1 Introduction

Today, the contemporary world is a prime example of esteemed development in every sector, yet it has transformed the entire mechanism of communication on a large scale. Rapid and hassle-free communication between two parties is now a matter of mere moments. The emphasis on growth is not only devoted to the invention of computing devices and their software, but also to the rapid evolution of communication methods. The expansion of digital data in the form of e-libraries, digital repositories, video and audio messages, etc., has been observed in recent times. The utmost concern associated with this advancement is its security and copyright protection. To address this issue, researchers have utilized cryptosystems for the secure transmission of digital content, particularly encryption and watermarking. The originality of images and their genuine author/creator is securely communicated through the use of watermarking techniques.

The two prominent watermarking techniques used in copyright protection are spatial domain [1] and frequency domain [2]. In spatial domain, the main idea is to substitutes the pixel or set of pixels of host image with the pixels of watermark image directly, which in return produces the watermarked image having great proficiency towards attacks. Whereas in the frequency domain, firstly host image is converted into frequency domain, then watermarking is done on the coefficients’ value of the host image to tackle mischievous attacks. The objective in each case is same i.e. to provide copyright protection, integrity, broadcast monitoring, authentication and sturdiness towards mischievous attacks [3].

Literature reveals many techniques of watermarking in both of the aforementioned types [1, 4,5,6,7]. Discrete fractional Fourier transform (DFRFT) [8], discrete Fourier transform (DFT) [9], discrete wavelet transform (DWT) [10] and discrete cosine transform (DCT) have been widely used in watermarking [11]. In [12] authors suggest a novel technique of watermarking which uses chaotic Arnold transform and LU decomposition to strengthen the invisibility of watermark. Likewise in [13], the authors proposes two preprocessing steps before embedding of watermark. First is to change the size of watermark and second is to scramble it. Whereas, the security goals for the proposed technique are achieved by a simple, secure and direct approach. In comparison to [13], the inclusion of substitution box (S-box) in watermarking has enhanced the security level and utilization of chaos based differential equations added the strength in the randomness of the substitution box. These distinctive features contribute in uplifting the imperceptibility level of the technique [7].

Similarly, in [10], authors propose a hybrid watermarking technique while remaining in the frequency domain by merging DCT and DWT for embedding and extraction of the watermark. The combination of these two methods yields more benefits and creates one hybrid method. In [11], a different but simpler and robust approach was proposed by the authors, which focuses on the size of the watermarked image and the original image in the embedding process using the DCT approach only. Similarly, some other interesting watermarking techniques have been proposed in the recent past [14,15,16,17,18].

Literature reveals the utilization of many simple chaotic systems in image encryption and watermarking techniques [19,20,21,22]. However, complex chaotic dynamical systems have not been widely used in such areas. Moreover, chaotic systems with higher-order nonlinearities and dimensions are rarely seen in this field. Since such nonlinear multi-dimensional chaotic systems exhibit complex, unpredictable, and random trajectories, this gap motivated us to use a complex chaotic dynamical system for copyright protection. Keeping this aspect in mind, a third-order nonlinear chaotic dynamical system is used in this article for the design of the watermarking technique.

In this article, we will utilize DCT to propose a robust and secure technique of watermarking. It offers a high degree of freedom, due to the multi-resolution attribute. Furthermore, this transformation is not block-based. DCT can also be amalgamated with other transforms to utilize their benefits as well like in [2, 10] and [14]. The theme behind the application of differential equations (DE) in watermarking schemes is to introduce continuous chaotic systems in such schemes. It is a well-established and fostered division of mathematics which is used to represent dynamical systems in terms of mathematical equations. Chaos generating DE have strong and complex random behavior extremely suitable for the secure design of cryptosystem. Recent developments in multimedia applications have revealed productive outcomes from such systems. But there are very few applications of such systems in image watermarking techniques.

The remaining article is organized as follows, Section 2 gives the detailed description of the coupled chaotic system of DE and the watermarking technique. Section 3 presents the complete statistical analyses for the host image and watermarked images. Several attacks of image processing are applied to test the robustness of the suggested technique in Section 4. The whole article is concluded in Section 5.

2 System of coupled differential equations and watermarking technique

A physical system depending upon two or more variables is modelled in terms of ordinary differential equations (ODEs) to exhibit its bifurcation pattern completely in near future. A coupled differential equation is a system of equations where the dependent variables in each equation depend on more than one independent variable. This concept was used to measure randomness appearing in non-equilibrium frictional medium from modulation instability. It involves three variables and hence generates a system of chaotic coupled differential equations involving three ODEs. This system was initially modelled by Rabinovich-Fabricant (RF) [23, 24], whose formation in mathematical form is given below.

$$\begin{array}{l}\frac{dx}{dt}=yz-y+y^3+\sigma x\\\frac{dy}{dt}=3xz+x-x^3+\sigma y\\\frac{dz}{dt}=-2\beta z-2xyz\end{array}$$
(1)

The system (1) is chaotic and highly sensitive towards initial input and parameters. Slight variation in the system generates complex, chaotic and completely different dynamical behavior. Fixing parameters and initial conditions at one stage can result in generation of pseudorandom sequences of excellent cryptographic properties. In Fig. (1), different trajectories are plotted for slightly varied parameters and initial conditions.

Fig. 1
figure 1

RF system with Different chaotic behavior for change in \(\beta\) only

2.1 Watermarking technique

The purpose of the watermarking technique is to acquire copyright protection of valuable digital content. Both types of visible and invisible watermarks are usually inserted in the plaintext images. The theme of inserting an invisible watermark is used to protect the ownership of content circulated using insecure channels. The procedure of embedding and extraction of watermark in frequency domain using DE is explained hereafter.

2.1.1 Embedding procedure

The following steps describes the embedding procedure of the watermark logo into the plaintext image.

  • A plaintext image having size \(M\times N\) is selected and segmented into three layers i.e. blue, green and red for the utilization of embedding procedure of watermark logo.

  • The solutions of RF system (given in Eq. 1) are then used to generate sequences \(X, Y\;and\;Z\). The red, green and blue layers are being permuted by sequences \(X, Y and\;Z\) respectively by making use of Eq. 2.

    $$\left\{\begin{array}{ll}S^{R,G,B}\left(i,j\right)=I^{R,G,B}\left(i-x_i,j-x_j\right)&if\;i-x_i\geq1;j-x_j\geq1\\S^{R,G,B}\left(i,j\right)=I^{R,G,B}\left(M+i-x_i,N+j-x_j\right)&if\;i-x_i<1;j-x_j<1\\S^{R,G,B}\left(i,j\right)=I^{R,G,B}\left(i+x_i,j+x_j\right)&if\;i+x_i\leq M;j+x_J\leq N\\S^{R,G,B}(i,j)=I^{R,G,B}\left(i+x_i-M,j+x_j-N\right)&if\;i+x_i\geq M;i+x_i\geq N\end{array}\right.$$
    (2)
  • A watermark logo image of dimension \((K\times K)\) is taken into account and obtained \((2 K\times 2 K)\) LSBs through a shift procedure by altering its MSBs to LSBs.

  • Next, a block of dimension \((2 K\times 2 K)\) is selected from the image in 1st step and replaced its LSBs by the LSBs obtained in previous step.

  • Finally, the processed image from the previous step undergoes inverse permutations utilizing the corresponding inverse equations to obtain the watermarked image. The complete watermarking technique is elucidated in Fig. 2.

2.1.2 Extraction procedure

To maintain the productivity of the technique and ensure copyright protection, the extraction procedure is outlined as follows:

  • The permutations to each layer using the generated sequences X, Y, and Z is applied after separating the watermarked image into three channels.

  • A block of dimension \((2 K\times 2 K)\) is selected from permuted layer and splited into the MSBs and LSBs.

  • \((K\times K)\) MSBs and LSBs are being extracted from the previous step.

  • As a final point, inverse permutations are applied on the \((K\times K)\) LSBs to extract the watermark logo from the watermarked image.

Fig. 2
figure 2

Structural demonstration for the proposed watermarking technique

3 Statistical analysis and simulation results

This section of the paper presents comprehensive details of essential analyses aimed at validating the efficacy of the proposed watermarking technique. These analyses encompass contrast, correlation, homogeneity, energy, peak signal-to-noise ratio, and mean square error. The evaluation of these metrics is conducted by examining the Gray Level Co-occurrence Matrix (GLCM) of both the watermarked and host images. It is noteworthy that the size of the watermarked and original images remains consistent. The strength of the watermarking technique is established through a thorough assessment of robustness, invisibility, security, and capacity.

3.1 Homogeneity

GLCM is used to measure the homogeneity of an image. The diagonal closeness distribution is measured in homogeneity. If \(p(i,j)\) represents pixel position at ith row and jth column then formula is

$$Hom=\sum \frac{p(i,j)}{1+\left|i-j\right|}$$
(3)

3.2 Contrast

In response to intensity modifications the sensitivity of the image textures is calculated in doing the analysis of contrast. It is mathematically defined as

$$Contrast=\sum {\left|i-j\right|}^{2}p(i,j)$$
(4)

3.3 Energy

Here the sum of squares of entire values of gray pixels of each row and column is calculated, mathematically,

$$Energy=\sum {p(i,j)}^{2}$$
(5)

3.4 Entropy

The amount of randomness in a digital image is measured in entropy. It is used to quantify the uncertainty in digital images. Mathematically it is given as

$$Entropy=-\sum p\left({y}_{i}\right){log}_{2}p\left({y}_{i}\right)$$
(6)

The entropy results in Table 6 for the host and the watermarked images suggest that the two images are quite the same also depicted in the Fig. 6.

3.5 Correlation

Pixels of a plaintext image are highly correlated to its neighboring pixels. This pattern in a watermarked image of pixels should also remain approximately same if the watermarking technique is fine enough. The similarity of original and watermarked images is evaluated by this analysis. Mathematical representation is given as follows.

$$Corr=\sum \frac{(i-\mu i)(j-\mu j)p(i,j)}{{\sigma }_{i}{\sigma }_{j}}$$
(7)

Where \(\sigma\) and \(\mu\) are standard deviation and mean respectively.

The results of these analyses for both the host and watermarked images exhibit a high degree of similarity, as summarized in Table 6. Moreover, the comparison indicates that the watermarked image with proposed technique is more similar to the original image as compared to the [7] and [26]. Achieving such congruence in outcomes is the ultimate objective for a watermarking technique (Table 1).

Table 1 Analysis Host image and watermark image QAU

3.6 Mean squared Error

How dissimilar are the two images i.e. watermarked and the original image, are examined by the Mean Square Error (MSE). Its mathematical expression is given in Eq. 8 and the values are being tabulated in Tables 2, 3, 4, 5, and 6.

$$MSE=\frac{1}{n}\sum {({x}_{i}-{x}_{i}^{*})}^{2}$$
(8)
Table 2 Analysis Host image and watermark image QAU
Table 3 JPG images with their complexity analyses
Table 4 Analysis Original and watermark image
Table 5 Analysis of the Original Host image and Extracted image QAU
Table 6 Statistical Analysis for the Host and processed images

3.7 Peak signal to noise ratio

The Peak Signal to Noise Ratio (PSNR) is defined by the given expression.

$$PSNR=10{log}_{10}\frac{MA{X}_{I}^{2}}{MSE}$$
(9)

In the above equation, the denominator represents the dissimilarity between the images, specifically the MSE, while the numerator corresponds to the signal strength. The evaluation of invisibility is determined using metrics such as PSNR and Structural Similarity Index (SSIM), which measure the similarity between the watermarked and the original image [17, 25].

3.8 Complexity and differential analysis

One very important factor in analyzing the different algorithms of information security is the complexity analyses. The speed of embedding and extraction of watermarks in the era of speedy communication matters a lot. The speed of extraction and embedding for the proposed technique is very close to the other similar techniques as one given in Table 3, whereas the level of security attained by this technique is much superior than [26]. The entire procedure is executed using MATLAB (R2013a) on a laptop running Windows 8, equipped with an Intel(R) Core(TM) i5-4300U CPU @ 1.90 GHz (2.50 GHz) and 4 GB RAM.

The unified average changing intensity (UACI) ensures the efficiency of cryptosystem to stand against the differential attacks with an optimal value about 33.333%. The resistance against the plaintext attack improves as number of pixels change rate (NPCR) approaches 100%. These expressions are expressed as follows.

$$UACI=\frac1{L\times M}\sum\limits_{j,k}\left(\frac{C_1\left(j,k\right)-C_2\left(j,k\right)}{255}\right)\times100\%$$
(10)
$$NPCR=\frac{\sum_{j,k}D(j,k)}{L\times M}\times100\%$$
(11)

where \({C}_{1}\)and \({C}_{2}\) are the watermarked images before and after one pixel of the host image is altered and \(D\) is their difference. If \({C}_{1}\ne {C}_{2}\), \(D=1\) else \(D=0\). The results of these analyses are calculated in Tables 1, 2, 4 and 5. Figures 3, 4, 5, 6, 7, 8 and 9 showcase the respected images, illustrating the effectiveness of the proposed watermarking technique.

Fig. 3
figure 3

Watermarked images with various cuts

Fig. 4
figure 4

Extracted logo from various watermarked cut images

Fig. 5
figure 5

Original images, Pepper and Lena

Fig. 6
figure 6

Processed (watermarked) Images, Pepper and Lena

Fig. 7
figure 7

Histogram of original and watermarked Lena image

Fig. 8
figure 8

QAU and emoji logos

Fig. 9
figure 9

Disrupted Pepper and Lena images

4 Robustness test

The resemblance between the extracted and the inserted watermark is the mathematical calculation of two watermarks [27]. Robustness is achieved when these two watermarks exhibit high correlation, which translates to a similarity outcome on the higher side. If the kth term of the extracted and original watermark is \({e}_{k}\) and \({o}_{k}\), respectively then the similarity is mathematically given as follows:

$$Sim=\frac{\sum {e}_{i}.{o}_{i}}{\sqrt{\sum {{e}_{i}}^{2}\sum {{o}_{i}}^{2}}}$$
(12)

The optimal value of similarity index for strong watermarking should be approximately 100. It turns out to be 99.92 for the proposed technique that is almost the optimal value. The similarity values for the Lena and Pepper images are tabulated and compared with those in [26] in Table 7, demonstrating the validity of the proposed technique. Noise, compression and cropping attacks are deliberated in the upcoming subsections.

Table 7 Robustness Analysis for the Host and processed images

4.1 Noise attack

For the resistance against several noise attacks, 1% Speckle noise and 1% salt noise have been added to the images. Table 7 shows the great resistance against noise attack.

4.2 Compression attack

For the compression attack of the proposed watermarking technique, the Joint Photographic Experts Group (JPEG) is examined and presented in Table 7.

4.3 Cropping attack

Either the extracted image is deliberately distorted or less material than the host image is provided in this attack. Tables 1, 2, and 7 comprises the results of nearly all data processing attacks.

5 Conclusion

Digital watermarking is indeed an appropriate choice for the fortification of copyrights of multimedia data. In this article an innovative watermarking technique is obtained which operates on the solution space of ordinary coupled differential equations. Initially, from system of ODE three random sequences are being generated contrary to the usual sequences obtained from Galois field/ring. The encouraging outcomes of these sequences suggested their applications in multimedia security. Secondly, a watermarking technique based on DE is devised for the copyright protection of the data. The watermark becomes nearly imperceptible due to the permutation process and frequency domain make it more secure by its specific features. Furthermore, the results of the robustness test and statistical analyses substantiate our assertion that this technique exhibits semi-fragility in the context of copyright protection.