1 Introduction

Economic development of the internet technologies and associated services has been augmented significantly leading to the problem of rightful ownership and associated copyright to be protected. This has led to a chance of a new opportunity in developing new copy prevention and enrichment mechanisms giving the digital watermarking as an obvious solution [2, 15, 27, 32]. By using the technology as a robust covert communication channel, digital watermarks could have a wide range of applications in the sectors like defense and intelligence, where traditional data hiding techniques have been used for centuries. Digital watermarking is the process of embedding information into digital, while embedding must be ended in such a way so that, perceptual degradation is nil, at the same time non-removable by unauthorized parties and must be robust against various intentional and non-intentional attacks [36]. All the reported watermarking algorithms can be broadly divided into two categories namely spatial and transform-domain. The algorithms used for spatial domain watermarking to directly modify the pixel values of the host image while the transformed coefficients of the host images have been modified to embed the watermarks in transform domain routines. Unluckily the reported watermarking routines suffer from a variety of malicious and non-malicious attacks. Some routines are resistant to one kind of attacks then, on the other side, its robustness may suffer for other kind of attacks. Spatial domain algorithms are easier to implement, however not robust, while the transform domain techniques are relatively more reliable and robust to various attacks [14, 32]. The frequency domain algorithms are resistant to filtering and compressions attacks and are generally, rotation, translation and scale invariant. Discrete Cosine Transform (DCT) [5, 8, 9, 13] and Discrete Wavelet Transform (DWT) [6, 11, 22, 23, 33] are commonly used frequency domain techniques. The watermark can be embedded in various sub-bands (either low frequency or high ones) after wavelet decomposition of host and/or watermark image. Watermarks inserted in the low frequencies are robust against the attack having low pass characteristics e.g. filtering, lossy compression, and geometric distortions in contrast to high frequency embedding which is robust to attack having high pass response like histogram equalization, gamma correction and brightness adjustments [16]. Lin et al. [25] have been proposed a copyright protection scheme based on 1/T forward error correction for gray-level digital images. In this scheme feature value has been generated by its corresponding gray-level of the image and XORed with the embedding bits. Consequently Lin et al. [2628] have been proposed a blind watermarking algorithm by applying the concept of wavelet coefficient quantization for copyright protection. In this scheme watermark has been embedded into the local maximum wavelet coefficient of host image.

Recently singular value decomposition (SVD), a new transform for watermarking has been introduced and the first algorithm has been proposed by Liu et al. [29] in 2002. The main feature of SVD-based image watermarking is the stability of singular values, which contain most of the image energy. In this algorithm the singular values of the host image are modified by directly adding the gray scale watermark image of the same size as of host image. SVD was again applied to the resultant matrix for finding the modified singular values. These modified singular values were combined with the known component to get the watermarked image. Similarly for the watermark extraction inverse process was adopted. The algorithm proposed by Liu et al. [12] is fundamentally imperfect and encompasses the watermark ambiguity/false-positive problem. In false positive problem it was possible to extract a watermark which was not actually the embedded one [35, 37, 38]. The problem of rightful ownership has been addressed by few authors through hybrid DWT-SVD based algorithms [3, 4, 7, 10, 12, 16, 17, 19, 24, 29, 39]. Jain et al., 2008 [21] reported reliable SVD-based image watermarking algorithms which were capable of dealing the false positive problem. The authors embed the principal component of watermark into the host image rather than only the singular value of the watermark. These algorithms were based on the fact that SVD subspaces (left and right singular vectors) can preserve a significant amount of information about an image. Lai et al. [12] suggested a hybrid DWT-SVD watermarking procedure in which two halves of the watermark image are embedded into the two singular value matrices of intermediate frequency sub-bands obtained while taking one level DWT of host image. After embedding the watermark, the two halves are combined to get the watermarked image. At the time of the extraction reverse procedure is adopted to get the extracted watermark image. This particular watermarking technique has shown the significant improvement over the other parallel watermarking approaches in terms of imperceptibility and robustness under an assortment of attacks but at the same time it suffers from the problem of false positive. The SVD-based watermarking and its variations which have been reported through literature [3, 4, 7, 10, 12, 16, 17, 19, 24, 29, 39] mainly deals with robustness and impeccability issues while overlooking the problem of false positive associated copyright ownership. However Run et al. [34] suggested a watermarking scheme that solves the ambiguities and false positive problem but at the same time it suffers from the robustness and Imperceptibility of watermarked Image.

Through this paper an attempt has been proposed to highlight the problem of false positive occurring in Lai et al. [12] while maintaining the robustness and imperceptibility against a variety of attacks. The proposed approach is a hybrid one and based on DWT based transparent image watermarking algorithm through perceptual tuning and principal component of the watermark. The approach of perceptual tuning is based on the objective quality evaluation of watermarked images, which is essentially PSNR. Through the proposed algorithm the user can adjust the minimum required PSNR for watermarked images for maintaining the objective quality of images as well as watermark. The embedding strength will be modified on the basis of watermark and host image features in the wavelet domain as well as the tuning parameter. The principal component of intermediate frequency sub-bands of watermark image into singular values of intermediate frequency sub-bands of host image has been embedded. SVD subspaces contain the structural information of the decomposed image and are having a potential to be used for watermarking in juxtaposition with DWT. To avoid the possibility of false watermark extraction a concept private key has been adopted, which is necessary at the time of extraction. Thus the proposed watermarking algorithm is a kind of non-blind, mostly suitable for rightful ownership and also provides the adaptive behavior toward the image content for perceptual transparency.

Towards further organization, Section-2 gives the concise overview of the SVD, DWT and DWT-SVD based hybrid watermarking algorithm. Section-3 demonstrates the problem of false positive occurring in the hybrid DWT-SVD based algorithm proposed by Lai et al. [12] along with the theoretical and experimental support. The proposed watermarking embedding and extraction algorithm has been elaborated in section-4. Various experiments have been performed to make obvious robustness and reliability of the proposed algorithm in section-5. Section-5 also provides the graphical representation of comparative performance analysis on the basis of robustness and imperceptibility among various existing routines. Various discussions about the obtained results and associated conclusion have been accounted in section-6.

2 DWT-SVD based watermarking

2.1 Singular value decomposition

From the discernment of image processing an image can be viewed as a matrix with nonnegative scalar entries. SVD is an effective numerical analysis tool from linear algebra to decompose a rectangular matrix “A” into an orthogonal matrix U, diagonal matrix S, and the transpose of an orthogonal matrix V [3, 4, 7, 10, 12, 16, 17, 19, 24, 29, 32, 39]. SVD decomposes a given image A of size M × N as

$$ \begin{array}{*{20}c} {A = US{V^T}} \\ {A=\left[ {\begin{array}{*{20}c} {{u_{1,1 }}} & \ldots & {{u_{1,m }}} \\ {{u_{2,1 }},} & \cdots & {,{u_{2,m }}} \\ \vdots & \ddots & \vdots \\ {{u_{m,1 }},} & \cdots & {{u_{m,m }},} \\ \end{array}} \right]\left[ {\begin{array}{*{20}c} {{\sigma_{1,1 }}} & 0 & 0 \\ {0,} & {{\sigma_{2,2 }}} & {,0} \\ \vdots & \ddots & \vdots \\ {0,} & \cdots & {{\sigma_{m,n }},} \\ \end{array}} \right]{{{\left[ {\begin{array}{*{20}c} {{v_{1,1 }}} & \ldots & {{v_{1,n }}} \\ {{v_{2,1 }},} & \cdots & {,{v_{2,n }}} \\ \vdots & \ddots & \vdots \\ {{v_{n,1 }},} & \cdots & {{v_{n,n }},} \\ \end{array}} \right]}}^T}} \\ \end{array} $$

U and V are orthogonal matrices of size MxM and NxN, respectively. S is a diagonal matrix of size MxN having singular values and satisfy the property \( {\sigma_{1,1 }} > {\sigma_{2,2 }} > {\sigma_{3,3 }} > \ldots \ldots \ldots > {\sigma_{n,n }} $$.\)

It is worth noting that, the singular vectors of an image specify the image “geometry” similarly left singular vectors represent horizontal details and right singular vectors represent the vertical details of an image, while the singular values specify the “luminance” (energy) of the image[18, 20]. Slight variations in the singular values do not affect the visual perception of the quality of the image. It is this property, based on psycho-visual effect that allows one to embed the Watermark bits in the original image through minor modification of the singular values of the original image. Singular value decomposition exhibits the properties of transpose, flip, rotation, scale and translation invariance, which are common geometric distortion attacks. These geometric invariance properties make SVD a very favorable tool for watermarking.

2.2 Discrete wavelet transform

Recently DWT has received significant attention in various signal processing applications, including image watermarking due to its ability to provide sufficient information both for analysis and synthesis of the original signal, with a significant reduction in the computation time. The wavelet transform decomposes the image into three spatial directions, i.e. horizontal, vertical and diagonal and reflect the anisotropic properties of Human Visual System (HVS) [6, 11, 22, 33]. DWT-based watermarking schemes follow the same guidelines as DCT-based schemes, i.e. the underlying concept is the same; however, the process to transform the image into its transform domain varies hence the resulting coefficients are different. Wavelet transforms use wavelet filters to transform the image, i.e. Haar Wavelet Filter, Daubechies Orthogonal Filters and Daubechies Bi-Orthogonal Filters. Each of these filters decomposes the image into several frequencies. Single level harr decomposition gives four frequency representations of the images called as LL, LH, HL and HH sub-bands. The watermark can be embedded in a variety of sub-bands (either low frequency, mid frequency and high frequency) after wavelet decomposition of host and/or watermark image. Watermarks inserted in low frequency sub-bands are robust against various types of image processing attacks but at the same time it compromises with the perceptual quality of image. If mid frequency sub-bands (LH and HL) of host image are used to embed the watermark then the perceptual quality of embedded watermarked is superior, whereas not much robust against a wide range of attacks. The problem of reliability also exists if the watermark is embedded either by any or all mid and high frequency sub-bands.

2.3 DWT-SVD based hybrid watermarking

Lai et al. [12], proposed a watermarking scheme in which the watermark is divided into two parts and directly embedded into the singular values of LH and HL sub bands. After that the inverse of wavelet transform was performed to reconstruct the watermarked Image. Let A (x, y) and W (x, y) be the original host Image and watermark image respectively while α is embedding strength. The watermark embedding procedure according to Lai et al. [12] is given below.

2.4 Watermark embedding

  1. Step 1

    One level Discrete Haar wavelet transform (DWT) was applied on \( A(x,\ y\ ) \) to get the four sub bands \( (\ LL,LH,HL,HH) \)

  2. Step 2

    Apply the SVD to wavelet coefficients of LH and HL sub bands

    $$ \begin{array}{*{20}c} {\left[ {{U_{LH }},{S_{LH }},{V_{LH }}} \right]=SVD\left( {{A_{LH }}} \right)} \hfill \\ {\left[ {{U_{HL }},{S_{HL }},{V_{HL }}} \right]=SVD\left( {{A_{HL }}} \right)} \hfill \\ \end{array} $$
  3. Step 3

    Divide the watermark

    $$ W\left( {x,\ y} \right)={W_1}\left( {x1,\ y1} \right)+{W_2}\left( {x2,\ y2} \right) $$
  4. Step 4

    Modify the singular values of HL and LH sub bands with half of the watermark and apply SVD to them

    $$ \begin{array}{*{20}c} {{S^1}_{LH }={S_{LH }}+\alpha *{W_1}\left( {x1,\ y1} \right)} \hfill \\ {{S^2}_{HL }={S_{HL }}+\alpha *{W_2}\left( {x2,\ y2} \right)} \hfill \\ \end{array} $$
  5. Step 5

    Apply SVD to S LH and S HL

    $$ \begin{array}{*{20}c} {\left[ {{U_{W1 }},{S_{W1 }},{V_{W1 }}} \right]=SVD\left( {{S^1}_{LH }} \right)} \hfill \\ {\left[ {{U_{W2 }},{S_{W2 }},{V_{W2 }}} \right]=SVD\left( {{S^2}_{HL }} \right)} \hfill \\ \end{array} $$
  6. Step 6

    Now two set of modified coefficients has been obtained for LH and HL sub bands

    $$ \begin{array}{*{20}c} {{A^{*}}_{LH }=\left( {{U_{LH }}\ } \right)\left( {{S_{W1 }}} \right){{{\left( {{V_{LH }}} \right)}}^T}} \hfill \\ {{A^{*}}_{HL }=\left( {{U_{HL }}\ } \right)\left( {{S_{W2 }}} \right){{{\left( {{V_{HL }}} \right)}}^T}} \hfill \\ \end{array} $$
  7. Step 7

    Obtained the watermarked image \( {A^{*}}(x,\ y\ ) \) by applying the inverse DWT using the modified wavelet coefficients

Suppose \( {A^{*}}(x,\ y\ ) \) is the distorted watermarked Image then the watermark extraction procedure according to Lai et al. [12] is given below.

Watermark Extraction:

  1. Step 1

    One level Harr DWT was applied to \( {A^{*}}(x,\ y\ ) \) to get the four distorted sub bands (LL, LH, HL, HH)

  2. Step 2

    Apply SVD to LH and HL sub bands

    $$ \begin{array}{*{20}c} {\left[ {{U_{LH}}^{*},{S_{LH}}^{*},{V_{LH}}^{*}} \right]=SVD\left( {A_{LH}^{*}} \right)} \hfill \\ {\left[ {{U_{HL}}^{*},{S_{HL}}^{*},{V_{HL}}^{*}} \right]=SVD\left( {A_{HL}^{*}} \right)} \hfill \\ \end{array} $$
  3. Step 3

    Now compute the

    $$ \begin{array}{*{20}c} {{D_1}=\left( {{U_{W1 }}} \right)\left( {{S_{LH}}^{*}} \right){{{\left( {{V_{W1 }}} \right)}}^T}} \hfill \\ {{D_2}=\left( {{U_{W2 }}} \right)\left( {{S_{HL}}^{*}} \right){{{\left( {{V_{W2 }}} \right)}}^T}} \hfill \\ \end{array} $$
  4. Step 4

    Extract the part of watermark from both sub bands

    $$ \begin{array}{*{20}c} {{W_1}^{*}\left( {x1,y1} \right)=\left( {{D_1}-{S_{LH }}} \right)/\ \alpha } \hfill \\ {{W_2}^{*}\left( {x2,y2} \right)=\left( {{D_2}-{S_{HL }}} \right)/\ \alpha } \hfill \\ \end{array} $$
  5. Step 5

    Now combine the two watermarks to get the exact watermark

    $$ {W^{*}}={W_1}^{*}\left( {x1,\ y1} \right)+{W_2}^{*}\left( {x2,\ y2} \right) $$

Figures 1 and 2 respectively shows a block diagram of watermark embedding and the watermark extraction algorithm using Discrete Wavelet Transform-SVD (DWT-SVD) scheme as reported by Lai et al. [12].

Fig. 1
figure 1

Block diagram of watermark embedding technique given by Lai et al. [12]

Fig. 2
figure 2

Block diagram of watermark extraction technique given by Lai et al. [12]

3 Problem with SVD based watermarking

3.1 Problem of false positive

Due to the fact that in SVD based watermarking, the watermark image is embedded only in the singular values of the host image causes the false positive problem [35, 38]. One can show the presence of any watermark by using its left singular matrix (U) and right singular matrix (V) in place of embedded ones; such method cannot be used for rightful ownership and proper authentication of host image. It is well known fact that in SVD left singular matrix (U) and right singular matrix (V) preserve the major information about an image.

The detection of the watermark is mainly determined by these matrices not by diagonal matrix. By using the method given by Lai et al. [12], cameraman image of 128 × 128 dimensions has been embedded into the Lena image of 256 × 256 and asked for Pirate image. The correlation coefficient of the constructed watermarks to pirate image is 0.9805, causing the false positive problem.

Suppose \( A(x,\ y\ ) \) is a host image and W1 and W2 is two watermarks. After embedding these two watermarks into host image, we got two watermarked Image \( {A_1}(x,\ y) \) and \( {A_2}(x,\ y) \).

Following algorithm has been used to embed and extract the false watermark from two different watermarked Images.

3.1.1 Watermark embedding algorithm

  1. Step 1

    One level Harr DWT was applied on \( A(x,\ y\ ) \) to get the four sub bands \( (\ LL,LH,HL,HH) \)

  2. Step 2

    Apply the SVD to wavelet coefficients of LH and HL sub bands

    $$ \begin{array}{*{20}c} {\left[ {{U_{LH1 }},{S_{LH1 }},{V_{LH1 }}} \right]=SVD\left( {{A_{LH }}} \right)} \hfill \\ {\left[ {{U_{HL2 }},{S_{HL2 }},{V_{HL2 }}} \right]=SVD\left( {{A_{HL }}} \right)} \hfill \\ \end{array} $$
  3. Step 3

    Divide the watermark W 1 and W 2

    $$ \begin{array}{*{20}c} {W{{{\left( {x,\ y} \right)}}_1}=W_1^a\left( {x1,\ y1} \right)+W_1^b\left( {x2,\ y2} \right)} \hfill \\ {{W_2}\left( {x,\ y} \right)=W_2^a\left( {x1,y1} \right)+W_2^b\left( {x2,y2} \right)} \hfill \\ \end{array} $$
  4. Step 4

    Modify the singular values of HL and LH sub bands with half of the watermark and apply SVD to them

    $$ \begin{array}{*{20}c} {{S^a}_{LH }={S_{LH1 }}+\alpha *W_1^a\left( {x1,y1} \right)} \hfill \\ {{S^b}_{HL }={S_{HL2 }}+\alpha *W_1^b\left( {x2,\ y2} \right)} \hfill \\ {{S^c}_{LH }={S_{LH1 }}+\alpha *W_2^a\left( {x1,\ y1} \right)} \hfill \\ {{S^d}_{HL} = {S_{HL2 }}+\alpha *W_2^b\left( {x2,\ y2} \right)} \hfill \\ \end{array} $$
  5. Step 5

    Apply SVD on Sa LH ,Sb HL , Sc LH and Sd HL .

    $$ \begin{array}{*{20}c} {\left[ {{U_{W1 }},{S_{W1 }},{V_{W1 }}} \right] = SVD\left( {{S^a}_{LH }} \right)} \hfill \\ {\left[ {{U_{W2 }},{S_{W2 }},{V_{W2 }}} \right]=SVD\left( {{S^b}_{HL }} \right)} \hfill \\ {\left[ {{U_{W3 }},{S_{W3 }},{V_{W3 }}} \right]=SVD\left( {{S^c}_{LH }} \right)} \hfill \\ {\left[ {{U_{W4 }},{S_{W4 }},{V_{W4 }}} \right]=SVD\left( {{S^d}_{HL\ }} \right)} \hfill \\ \end{array} $$
  6. Step 6

    Now obtained two set of modified coefficients for LH and HL sub bands

    $$ \begin{array}{*{20}c} {{A^1}_{LH }=\left( {{U_{LH1 }}} \right)\left( {{S_{W1 }}} \right){{{\left( {{V_{LH1 }}} \right)}}^T}} \hfill \\ {{A^1}_{HL }=\left( {{U_{HL2 }}} \right)\left( {{S_{W2 }}} \right){{{\left( {{V_{HL2 }}} \right)}}^T}} \hfill \\ {{A^2}_{LH }=\left( {{U_{LH1 }}} \right)\left( {{S_{W3 }}} \right){{{\left( {{V_{LH1 }}} \right)}}^T}} \hfill \\ {{A^2}_{HL }=\left( {{U_{HL2 }}} \right)\left( {{S_{W4 }}} \right){{{\left( {{V_{HL2 }}} \right)}}^T}} \hfill \\ \end{array} $$
  7. Step 7

    Now obtained the two watermarked images \( {A_1}(x,\ y) \) and \( {A_2}(x,\ y) \) by applying the inverse DWT using the modified wavelet coefficients A 1 LH , A 1 HL , A 2 LH , A 2 HL.

Suppose \( {A_1}(x,\ y) \) and \( {A_2}(x,\ y) \) are two different watermarked Images then by using the following algorithm we can extract the false watermark from Lai et al. [24].

3.1.2 Watermark extraction algorithm

  1. Step 1

    One level Haar DWT has been applied to \( {A_1}(x,\ y) \) and \( {A_2}(x,\ y) \) to get the four sub bands (LL, LH, HL, HH)

  2. Step 2

    Apply SVD on possibly distorted LH and HL sub bands

    $$ \begin{array}{*{20}c} {\left[ {{U_{LH1}}^{*},{S_{LH1}}^{*},{V_{LH1}}^{*}} \right]=SVD\left( {{A^1}_{LH}^{*}} \right)} \hfill \\ {\left[ {{U_{HL2}}^{*},{S_{HL2}}^{*},{V_{HL2}}^{*}} \right]=SVD\left( {{A^1}_{HL}^{*}} \right)} \hfill \\ {\left[ {{U_{LH3}}^{*},{S_{LH3}}^{*},{V_{LH3}}^{*}} \right]=SVD({A^2}_{LH}^{*})} \hfill \\ {\left[ {{U_{HL4}}^{*},{S_{HL4}}^{*},{V_{HL4}}^{*}} \right]=SVD\left( {{A^2}_{HL}^{*}} \right)} \hfill \\ \end{array} $$
  3. Step 3

    Now D 1, D 2, D 3, D 4 has been computed by using U W and V W matrices used during embedding process.

    $$ \begin{array}{*{20}c} {{D_1}=\left( {{U_{W1 }}} \right)\left( {{S_{LH1}}^{*}} \right){{{\left( {{V_{W1 }}} \right)}}^T}} \hfill \\ {{D_2}=\left( {{U_{W2 }}} \right)\left( {{S_{HL2}}^{*}} \right){{{\left( {{V_{W2 }}} \right)}}^T}} \hfill \\ {{D_3}=\left( {{U_{W3 }}} \right)\left( {{S_{LH3}}^{*}} \right){{{\left( {{V_{W3 }}} \right)}}^T}} \hfill \\ {{D_4}=\left( {{U_{W4 }}} \right)\left( {{S_{HL4}}^{*}} \right){{{\left( {{V_{W4 }}} \right)}}^T}} \hfill \\ \end{array} $$
  4. Step 4

    Extract different parts of watermark from both LH and HL sub bands

    $$ \begin{array}{*{20}c} {W{{{_1^a}}^{*}}\left( {x1,\ y1} \right)=\left( {{D_1} - {S_{LH1 }}} \right)/\alpha } \hfill \\ {W{{{_1^b}}^{*}}\left( {x2,y2} \right)=\left( {{D_2} - {S_{HL2 }}} \right)/\alpha } \hfill \\ {W{{{_2^a}}^{*}}\left( {x1,y1} \right)=\left( {{D_3}-{S_{LH3 }}} \right)/\alpha } \hfill \\ {W{{{_2^b}}^{*}}\left( {x2,y2} \right)=\left( {{D_4}-{S_{HL4 }}} \right)/\alpha } \hfill \\ \end{array} $$
  5. Step 5

    Now different parts of watermark have been combined to get the exact watermark

    $$ \begin{array}{*{20}c} {W_1^{*}=W{{{_1^a}}^{*}}\left( {x1,y1} \right)+W{{{_1^b}}^{*}}\left( {x2,y2} \right)} \hfill \\ {W_2^{*}=W{{{_2^a}}^{*}}\left( {x1,y1} \right)+W{{{_2^b}}^{*}}\left( {x2,y2} \right)} \hfill \\ \end{array} $$
  6. Step 6

    Now we can extract the false watermark by using U W3, U W4, V W3and V W4 matrix of watermark W 2 and \( {S_{LH1}}^{*} \) and \( {S_{HL2}}^{*} \) matrix of watermark W 1.

    $$ \begin{array}{*{20}c} {{D^1}_{false }=\left( {{U_{W3 }}} \right)\left( {{S_{LH1}}^{*}} \right){{{\left( {{V_{W3 }}} \right)}}^T}} \hfill \\ {{D^2}_{false }=\left( {{U_{W4 }}} \right)\left( {{S_{HL2}}^{*}} \right){{{\left( {{V_{W4 }}} \right)}}^T}} \hfill \\ {{W^1}_{false}\left( {x1,\ y1} \right)=\left( {{D^1}_{false }-{S_{LH1 }}} \right)/\alpha } \hfill \\ {{W^2}_{false}\left( {x2,y2} \right)=\left( {{D^2}_{false }-{S_{HL2 }}} \right)/\alpha } \hfill \\ {{W_{false }}={W^1}_{false}\left( {x1,y1} \right)+{W^2}_{false}\left( {x2,y2} \right)} \hfill \\ {{W_{false }}\Rightarrow {W_2}} \hfill \\ \end{array} $$

Figure 3 shows the false positive problem of DWT-SVD based image watermarking proposed by Lai et al. [12]. Figure 3(a) and (b) are the host image of size 256 × 256 and watermark of size 128 × 128 respectively. Figure 3(c) is a watermarked image with the cameraman image and Fig. 3(d) depicts the desired watermark of pirate by using U W and V W matrix of pirate and singular value of watermarked image with cameraman.

Fig. 3
figure 3

a Host image b Original watermark c Watermarked Image d Extracted false watermark from Lai & Tsai [12]

4 Proposed watermarking process

The proposed scheme is based on the facts and observations about the various DWT-SVD based watermarking systems that to show the resistive behavior to normal signal and image processing and other attacks but suffers from the false positive problem. It’s well known to all that the robustness and imperceptibility are contradictory requirements for any efficient watermarking system. The embedding strength is selected similar or same for the all types of images, irrespective of the image contents. If the images to be inserted are different then they may pose perceptual distortions. Different watermark images will show totally indifferent performance in terms of visual transparency and robustness. Through the proposed approach the watermarking strength is modified according to the content of the image to be watermarked, hence showing an adaptive behavior in the DWT-SVD domain. Figures 4 and 5 has been consequently used to represent the block diagram of proposed watermark embedding and extraction algorithm.

Fig. 4
figure 4

Block diagram of proposed watermark embedding technique

Fig. 5
figure 5

Block diagram of proposed watermark extraction technique

The following sub-sections are describing the perceptual tuning matrix formulation, principal component and watermark embedding/extraction algorithm.

4.1 Perceptual tuning and formulation of embedding strength matrix

The proposed algorithm is based on perceptual tuning of embedding strength while considering the pixel-by-pixel mean square error after modification in approximate wavelet coefficients. Let the adopted watermarking algorithm be additive in nature and \( \mathrm{A},\ \mathrm{W}\ \mathrm{and}\ {{\mathrm{A}}_{\mathrm{w}}} \) be original-host, watermark and watermarked images of same size \( \mathrm{N}\times \mathrm{N} \) respectively. After taking the one level wavelet transform, the approximation, horizontal, vertical and diagonal details \( {{\mathrm{A}}_{\mathrm{LL}}},\ {{\mathrm{A}}_{\mathrm{LH}}},\ {{\mathrm{A}}_{\mathrm{HL}}},\ {{\mathrm{A}}_{\mathrm{HH}}} \) and \( {{\mathrm{W}}_{\mathrm{LL}}},\ {{\mathrm{W}}_{\mathrm{LH}}},\ {{\mathrm{W}}_{\mathrm{HL}}},\ {{\mathrm{W}}_{\mathrm{HH}}} \) of host and watermark image, has been obtained respectively. Similarly the approximation, horizontal, vertical and diagonal details for watermarked image are given as \( A_{LL}^w,A_{LH}^w,A_{HL}^w,A_{HH}^w \). Assuming the pixel-by-pixel embedding of approximation of watermark image into approximate part of host image, the pixel wise square error \( \mathrm{e}{{(\mathrm{i},\mathrm{j})}^2} \) is given by,

$$ e{{\left( {i,j} \right)}^2}={{\left( {{A_I}\left( {i,j} \right)-{A_{wI }}\left( {i,j} \right)} \right)}^2}:0\leq i \& j\leq N/2 $$
(1)

Similarly the pixel-by-pixel PSNR is calculated using the following relation,

$$ psnr\left( {i,j} \right)=10lo{g_{10 }}\left[ {\frac{{{P^2}}}{{e{{{\left( {i,j} \right)}}^2}}}} \right] $$
(2)

Where, P is the maximum possible gray scale pixel value, 255 for typical 8-bit images.

The pixel-wise PSNR is being related to the approximation coefficients, which is a low pass version of the watermark image, obtained as follows,

$$ psnr\left( {i,j} \right)=10lo{g_{10 }}\left[ {\frac{{{P^2}}}{{{{{\left[ {\beta \left( {i,j} \right).{{\mathrm{W}}_{\mathrm{LL}}}\left( {i,j} \right)} \right]}}^2}}}} \right] $$
(3)

Simplifying the (3) to find the β 1, which is a function of pixel-wise PSNR and approximation coefficients of watermark image.

$$ \begin{array}{*{20}c} {psnr\left( {i,j} \right)=20lo{g_{10 }}\left[ {\frac{P}{{\beta \left( {i,j} \right).{{\mathrm{W}}_{\mathrm{LL}}}\left( {i,j} \right)}}} \right]} \hfill \\ {\Rightarrow \frac{{psnr\left( {i,j} \right)}}{20 }=lo{g_{10 }}\left[ {\frac{P}{{\beta \left( {i,j} \right).{{\mathrm{W}}_{\mathrm{LL}}}\left( {i,j} \right)}}} \right]} \hfill \\ {\Rightarrow {10^{{\left( {\frac{{psnr\left( {i,j} \right)}}{20 }} \right)}}}=\frac{P}{{\beta \left( {i,j} \right).{{\mathrm{W}}_{\mathrm{LL}}}\left( {i,j} \right)}}} \hfill \\ \end{array} $$
(4)
$$ \Rightarrow {\beta_1}\left( {i,j} \right)=\left[ {\frac{P}{{{{\mathrm{W}}_{\mathrm{LL}}}\left( {i,j} \right){.10^{{\left( {\frac{{psnr\left( {i,j} \right)}}{20 }} \right)}}}}}} \right] $$
(5)

Once more simplifying the (3) to find the β 2, which is a function of pixel-wise PSNR and approximation coefficients of Host Image.

$$ \Rightarrow {\beta_2}\left( {i,j} \right)=\left[ {\frac{P}{{{{\mathrm{A}}_{\mathrm{LL}}}\left( {i,j} \right){.10^{{\left( {\frac{{psnr\left( {i,j} \right)}}{20 }} \right)}}}}}} \right] $$
(6)

The value of β matrix has been obtained by averaging the β 1 andβ 2, which is of dimension (N/2) × (N/2). So, instead of taking a fixed value of embedding factor a tuning matrix has been taken, adapting the watermark image content as well as host image content. Furthermore the horizontal and vertical details of host image have been modified with the tuning matrix β, obtained by considering the approximation coefficients of Host Image as well as Watermark Image.

4.2 Principal components of watermark

In order to overcome the problem of false positive the idea of embedding singular vectors matrix U along with the singular value matrix S has been exploited, because majority of image structural information is contained by left and right singular vectors, while energy by singular values . The principal component of the watermark [26] is calculated as multiplying U vector with singular value S of the Images. Let A and W be the original and watermark images respectively and corresponding SVD’s are given as,

$$ \begin{array}{*{20}c} {A\left( {i,j} \right)=U\left( {i,j} \right)S\left( {i,j} \right)V{{{\left( {i,j} \right)}}^T}} \hfill \\ {W\left( {i,j} \right)={U_w}\left( {i,j} \right){S_w}\left( {i,j} \right){V_w}{{{\left( {i,j} \right)}}^{T\ }}} \hfill \\ \end{array} $$

The principal component of watermark image has been computed as,

$$ \mathrm{A}{{\left( {\mathrm{i},\mathrm{j}} \right)}^{\mathrm{wa}}}={U_w}\left( {i,j} \right){S_w}\left( {i,j} \right). $$

The host as well as watermark image has been decomposed by applying the one level DWT to get the LL, LH, HL, HH sub-bands. Now the principal component of wavelet coefficients of LH and HL sub bands of watermark is calculated. These principal components are embedded with the singular value of the modified wavelet coefficient of LH and HL sub bands with a tuning matrix of Host image to improve perceptual quality of embedded watermarked, whereas the problem of robustness against a wide range of intentional and non-intentional attacks have been improved by using the principle components.

4.3 Secret Key generation

To secure the approximation details of the watermark idea of the private key has been exploited. The secret key has been generated at the time of watermark embedding with help of tuning matrix β. This key is generated while considering the standard deviation and the mean value of tuning matrix β and the tuning matrix β1 that is generated by considering the watermark only. We have computed the \( {{\mathrm{W}}_{\mathrm{key}}}(\mathrm{i},\mathrm{j}) \) matrix given as

$$ {W_{key }}\left( {i,j} \right)=\left( {\sqrt{{\ {\sigma_{\beta }}+{\mu_{\beta }}}}*\sqrt{\beta\ }} \right)/{\beta^1}\left( {i,j} \right) $$
(7)

This key is supposed to be used at the time of ownership verification by the actual owner hence of private nature. The key will act as a private key because it necessitates the requirement of host image as well as the watermark image. The key will be used to extract approximation details that will be used to generate the watermark. We can extract the approximation details of watermark by using Eq. (7) as

$$ \begin{array}{*{20}c} {{\beta^1}\left( {i,j} \right)=\left( {\sqrt{{\ \sigma \left( \beta \right)+m\left( \beta \right)}}*\sqrt{\beta\ }} \right)/{W_{key }}\left( {i,j} \right)} \hfill \\ {{{\mathrm{W}}_{\mathrm{LL}}}\left( {i,j} \right)=\frac{P}{{{\beta^1}\left( {i,j} \right){.10^{{\left( {\frac{{psnr\left( {i,j} \right)}}{20 }} \right)}}}}}} \hfill \\ \end{array} $$

4.4 Watermark embedding algorithm

Input [Host Image (A), Minimum Required Quality of Watermarked Image in terms of PSNR min , Watermark Image ( W )]

  1. Step 1

    Perform 1-level haar wavelet decomposition to the host image A l(i, j) and watermark image W l(i, j) where l ∊ {LL, LH, HL, HH}

  2. Step 2

    Take the minimum value PSNR min to compute the tuning matrix β expressed as

    $$ \begin{array}{*{20}c} {{\beta^1}\left( {i,j} \right)=\left[ {\frac{P}{{{W^J}\left( {i,j} \right){.10^{{\left( {\frac{{psnr\left( {i,j} \right)}}{20 }} \right)}}}}}} \right]} \hfill \\ {{\beta^2}\left( {i,j} \right)=\left[ {\frac{P}{{{A^J}\left( {i,j} \right){.10^{{\left( {\frac{{psnr\left( {i,j} \right)}}{20 }} \right)}}}}}} \right]} \hfill \\ {\beta \left( {i,j} \right)=\frac{{{\beta^1}\left( {i,j} \right)+{\beta^2}\left( {i,j} \right)}}{2}} \hfill \\ \end{array} $$

    Where J ∊ {LL}

    $$ {W_{key }}\left( {i,j} \right)=\left( {\sqrt{{\ \sigma \left( \beta \right)+m\left( \beta \right)}}*\sqrt{\beta\ }\ } \right)/{\beta^1}\left( {i,j} \right) $$
  3. Step 3

    The vertical and horizontal details of wavelet coefficients of A l(i, j) are modified with the tuning matrix β

    $$ \begin{array}{*{20}c} {{A^{{LH{{}^{*}}}}}\left( {i,j} \right)={A^{LH }}\left( {i,j} \right)/\beta \left( {i,j} \right)} \hfill \\ {{A^{{H{L^{*}}}}}\left( {i,j} \right)={A^{HL }}\left( {i,j} \right)/\beta \left( {i,j} \right)} \hfill \\ \end{array} $$
  4. Step 4

    Perform the SVD to perceptually tune wavelet sub bands \( {A^{{LH{{}^{*}}}}}\left( {i,j} \right) \) and \( {A^{{H{L^{*}}}}}\left( {i,j} \right) \) of host Image,

    $$ {A^K}\left( {i,j} \right)={U^K}\left( {i,j} \right){S^K}\left( {i,j} \right){V^K}^T\left( {i,j} \right), $$

    Where K =1, 2 represents two sub bands \( LH{{}^{*}} \& \ H{L^{*}} \)

  5. Step 5

    Perform the SVD to wavelet sub bands \( {W^{LH\ }}\left( {i,j} \right) \) and W HL(i, j) of watermark image

    $$ {W^{K\ }}\left( {i,j} \right)=U_w^K\left( {i,j} \right)S_w^K\left( {i,j} \right)V{{_w^K}^{T\ }}\left( {i,j} \right) $$

    Where K  =  1, 2 represents two sub bands \( LH\ \& \ HL \)

  6. Step 6

    To generate the principal component of watermark multiply the left singular vector and the singular value of the watermark sub-bands

    $$ {A^{waK }}\left( {i,j} \right)=U_w^K\left( {i,j} \right)S_w^K\left( {i,j} \right) $$
  7. Step 7:

    Add the principal component of the watermark sub-bands (LH, HL) into the singular value of the host image sub-bands (LH, HL).

    $$ S_{new}^K\left( {i,j} \right)={S^K}\left( {i,j} \right)+\alpha *{A^{waK }}\left( {i,j} \right) $$

    Where α refers to watermark strength and computed with help of tuning matrix β by considering host image as well as the watermark image.

  8. Step 8

    Compute the modified wavelet coefficients horizontal and vertical details as

    $$ {A_w}^K\left( {i,j} \right)={U^K}\left( {i,j} \right)S_{new}^K\left( {i,j} \right){V^K}^T\left( {i,j} \right) $$
  9. Step 9

    Carry out the inverse discrete wavelet transform (IDWT) on the modified coefficients to obtain the watermarked image, A w

Output [Watermarked Image (A w ),W key ]

4.5 Watermark extraction algorithm

Input [Host Image (A), Distorted Watermarked Image (A w *), Watermark Image (W), Key (W key )]

  1. Step 1

    Subtract the possibly attacked watermarked image with the original host image

    $$ \left( {{A_w}^{*}\left( {i,j} \right)\text{--} A\left( {i,j} \right)} \right)\Rightarrow {B_1}\left( {\mathrm{i},\mathrm{j}} \right) $$
  2. Step 2

    Perform 1-level discrete wavelet transform (DWT) on the subtracted image B 1(i, j) to get the {LL, LH, HL, HH} sub bands

  3. Step 3

    Compute the distorted principal components for \( LH\ \& \ HL \) sub bands

    $$ {A^{{wa\mathrm{K}*}}}\left( {i,j} \right)=\left[ {inverse\left( {{U^K}\left( {i,j} \right)} \right){B_1}^K\left( {i,j} \right)inverse\left( {{V^K}^T\left( {i,j} \right)} \right)} \right]/\beta \left( {i,j} \right) $$

    Where K = 1, 2 represents two sub bands \( LH\ \& \ HL \)

  4. Step 4

    Extract wavelet coefficient of watermark for \( LH\ \& \ HL \) sub-band

    $$ {A^{{wa\mathrm{K}*}}}\left( {i,j} \right)V{{_w^K}^{T\ }}\left( {\mathrm{i},\mathrm{j}} \right) $$
  5. Step 5

    Compute the LL sub band of Watermark from the key W key as given below

    $$ \begin{array}{*{20}c} {{\beta^{*1 }}\left( {i,j} \right)=\left( {\sqrt{{\ \sigma \left( \beta \right)+m\left( \beta \right)}}*\sqrt{\beta\ }\ } \right)/{W_{key }}\left( {i,j} \right)} \hfill \\ {{W^{J* }}\left( {i,j} \right)=\frac{P}{{{\beta^{*1 }}\left( {i,j} \right)\ {.10^{{\left( {\frac{{psnr\left( {i,j} \right)}}{20 }} \right)}}}}}} \hfill \\ \end{array} $$
  6. Step 6

    Apply one level inverse discrete wavelet transform (IDWT) on the distorted coefficients to recover watermark.

5 Experiment results and discussion

Through a variety of experiments attempt has been made to establish the effectiveness of the proposed watermarking algorithms. Several experiments have been performed on grayscale images “Lena” of size 256 × 256 and “Cameraman” of size 256 × 256 which are used as the cover image and the watermark, respectively. The capacity of a watermark and host image is same. Figure 6(a)–(b) has been given to show the host, watermark images respectively. In this section, the proposed scheme has been demonstrated for its robustness against a variety of attacks namely Average and Median Filtering, Gaussian noise addition, JPEG Compression, Cropping, Resize, Rotation, Histogram Equalization, Contrast Adjustment. The aforementioned experiments have been performed on watermarked image, while taking the Tuning Parameter = 30. The experimental results for specified tuning parameter have been shown in Fig. 6(a)–(b). Figure 6 provides clear evidences for the imperceptibility of the watermarked image, while \( \forall \alpha \in \left[ {\beta \left( {i,j} \right)} \right] \) the PSNR value obtained is up to standard. To verify the presence of watermark, different measures can be used to show the similarity between the original and the extracted singular values. In our proposed algorithm, normalized correlation coefficient (NCC) is used which is defined as,

Fig. 6
figure 6

a Host image b Watermarked Image

$$ NCC\left( {W,{W^{*}}} \right)=\frac{{\sum\limits_{I=1}^N {\sum\limits_{j=1}^N {\left( {{W_{ij }}-\overline{W}} \right)} } \left( {W_{ij}^{*}-\overline{W}_{ij}^{*}} \right)}}{{\sqrt{{\sum\limits_{I=1}^N {\sum\limits_{j=1}^N {{{{\left( {{W_{ij }}-\overline{W}} \right)}}^2}} } }}.\sqrt{{\sum\limits_{I=1}^N {\sum\limits_{j=1}^N {{{{\left( {W_{ij}^{*}-\overline{W}_{ij}^{*}} \right)}}^2}} } }}}} $$

Where W is the original watermark, W* is the extracted watermark from distorted image. Normalized Correlation coefficient (NCC) is the number that lies between [−1, 1].If the value of NCC is equal to 1 then the extracted watermark is just equal to the original one. To show the imperceptibility of watermarked image we have used the peak signal-to-noise ratio (PSNR) [1] given by following equations

$$ PSNR\left( {W,{W^{*}}} \right)=10{\log_{10 }}{{\left( {\frac{{{L_{\max }}}}{RMSE }} \right)}^2} $$

Where RMSE is the root mean square error defined as

$$ RMSE=\sqrt{{\frac{{\sum\nolimits_{i=1}^N {\sum\nolimits_{i=1}^M {{{{\left( {X\left( {i,j} \right)-{X^{*}}\left( {i,j} \right)} \right)}}^2}} } }}{{N\times M}}}} $$

The objective quality of the embedded host image has also been evaluated on the basis of wPSNR and the resultant watermarked images have been shown for variable values of embedding strength, where \( \forall \alpha \in \left[ {0,\ 1} \right]. \) The imperceptibility of the proposed watermarking algorithm has also been compared with the other reported parallel algorithms (Lai et al. [12], Jain et al. [19], Run et al. [34]), shown in Table 1. Addition of noise is a very common attack that is responsible for the degradation and distortion of the image. The watermark information is also degraded by noise addition and results in difficulty in watermark extraction. Robustness against additive noise is estimated by Gaussian noise of density 0.01. Figure 7(a), (b) & (c) shows the watermarked Lena Image after addition of Gaussian noise, extracted watermark and corresponding correlation coefficient. Figure 8 provides a performance comparison of the proposed method for Gaussian noise by adjusting the value of noise variance.

Table 1 Comparison of peak signal to noise ratio for each host image
Fig. 7
figure 7

a Watermarked Lena Image after adding additive Gaussian noise of density 0.01 b Extracted Watermark c Correlation coefficient

Fig. 8
figure 8

Performance of proposed watermarking method for different Gaussian noise parameters

The performance of proposed watermarking algorithms against the Gaussian noise attack is in close proximity of the Lai and Tsai, 2010 and far better than the other three algorithms.

Enlargement or reduction of an image is commonly performed and images may lose the required information including embedded watermark. For this attack, first the size of the watermarked image is reduced to 32 × 32 and again brought to its original size 256 × 256. Figure 9(a), (b) & (c) shows the Watermarked Lena Image after resizing to 256-32-256, extracted Watermark and corresponding correlation coefficient. Figure 10(a), (b) & (c) demonstrate the 50° rotated watermarked Lena image, extracted watermark and corresponding correlation coefficient of cameraman images respectively.

Fig. 9
figure 9

a Watermarked Lena Image after rescaling to 256-32-256 b Extracted Watermark c Correlation coefficient

Fig. 10
figure 10

a Watermarked Lena Image after rotating 50° b Extracted Watermark c Correlation coefficient

The effect of rotation has been evaluated and compared for varying degrees of rotation between 10 and 50 and shown through Fig. 11. The proposed algorithm is quite resistant against rotation attack and proves superiority over the other existing algorithms.

Fig. 11
figure 11

Performance of the proposed watermarking method by varying the degree of rotation

Filtering is most common manipulation in digital image processing. The degraded image and extracted watermarks, after applying 13 × 13 averaging filter and median filter are shown in the Figs. 12 and 13 respectively.

Fig. 12
figure 12

a Watermarked Lena Image after 13 × 13 Average Filtering b Extracted Watermark c Correlation coefficient

Fig. 13
figure 13

a Watermarked Lena Image after Median Filtering b Extracted Watermark c Correlation coefficient

It can be observed that after applying these filters, watermarked image gets degraded and lot of data is lost but the extracted watermark is in good stipulation. Figure 14 provides a performance comparison for Average filtering attack by varying the filter size and the proposed method confirms the improvement over the existing methods.

Fig. 14
figure 14

Performance of proposed watermarking method by varying the filter size

To check the robustness of the watermark against Image Compression, the watermarked image is tested with JPEG compression attacks.

The extracted watermark and correlation coefficient of the cameraman from compressed images of Lena at quality factor =50 is shown in Fig. 15(a–c). Figure 16 provides a performance comparison of the proposed method for JPEG compression attack by varying the quality factor. It has been derived that the performance of the proposed algorithm is close to the algorithm proposed by Lai et al. [12] and Ganic et al. [16] while superior over the algorithm proposed by Jain et al. [21] and Liu et al. [29].

Fig. 15
figure 15

a-d Watermarked Lena Image at quality factor =50 b Extracted Watermark c Correlation coefficient

Fig. 16
figure 16

Performance of proposed watermarking method by varying the value of quality factor

Image cropping is frequently used process of selecting and removing a portion of an image to create focus or strengthen its composition.

Figure 17(a), (b) &(c) shows the watermarked image after cropping, extracted watermark and correlation coefficient. Cropping an image is a lossy operation where we remove either rows or columns. In our approach 50 % of the watermarked image is cropped and then a watermark is extracted and obtained NCC is 0.9665. For Contrast Adjustment, the contrast of the watermarked image is increased by 20 % shown in Fig. 18(a), extracted watermark in Fig. 18(b) and corresponding correlation coefficient in Fig. 18(c).

Fig. 17
figure 17

a Watermarked Lena Image after cropping b Extracted Watermark c Correlation coefficient

Fig. 18
figure 18

a Watermarked Lena Image after contrast adjustment b Extracted Watermark c Correlation coefficient

Figure 19 illustrates a performance comparison by adjusting the contrast of watermarked image and proposed method shows the similar results as shown by Lai et al. [12] forCA ≤ 1.

Fig. 19
figure 19

Performance of proposed watermarking method with varying the Contrast

The proposed scheme has been tested against forging of image to detect the tamper and localization in watermarked Image. Figure 20(a), (b) & (c) shows the watermarked image after forging at the right bottom, extracted watermark and corresponding correlation coefficient in that order. It can be observed that the proposed scheme is not suitable for temper detection and localization of error in watermarked Image as we have extracted watermark with high correlation value.

Fig. 20
figure 20

a Watermarked Lena Image after forging b Extracted Watermark c Correlation coefficient

Printing of an Image is a most useful application that is being used in our daily life. To demonstrate the effectiveness against this attack, first the watermarked Image has been printed on an A4 sheet and then scanned the same by using 200dpi. Figure 21(a) & (b) shows the watermarked image after printing & scanning and extracted watermark. The NCC value for the extracted watermark is 0.64.

Fig. 21
figure 21

a Watermarked Lena Image after Printing & Scanning b Extracted Watermark c Correlation coefficient

The performance of a proposed watermarking algorithm has been reported in Table 2. It represents the value of Normalized Correlation Coefficient (NCC) against numerous attacks as reported in Run et al. [34], Matty et al. [30], Ahahmad et al. [31] and Bao et al. [4] . It can be observed that the proposed algorithm outperforms in comparison to various other mentioned watermarking algorithms.

Table 2 Normalized correlation coefficient

5.1 Reliability test against false positive problem

The experiment has been conducted to test the reliability of the proposed algorithm. Figure 22(a), (b) and (c) shows the watermarked image, original watermark and the distorted reference watermark having NCC value 0.42 by using pirate image. Since a secret key has been used, at the time of extraction to secure the low frequency component, due to this reason watermark extraction without knowing the tuning matrix β is not possible. Suppose any one try to extract the approximation details of the watermark by their own false \( {{\mathrm{W}}^{*}}_{\mathrm{key}}\left( {\mathrm{i},\mathrm{j}} \right) \) that is generated by different watermark image. The generation of \( {{\mathrm{W}}^{*}}_{\mathrm{key}}\left( {\mathrm{i},\mathrm{j}} \right) \) will be same as Eq. (7)

Fig. 22
figure 22

a Watermarked Lena Image b Extracted original Watermark c Extracted false watermark from proposed method

$$ {{\mathrm{W}}^{*}}_{\mathrm{key}}\left( {\mathrm{i},\mathrm{j}} \right)=\left( {\sqrt{{\ {\sigma_{{\beta *}}}+{\mu_{{\beta *}}}}}*\ \sqrt{{{\beta^{*}}\ }}} \right)/{\beta^{*1 }}\left( {i,j} \right) $$

Where \( {\upbeta^{*1 }}\left( {\mathrm{i},\mathrm{j}} \right) \) is the tuning matrix calculated through false watermark and β* is computed by averaging the \( {\upbeta_2}\left( {\mathrm{i},\mathrm{j}} \right) \) and \( {\upbeta^{*1 }}\left( {\mathrm{i},\mathrm{j}} \right) \) matrix. Consequently it can be observed that \( {{\mathrm{W}}^{*}}_{\mathrm{key}}\left( {\mathrm{i},\mathrm{j}} \right)\ne {{\mathrm{W}}_{\mathrm{key}}}\left( {\mathrm{i},\mathrm{j}} \right) \). Hence, no reference image can be extracted from any arbitrary image using our proposed algorithm.

6 Conclusion

Through this paper, a modified hybrid wavelet-based transparent image watermarking algorithm through perceptual tuning has been presented, which is based on DWT and SVD, where the principal component of the watermark is added on the singular values of the cover image’s DWT sub bands. Due to the embedding of only principal components of watermark the information about the entire watermark is not available without a prior knowledge of the original watermark. The proposed algorithm avoids the pitfall encountered by Lai et al. [12] and improves the imperceptibility in comparison to the method proposed by Run et al. [35]. By conducting several experiments, the conclusion has been derived; that the proposed method can solve the false positive problem and it also shows a good PSNR value as reported through Table 1. The use of a key has been suggested which is a combination of perceptually tuned matrices of DWT coefficients of watermark image as well as host image at the time of watermark extraction and ensures copy right of ownership. Results of the proposed technique indicate that it preserves the imperceptibility and the robustness under various types of image processing attacks. The algorithm is also robust against the print and scan attack while lacking in case of forging and morphing attack hence requires improvement in future. Moreover the algorithm is adaptive and having the capability of producing the targeted quality of watermarked image and user/application oriented.