values of λ1 and τ1, respectively, the parameter α denotes the embedding strength factor of watermark. Through experiment, The value of α is usually restricted to [1 2].

  1. (6)

    Two altered submatrices MM1 ' and MM2 ' are reconstructed by inverse SVD transform as follows:

$$ \begin{array}{cc}\hfill {MM}_1={U}_1\left[\begin{array}{cc}\hfill {\lambda}_1^{\hbox{'}}\hfill & \hfill \hfill \\ {}\hfill \hfill & \hfill {\lambda}_2\hfill \end{array}\right]{V}_1^T\hfill & \hfill {MM}_2={U}_2\left[\begin{array}{cc}\hfill {\tau}_1^{\hbox{'}}\hfill & \hfill \hfill \\ {}\hfill \hfill & \hfill {\tau}_2\hfill \end{array}\right]{V}_2^T\hfill \end{array} $$
(14)

then the changed modulation matrix MM' is obtained by merging them.

  1. (7)

    All entries in the modulation matrix MM' are mapped back to their respective original positions in DCT coefficient matrix D, and then we obtain the altered coefficients matrix D'. A watermarked block Bk' is obtained by performing inverse 2D-DCT transform on matrix D'.

When all divided blocks {Bk}, k=1, 2, ..., M/16×N/16 are transformed into {Bk'}, k=1, 2, ..., (M/16)×(N/16) according to procedures (1)-(7), embedding of the encrypted watermark sequence bits W en (i) for i = 1, 2, ... , L×L, is finished. Here (L×L) is equal to (M/16)×(N/16).

Step 4: The modified coefficient matrix LL' is obtained by combining all blocks {Bk'}, k=1, 2, ..., (M/16×N/16).

Step 5: Apply inverse Haar 2D-DWT transform to obtain the watermarked image I' by utilizing above-mentioned three detail coefficient matrices HL, LH, and HH and the modified coefficient matrix LL'.

3.3 Watermark extraction process

The watermark extraction process requires only the watermarked image without the need for the original cover image and watermark image. The proposed watermark extraction procedure is shown in Fig. 5. The detailed watermark extraction procedure is depicted as follows:

Fig. 5
figure 5

Block diagram of the proposed watermark extraction process

Step 1: Perform the first-level Haar 2D-DWT transform on the grayscale watermarked image I' of size M×N.

Step 2: Divide the coefficient matrix LL into non-overlapping blocks {Bk} with the size 8×8 pixels.

Step 3: For each block:

  1. (1)

    Compute the forward DCT and produce a coefficient matrix D.

  2. (2)

    Zigzag scan coefficient matrix D to generate a vector a=[a1, a2,..., a64]. Then extract its 8 components (13th, 16th, 17th, 18th, 19th, 20th, 21th, 25th) to construct a modulation matrix MM with 2 rows and 4 columns.

Zigzag scanning and mapping pattern of matrix generation are shown in Fig. 4.

  1. (3)

    Split a modulation matrix MM into two same size submatrices MM1 and MM2 with 2 rows and 2 columns as shown in Fig. 4, and then perform SVD transform on them to extract their largest singular values λ1 and τ1.

  2. (4)

    The extraction of watermark bit W en (i) is performed according to the following criterion:

$$ \begin{array}{cccc}\hfill if\hfill & \hfill {\lambda}_1\ge {\tau}_1\hfill & \hfill then\hfill & \hfill {W}_{en}=1\hfill \\ {}\hfill if\hfill & \hfill {\lambda}_1<{\tau}_1\hfill & \hfill then\hfill & \hfill {W}_{en}=0\hfill \end{array} $$
(15)

where λ1 and τ1 are the largest singular values of two submatrices MM1 and MM2 respectively.

Step 4: When all blocks are processed by procedures (1)-(4), encrypted watermark sequence bits W en (i) for i = 1, 2, . . . , L×L, are extracted completely.

3.4 Watermark decryption

The process of decryption is similar to the encryption process. The logo watermark image W with the size L×L is acquired by decryption of watermark sequence W en (i) for i = 1, 2, . . . , L×L using logistic chaotic map with secret key (L0, μ) according to (7).

4 Experiment results and discussions

4.1 Experimental data sets

In this section, the performance of the proposed watermarking scheme is evaluated on some standard 8-bit gray-scale test images with size 512 × 512 pixels. They are shown in Fig. 6, used as cover images, namely 'Boat', 'Lena', 'Livingroom', 'Mandrill', 'Peppers', 'Pirate', 'Jetplane', and 'Lake'. Three 2-bit 32×32 binary logo images are selected to act as the watermark images, as shown in Fig. 7.

Fig. 6
figure 6

Cover images for test

Fig. 7
figure 7

Three binary watermark images used in experiment

To demonstrate the efficiency of the proposed scheme, we selected some earlier important works [1, 3, 8, 9, 12, 17, 23, 28, 30, 31, 34, 35, 37, 41, 44] as comparison methods in terms of the robustness and imperceptibility, where their watermark embedding domains are shown in Table 1. All experiments are coded by Matlab R2015b.

Table 1 Comparison methods and their watermark embedding domains

4.2 Performance Measures

The performance of the proposed watermarking scheme can be evaluated on the basis of its robustness and imperceptibility. The imperceptibility is generally assessed by the image distortion induced between the watermarked and original images due to watermark embedding, and it is measured by Peak Signal-to-Noise Ratio (PSNR), Structural SIMilarity (SSIM) index [43] and Feature SIMilarity (FSIM) index [45] objectively. The PSNR is used to analyze the visual quality of watermarked images, and it can display the perceptual transparency of the watermarked image with respect to the original cover image. PSNR is depicted as follows:

$$ PSNR=10\times { \log}_{10}\left(\frac{f_{peak}^2}{M SE}\right)=10\times { \log}_{10}\left(\frac{f_{peak}^2}{\frac{1}{M\times N}\sum_{i=1}^M\sum_{j=1}^N{\left[ f\left( i, j\right)-{f}^{\hbox{'}}\left( i, j\right)\right]}^2}\right)\mathrm{dB} $$
(16)

where mean squared error (MSE) measures the average of the squares of the errors or deviations, f peak represents the peak intensity level in the original image f, which is most commonly taken as 255 for an 8-bit gray-scale image, f(i,j) and f'(i,j) indicate the value of pixel (i,j) of original image and watermarked one respectively, and M,N denote the width and the height of cover image, respectively. High PSNR value implies less distortions induced and better invisibility. In general case, the quality of the watermarked image can be thought as acceptable when the PSNR value is above 30dB.

The SSIM [43] describes the luminance, contrast and structure attributes of the images for similarity measurement. It is defined as follows:

$$ SSIM={\left[ L\left( f,{f}^{\hbox{'}}\right)\right]}^{\alpha}\ast {\left[ C\left( f,{f}^{\hbox{'}}\right)\right]}^{\beta}\ast {\left[ S\left( f,{f}^{\hbox{'}}\right)\right]}^{\gamma} $$
(17)
$$ \left\{\begin{array}{c}\hfill L\left( f,{f}^{\hbox{'}}\right)=\frac{2{\mu}_f{\mu}_{f\hbox{'}}+{C}_1}{\mu_f^2+{\mu}_{f\hbox{'}}^2+{C}_1}\hfill \\ {}\hfill C\left( f,{f}^{\hbox{'}}\right)=\frac{2{\sigma}_f{\sigma}_{f\hbox{'}}+{C}_2}{\sigma_f^2+{\sigma}_{f\hbox{'}}^2+{C}_2}\hfill \\ {}\hfill S\left( f,{f}^{\hbox{'}}\right)=\frac{\sigma_{f f\hbox{'}}+{C}_3}{\sigma_f{\sigma}_{f\hbox{'}}+{C}_3}\hfill \end{array}\right. $$
(18)

where three functions L(f,f'), C(f,f'), and S(f,f') are the luminance, the contrast and the structure comparison functions respectively, α>0, β>0 and γ>0 are parameters used to adjust the relative importance of the three components, f and f' are the original and the watermarked images, respectively. μf, μf', σf, σf' and σff' are the corresponding mean luminance values, standard deviations and cross-covariance of two images f and f' separately. C1、C2 and C3 are constant terms with smaller values. If α = β = γ = 1 and C3 = C2/2, the SSIM index simplifies to:

$$ SSIM\left( f,{f}^{\hbox{'}}\right)=\frac{\left(2{\mu}_f{\mu}_{f\hbox{'}}+{C}_1\right)\left(2{\sigma}_{f f\hbox{'}}+{C}_2\right)}{\left({\mu}_f^2+{\mu}_{f\hbox{'}}^2+{C}_1\right)\left({\sigma}_f^2+{\sigma}_{f\hbox{'}}^2+{C}_2\right)} $$
(19)

Based on the fact that human visual system (HVS) understands an image mainly according to its low-level features, the feature similarity (FSIM) index [45] is proposed for full-reference Image quality assessment. Two important local features, phase congruency (PC) and gradient magnitude (GM) play complementary roles in characterizing the image local quality for FSIM. The FSIM index between two images f1(x) and f2(x) is defined as

$$ FSIM=\frac{\sum_{x\in \Omega}{S}_L(x)\cdot {PC}_m(x)}{\sum_{x\in \Omega}{PC}_m(x)} $$
(20)
$$ PC{}_m(x)= \max \left\{{PC}_1(x),{PC}_2(x)\right\},{S}_L(x)={\left[{S}_{PC}(x)\right]}^{\alpha}\cdot {\left[{S}_{GM}(x)\right]}^{\beta} $$
(21)
$$ S{}_{GM}(x)=\frac{2{GM}_1(x)\cdot {GM}_2(x)+{T}_2}{GM_1^2(x)\cdot {GM}_2^2(X)+{T}_2}, S{}_{PC}(x)=\frac{2{PC}_1(x)\cdot {PC}_2(x)+{T}_1}{PC_1^2(x)\cdot {PC}_2^2(X)+{T}_1} $$
(22)

Where Ω indicates the whole image spatial domain, α and β are parameters used to adjust the relative importance of PC and GM features, we set α=β=1 for simplicity. T1 and T2 are two positive constants depending on the dynamic ranges of PC and GM values respectively.

The robustness means the capability that the watermarked image can withstand various attacks, which include two groups: signal processing such as filtering, noise addition, lossy compression, and geometric transformations such as scaling, cropping, etc. It is assessed by Bit Error Rate (BER) and Normalized Correlation (NC) between the original watermark and the extracted one. The BER is defined as ratio between number of error bits and total number of bits. It is depicted as follows:

$$ BER=\frac{1}{P_W\times {Q}_W}\sum_{i=1}^{P_W}\sum_{j=1}^{Q_W}\left[ W\left( i, j\right)\oplus {W}^{\hbox{'}}\left( i. j\right)\right]\times 100\% $$
(23)

where W(i,j) and W'(i,j) are original watermark and extracted one, respectively, with same size of P W × Q W . ⊕ indicates the exclusive-or (XOR) operation. The lower the BER value is, the better the robustness is. The NC is used to evaluate the similarity and difference between the extracted watermark and the original watermark. It is computed as follows:

$$ NC=\frac{\sum_{i=1}^{P_W}\sum_{j=1}^{Q_W}\left[ W\left( i, j\right)\times {W}^{\hbox{'}}\left( i, j\right)\right]}{\sqrt{\sum_{i=1}^{P_W}\sum_{j=1}^{Q_W}{W}^2\left( i, j\right)}\sqrt{\sum_{i=1}^{P_W}\sum_{j=1}^{Q_W} W{\hbox{'}}^2\left( i, j\right)}} $$
(24)

where W and W' are the original and extracted watermarks with same size of P W × Q W , respectively. The NC value generally lies between 0 and 1. If the value of NC is closer to 1, it indicates there is lesser difference or very high similarity between the two images.

4.3 Estimation of watermark embedding strength

Before the formal experiments, a pilot test including watermark embedding and extracting process is conducted to estimate an optimal embedding strength α in accordance with the content of a cover image. As known, embedding the watermark signals into an image will degrade the visual quality of the image. In addition to that, the embedded data can be immune to signal processing or manipulation attacks to some extent. This determines that the robustness and imperceptibility compose a conflicting relation. Too high imperceptibility in embedding the watermark may lead to decreasing the robustness, vice versa. Considering these metrics of performance, high PSNR and SSIM values between the original and watermarked image usually signal good imperceptibility, low BER values or high NC values between the original and extracted watermark also indicate strong robustness. For SSIM and NC, representing the imperceptibility and the robustness respectively, although they all are similarity measurement between two images and range from 0 to 1, they are usually opposite, that is when the SSIM value is high, the corresponding NC value tend to be low, and vice versa. It is a very important issue to seek the best balance between the two variables. Fig. 8(a) and Fig. 8(c) show the PSNR and SSIM values under different embedding strength α for image 'mandrill', respectively. Fig. 8(b) and Fig. 8(d) show the relationshop between the corresponding averaged BER and NC values under four kinds of typical attacks and watermark embedding strength α, severally. These representative attacks include Gaussian noise (mean=0 and variance = 0.005), JPEG compression (QF=30), Gaussian filtering (sigma=1.0) and histogram equalization. As can been seen from Fig. 8, the larger watermark embedding strength α is, the worse the quality of the watermarked image becomes while the better the robustness of watermark scheme is. If a suitable embedding strength α is chosen, the PSNR/SSIM of the watermarked image and the BER/NC of the extracted watermark are acceptable. Especially for SSIM and NC, they have not only a same data range, but also similar changing trend in addition to opposite direction. A best embedding strength α may be found out by pre-embedding and pre-extracting process for a specific cover image, which can balance well both imperceptibility and robustness. Once the pre-embedding and pre-extracting process are performed, two relational graph can be drawn, one displays the relationship between SSIM and watermark embedding strength α, the other shows the correlation between NC and watermark embedding strength α. They represent the imperceptibility and robustness of the proposed scheme, respectively.

Fig. 8
figure 8

The relationshop between PSNR/SSIM, BER/NC and watermark embedding strength α

In order to achieve the best trade-off between the imperceptibility and robustness, the optimal embedding strength value α can be estimated by minimizing absolute difference between SSIM and NC as follows:

$$ {\alpha}_{optimal}=\begin{array}{cc}\hfill \arg \hfill & \hfill \underset{\alpha \in \left[{t}_1,{t}_2\right]}{ \min}\hfill \end{array}\left\{\left|{p}_{SSIM}-{p}_{NC}\right|\right\} $$
(25)

subject to

$$ \left\{ BER\in \left[0,{ET}_1\right]\right\}\cap \left\{ PSNR\in \left[{ET}_2,\propto \right]\right\} $$
(26)

Where pSSIM and pNC are polynomial fitting functions of SSIM and NC respectively, according to (8), (9) and (10). ET1 and ET2 are two experience thresholds, which depend on watermarking applications. In this paper, embedding strength α∈[1.1,2.0], ET1=0.05 and ET2=34 dB.

According to above-mentioned method, the SSIM and mean value of NC under various conventional attacks for eight cover images (as shown in Fig. 6) all can be fitted with different polynominal functions and are shown in Fig. 9(a)-(h). For embedding strength α∈[1.1, 2.0], the former function is monotone decreasing while the latter function is monotonic increasing. In order to achieve a balance between image quality and resistance to attacks, we seek optimal embedding strength α by minimizing absolute difference between the two functions. As shown in Fig. 9(a), when the NC and SSIM values are all 0.9795, the value of optimal embedding strength α is 1.46 conformed by the constraint PSNR=37.14 dB and BER=0.0294.

Fig. 9
figure 9

The relationship between robustness and imperceptibility

4.4 Imperceptibility analysis

For assessing the imperceptibility, we utilize PSNR and SSIM/FSIM to measure the similarity between the original cover image and the watermarked one. We have evaluated the proposed scheme on eight cover images Boat, Lena, Livingroom, Mandrill, Peppers, Pirate, Jetplane and Lake as shown in Fig. 6. At respective optimal embedding strength α, the PSNR and the corresponding SSIM/FSIM values of eight different watermarked images are graphically presented in Fig. 10 and Fig. 11. The average values of three metrics are 38.63dB, 0.9662 and 0.9757, respectively, which signify high image quality. In addition, the PSNR values for test images 'Mandrill' and 'Lena' obtained by the proposed scheme have been compared with five previous methods Lin et al. [17], Agoyi et al. [1], Elayan et al. [9], Ali et al. [3] and Singh et al. [30] as shown in Fig. 12(a) and (b). In this experiment for perceptual transparency verification, the proposed scheme achieves superior perceptual quality of watermarked image than other methods [1, 3, 9, 17, 30].

Fig. 10
figure 10

PSNR values of eight watermarked images for assessing the transparency

Fig. 11
figure 11

SSIM/FSIM values of eight watermarked images for assessing the transparency

Fig. 12
figure 12

PSNR comparison

4.5 Robustness analysis

In this subsection BER and NC values between the original watermark and the extracted watermark are computed for evaluating the robustness of the proposed scheme against different kinds of image attacks. The image attacks can be categorised into signal processing and geometrical transform. Signal processing attacks include image compression, addition of white Gaussian noise, salt and pepper noise and speckle noise, median filtering, Gaussian low-pass filtering, average filtering, histogram equalization, sharpening and contrast adjustment. Geometrical transform attacks contain image resizing and cropping. The types of image attacks considered in this work are detailed as follows:

1. JPEG compression: JPEG compression with quality factor (QF) chosen from {70, 50, 30, 20, 10} is applied to the watermarked image.

2. JPEG2000 compression: JPEG2000 with compression ratio (CR) chosen from {2, 4, 8} is applied to the watermarked image.

3. Gaussian noise: Gaussian noise with the mean (m=0) and variance (v) set at {0.005, 0.01, 0.015} is added to the watermarked image.

4. Salt-and-pepper noise: The watermarked image is corrupted by the salt-and-pepper noises with 1% and 2% density.

5. Speckle noise: multiplicative speckle noise with the variance v chosen from {0.01, 0.02, 0.05} is added to the watermarked image.

6. Median filtering: The watermarked image is filtered by a median filter with a 3×3 or 5×5 mask.

7. Average filtering: The watermarked image is filtered by an average filter with a 3×3 or 5×5 mask.

8. Gaussian filtering: The watermarked image is filtered by a Gaussian filter with sigma chosen from {0.5, 1.0, 1.5}.

9. Histogram equalization: The watermarked image is processed by histogram equalization or adaptive histogram equalization.

10. Contrast adjustment: The watermarked image is processed by contrast adjustment.

11. Scaling: The size of the watermarked image above is reduced from 512×512 to 256×256 pixels and subsequently enlarged from 256×256 to 512×512 pixels, or enlarged from 512×512 to 1024×1024 pixels and reduced from 1024×1024 to 512×512 pixels.

12. Cropping: The watermarked image is cropped by 25% or 50% on the upper left corner.

13. Sharpening: The watermarked image is filtered by a highpass filter.

The NC and BER values of the extracted watermark for test images under various attacks are listed in Table 2. Some watermarked images attacked by the most common signal processing and geometric operations and the corresponding extracted watermarks for test image 'Mandrill' are shown in Fig. 13. It can be observed from it that the proposed scheme can obtain satisfactory results. As can be seen from Table 2, most of the NC values of the extracted watermarks are greater than 0.9 and the corresponding BER values are lesser than 0.1. It demonstrates the stronger performance of the proposed scheme in terms of robustness against most common attacks including image JPEG compression, JPEG2000 compression, filtering, contrast adjustment, histogram equalization, scaling, sharpening, and so on.

Table 2 NC and BER values of extracted watermarks under various attacks
Fig. 13
figure 13

Watermarked images under different kinds of attacks and the corresponding extracted watermark images for cover image 'Mandrill'

JPEG and JPEG2000 are the two widely used image compression standards. The BER and NC values of the extracted watermarks under JPEG and JPEG2000 image compression attacks are shown in Fig. 14. For JPEG lossy compression attacks, the range domain of quality factor (QF) is from 10 to 100, whereas for JPEG2000 compression attacks, the compression ratio (CR) is varied from 1 to 10. It is easy to note that for JPEG compression QF > 50, the NC values approach 1 and the corresponding BER values appear close to 0%, while for JPEG2000 compression CR < 5, the NC values are greater than 0.96 and the corresponding BER values are less than 5%. For QF > 20 or CR<9, all NC and BER values are considered acceptable. The proposed watermarking scheme shows excellent robustness against JPEG compression and JPEG2000 compression attacks.

Fig. 14
figure 14

Robustness against image compression attacks. (a)-(b) JPEG lossy compression. (c)-(d) JPEG2000 compression

In order to show the advantage of the proposed scheme in terms of robustness, the NC and BER comparison for test image 'Pirate', 'Mandrill ' and 'Lena' under different attacks with other seven different approaches are shown in Fig. 15-17. Singh et al. [31] and Verma et al. [41] work fairly well in resistance to image JPEG compression. Fig. 15(a) & (b) show the NC values of the proposed scheme from the extracted watermarks attacked by JPEG compression at various levels comparing with the two methods, respectively. From Fig. 15(a) & (b), as shown comparative results for the test image 'Pirate' and 'Mandrill', it is clear that the robustness performance of the proposed watermark scheme against JPEG compression attacks is better in comparison to the two methods [31] and [41]. Fig. 16 presents the average BER values (in percentage) of extracted watermarks for eight test images under JPEG2000 compression attack, respectively obtained by the compared methods [12, 23, 37]. As shown in Fig. 16, Hu et al’s scheme [12] shows a little advantage to the proposed in the case of CR=2 and 4. In addition to this, the robustness of these three methods against JPEG2000 compression is evidently inferior to the proposed scheme's. From Fig. 14-16, the proposed scheme exhibits exceptional robustness against JPEG compression and JPEG2000 compression.

Fig. 15
figure 15

Robustness comparison of the proposed scheme in term of NC values

Fig. 16
figure 16

Average BER values for various schemes

The robustness of the proposed scheme has been also examined for other common signal processing attacks. The BER values obtained from the proposed scheme under various attacks for the test image 'lena' have been compared with those of Das [8] and Parah [28] as shown in Fig. 17. These attacks include salt and pepper noise addition (density = 0.01), Gaussian noise addition (mean = 0, variance = 0.001), median filtering (filter size 3x3), histogram equalization and sharpening (radius=1.5 and amount=1.5). In addition to Gaussian noise attack, where the BER of the proposed scheme is a little bit higher than Parah's [28], the BERs of the proposed scheme under other attacks are lower than other methods'. It is easy to reach the conclusion from Fig. 17 that the proposed scheme based on hybrid domain performs better than other methods for single domain [8] and [28] in resistance to common signal processing attacks.

Fig. 17
figure 17

BER comparison for 'Lena' image

Moreover, some common signal processing attacks are provided to verify the advantage of the proposed watermarking scheme in hybrid domain. Table 3 shows comparison results of NC values with other multi-domain approaches [34, 35, 44] for cover image 'mandrill'. As indicated in Table 3, the proposed scheme is superior to Singh AK's [34] and Zear A' [44] methods for almost all listed attacks only slightly worse than Singh AK's [34] on resisting Gaussian noise (m= 0, v=0.01). In comparison to Singh S's method [35], our method is better than it in the aspect of JPEG compression, median filtering and histogram equalization, however it has its advantages in terms of average filtering, Gaussian noise and salt & peppers noise.

Table 3 Comparison results of NC values against some signal processing attacks

From experimental and comparative results in Fig. 10-17 and Table 2-3, it is derived that the proposed scheme based on DWT-DCT-SVD hybrid domain shows better imperceptibility and robustness. The utilization of spectral characteristics of image transforms, human visual perception properties and optimal embedding strength makes the proposed scheme more imperceptible and robust as compared to the state-of-art techniques.

The main contribution of this work are: (1) the proposed watermarking scheme combines the advantages of three popular transforms DWT, DCT and SVD and provides a better compromise between the imperceptibility and robustness as compared to existing certain DWT, DCT and SVD applied individually or blend of DWT-SVD, DCT-SVD and DWT-DCT-SVD, (2) the optimal embedding strength is adaptively determined according to a compromise between the imperceptibility and robustness of watermarking technique by least squares curve fitting.

5 Conclusions

In this paper, a new robust and invisible blind watermarking scheme based on a combination of DCT and SVD in DWT domain has been proposed to improve the imperceptibility and the robustness. Low frequency subband (LL) which contains the maximum energy of an image is selected to embed the watermark signal and improve the robustness against image processing operations in DWT domain. In DCT domain, specific middle frequency coefficients are chosen to achieve the appropriate perception for human vision. Embedding the watermark is executed by modifying singular values of cover image into discrepant paired groups in SVD domain. The optimal embedding strength is estimated using least-square curve fitting in a preliminary experiment and provides a good balance between the imperceptibility and robustness. Logistic chaotic map is employed to increase the security of the watermarking scheme.

The main aim of this work is to develop an effective watermarking scheme for protecting digital images against various signal processing attacks with high image quality. By comparing with some existing important methods, experimental results demonstrate better visual imperceptibility and robustness of the proposed scheme against variety of attacks, especially JPEG/JPEG2000 compression, average filtering, histogram equalization, median filtering and Gaussian filtering, etc. Future direction that need to be scheduled in the area of image watermarking is to seek a new algorithm which is invariant to geometrical attacks such as rotation and translation.