1 Introduction

Distribution of multimedia data has become widespread with the development of internet and mobile technologies. These multimedia data, consisting of digital images, video, audio and texts, can easily be copied and modified. Therefore, the protection of the copyright of these data has become important. Digital watermarking has emerged to provide copyright protection and has become one of the most widely used methods. The process of embedding or hiding a digital data as a watermark into another digital data, and then extracting the hidden information can be defined as digital watermarking [72]. Digital watermarking is also used in application areas such as content authentication, digital forensic, content identification and management, fingerprinting, tamper detection, broadcast monitoring and media file archiving [36].

Digital image watermarking, which is categorized into two classes such as visible and invisible, is the most commonly used watermarking technique. Visible watermarks are visual patterns like logos or labels that can easily be perceived. These watermarks are inserted into an image to specify the content ownership [44]. Invisible watermarks are embedded into unknown parts of an image and cannot be perceived by the human vision system [6]. Depending on the requirements of the application, invisible image watermarking techniques should have major characteristics such as imperceptibility, robustness, security and computational complexity. The digital watermark should be invisible in a watermarked image [33]. The watermark should still be detectable even if intentional or unintentional attacks are applied on the watermarked image [27]. Secret keys should be used in the watermarking technique in order to ensure security against attacks [76]. In copyright protection, the watermarking method should have high computational complexity.

Image watermarking techniques can be generally classified namely spatial domain and transform domain. Watermark embedding is performed by modifying the gray-level pixel values of the original image in spatial domain watermarking techniques [43, 52, 68]. In the transform domain, watermarks can be embedded by modifying the frequency coefficients of discrete Fourier transform [25, 55, 66], discrete cosine transform (DCT) [28, 40, 64], discrete wavelet transform (DWT) [8, 19, 35], Karhunen-Loeve transform [9, 10], Hadamard transform [16, 38] and Contourlet transform [13, 70]. Apart from these transform domain techniques, vector quantization and singular value decomposition (SVD) based image watermarking techniques have also been proposed. In vector quantization based techniques, the watermark is compressed by the quantization methods and then embedded into the original image in the vector quantization domain [29, 51]. In SVD based techniques, the watermark embedding is performed by using the diagonal matrix of the original image [4, 71].

With respect to the application area, image watermarking techniques can be categorized as fragile, semi-fragile, and robust [29]. Fragile and semi-fragile watermarking techniques are used for integrity identification, content authentication and tamper detection [5, 49, 67]. Robust watermarking techniques are mainly used for the purpose of copyright protection, ownership identification, and fingerprinting. Therefore, robust watermarking techniques should be able to resist against intentional and unintentional image modifications or attacks such as rotation, scaling, filtering, compression, noise addition etc. [3, 82]. DCT and DWT are most widely used transform domain methods for robust watermarking. DCT has excellent energy compaction property; thus, it can achieve more robustness against lossy compression attacks [31, 33, 81]. DCT based watermarking can be performed by applying DCT either on the whole image [14, 63] or on non-overlapping blocks [42, 47]. On the other hand, DWT provides excellent spatio-frequency localization properties [65, 81]. It decomposes the image hierarchically into set of low-low (LL), high-low (HL), low-high (LH) and high-high (HH) bands. DWT can identify the regions in the cover image in order to embed the watermark imperceptibly. Furthermore, in robust watermarking techniques, in order to increase the security, scrambling transformations have been used to shuffle watermark information before embedding [39, 74, 83]. Arnold transformation is one of the simplest and most popular method for watermark image scrambling [77].

Most of the robust watermarking techniques have been developed for grayscale images. Block based DCT watermarking schemes have been commonly used in robust watermarking area [48, 64]. In these schemes, cover image has been divided into non-overlapping blocks and DCT has been performed on each block separately to obtain low frequency, middle frequency and high frequency sub-bands [32]. Watermark embedding has been generally performed in the middle frequency sub-bands [26, 73]. DWT based watermarking schemes have also been improved for robust watermarking. In these schemes, cover image has been decomposed into one-level [24, 41] or multi-level decomposition [1, 80] by Haar wavelet transform. Then, watermark has been commonly embedded into LL band of the decomposed image. Moreover, in the past decades, many watermarking techniques have been proposed for color images. In most of these techniques, RGB color space of the cover image has been converted to YCbCr color space [7, 39, 59,60,61, 76]. Then, YCbCr color space of the cover image has been separated into luminance (Y) and chrominance (Cb and Cr) components. The watermark has been usually embedded into the luminance component in these techniques. Furthermore, in recent years, DWT and DCT based hybrid methods have been improved for robust watermarking [18, 34, 54, 79, 84]. In these methods, firstly DWT has been applied to the cover image to obtain the LL band. Then, DCT has been implemented to the obtained LL band. Watermark embedding has been performed by modifying the DCT coefficients of the LL band.

By considering the advantages of DCT and DWT algorithms in robust watermarking applications, as mentioned above, a novel DCT-DWT based hybrid color image watermarking method is proposed in this paper. Unlike the aforementioned methods, firstly global DCT has been applied to RGB cover image’s color components in the proposed method. Then, one-level DWT has been performed to the DCT coefficients of each color components. Grayscale image is used as a watermark in this method. The watermark image has been scrambled by using Arnold transform. DCT has been applied to the scrambled watermark image. Then, transformed watermark image has been divided into equal smaller parts. DCT coefficients of each watermark parts have been embedded into LL, HL, LH and HH bands of each color components of the cover image. The proposed method provides high robustness and imperceptibility due to embedding watermark parts separately into all the DWT bands of the each color components of the cover image. The robustness of the proposed color image watermarking has been evaluated by applying linear and nonlinear attacks to the watermarked images. Normalized Correlation (NC) values between the extracted watermark and the original watermark have been used to determine the robustness of the proposed algorithm. The Peak Signal to Noise Ratio (PSNR) value between the original image and the watermarked image has also been used to determine the imperceptibility and transparency.

The main contributions of this paper are as followings: 1) we introduce a new robust DCT-DWT based hybrid color image watermarking method, in which firstly global DCT is applied to RGB cover image’s color components and then one-level DWT has been performed to the DCT coefficients of the each color components; 2) we divide grayscale watermark image into 12 equal smaller parts, and then we have embedded the DCT transformed watermark parts separately into all the DWT bands of the each color components of the RGB cover image; 3) we apply various attacks (such as rotation, noise addition, image filtering, resizing and etc.) to the watermarked images, and we achieve high robustness.

The organization of the paper is as follows: Section 2 provides a literature review. Section 3 describes the proposed watermark embedding and extracting methods. Experimental results are demonstrated in Section 4. The conclusion and future work are given in Section 5.

2 Related work

In recent years, researchers have studied to improve DCT and DWT based color image watermarking methods. Lin et al. [39] proposed a DCT-based image watermarking method against JPEG compression. In this method, binary watermark image was permuted based on Torus automorphism and then it was embedded into the low-frequency bands of DCT transformed luminance component of the cover image. Su et al. [69] presented a robust color image watermarking method based on two-level DCT. Color watermark image was embedded into the direct current (DC) and the alternating current (AC) coefficients of the color cover image using one-level and two-level DCT transformations in this method. Parah et al. [47] proposed a blind and robust DCT based color image watermarking method, where the watermark embedding was performed by using inter-block coefficient differencing. Roy and Pal [57] presented a DCT based color watermarking method, in which two binary watermarks were embedded into color image. In this method, binary watermarks were scrambled using Arnold transform and then they were embedded into the middle-frequency bands of the DCT transformed green and blue components of the cover image. Chang et al. [12] proposed a DCT based color image watermarking method using two-dimensional Linear Discriminant Analysis scheme in YIQ color space. In this method, two binary watermarks were embedded into the AC coefficients of DCT transformed quadrature chrominance component of the cover image. Moosazadeh and Ekbatanifard [42] presented a DCT based robust image watermarking method in YCoCg color space. Arnold transformed binary watermark was embedded into the luminance component of the cover image by using block-based DCT coefficients relationship. Gao et al. [17] proposed a 2-level DWT based color image watermarking method. Arnold transformed grayscale watermark image was embedded into the LL bands of DWT transformed blue and green components of the cover image in this method. Giri et al. [20] presented a DWT based color image watermarking method, where watermark was embedded into the HL band of one-level DWT transformed cover image. Gupta et al. [21] improved the DWT based color image watermarking method using artificial bee colony algorithm and uncorrelated color space. In this method 3-level DWT decomposition was applied on each color components of the cover image and LL, HL, LH, and HH bands were chosen for embedding process. Huynh et al. [30] presented a selective bit watermark embedding method in the one-level wavelet domain. In this method, grayscale watermark was embedded into the middle-frequency bands of the two optimal color channels of cover image by using difference quantization algorithm. Rosales-Roldan et al. [56] proposed DWT, DCT, and SVD based color image watermarking methods using quantization index modulation technique. In these methods, QR code generated with the personal information was used as a binary watermark sequence and watermark embedding was performed in the luminance component of the cover image. In the DWT based method, two-level decomposition was performed, and the LL band was used for watermark embedding.

Hybrid methods have also been developed by the researchers using transform domain techniques. Sari et al. [61] presented a SVD-DCT based color image watermarking method. In this method, singular values of the binary watermark image were embedded into the SVD performed DC coefficients of the luminance component of the cover image. Li et al. [38] proposed a quaternion DCT (QDCT) and SVD based color image watermarking method, in which encrypted binary hologram watermark was generated by using computer-generated hologram technique and particle swarm optimization algorithm. The encrypted hologram watermark was embedded into the QDCT-SVD transformed cover image in this method. Bajracharya and Koju [7] presented a SVD-DWT based image watermarking method in YCbCr color space. Singular values of the 3-level DWT transformed red color component of the watermark image were embedded into the singular values of the 4-level DWT transformed luminance component of the cover image. HH band was chosen for embedding process in this method. Vaidya and Mouli [76] proposed a color image watermarking method based on multiple decompositions such as DWT, contourlet transform, Schur decomposition and SVD. In this method, singular values of the Arnold transformed grayscale watermark image were embedded into the multiple decomposition performed LL band of the DWT transformed luminance component of the cover image. Rasti et al. [53] presented a color image watermarking method based on DWT, SVD, orthogonal-triangular decomposition, and chirp z-transform. Singular values of the grayscale watermark image were embedded into the multiple decomposition performed LL band of the 2-level DWT transformed cover image based on entropy of each color components in this method. Roy et al. [60] proposed a DWT-SVD based color image watermarking method in YCbCr color space. 4-level DWT was applied to Cb component of the cover image. In this method, singular values of the watermark were embedded into singular values of the Cb component of the cover image in the HL band. Lakrissi et al. [37] presented a DWT-SVD based dynamic color image watermarking method. 3-level DWT was applied to luminance component of the cover image and a dynamic block was selected randomly using a pseudo random generator from the LL band. In this method, encrypted binary watermark was embedded into the singular values of the selected dynamic block. Roy and Pal [58] proposed a DWT-SVD based image watermarking method for copyright protection and authentication of color images. Block based 3-level DWT was applied to the luminance component of the cover image. In this method, decomposed watermark image blocks were embedded into the singular values of the DWT transformed blocks. Also, Roy and Pal [59] improved a similar study by using block based redundant DWT and SVD algorithms, in which Arnold scrambled grayscale watermark was used. Pandey et al. [45, 46] presented a stationary wavelet transform (SWT) and SVD based image watermarking methods in YCbCr color space. SWT and SVD were applied to the luminance components of the color watermark and the cover image. In these methods, singular values of the color watermark were embedded into corresponding singular values of the cover image in the LL band. Gill and Soni [18] proposed a color image watermarking method based on DCT and DWT. DCT coefficients of the red color component of the watermark image were embedded into the DCT transformed red color component of the cover image. Also, in this method, DWT decomposition was applied on green and blue color components of the watermark and the cover images, and the watermark embedding was performed by using the LL band. Kalra et al. [33] presented a color image watermarking method using DWT and DCT. In this method, DWT was performed on luminance color component of the cover image, and the binary watermark image was encrypted using Hamming codes, Chaos and Arnold transform. Encrypted watermark image was embedded into the DCT transformed HL band of the cover image. Chaitanya et al. [11] proposed a DWT-DCT-SVD based color image watermarking method. 2-level DWT decomposition was applied on blue color component of the cover image, and by using median energy a sub-band was chosen for embedding process in this method. Singular values of the grayscale watermark image were embedded into the singular values of the DCT transformed sub-band of the cover image. Divecha and Jani [15] presented a DWT-DCT-SVD based color image watermarking method, where 2-level DWT decomposition was applied on color components of the cover image. Singular values of the color watermark image were embedded into the singular values of the DCT transformed LL-HH sub-bands of the cover image. Similar study was proposed by Hallur et al. [22], in which red color component was used for watermark embedding process. Zear et al. [81] improved the DWT-DCT-SVD based watermarking method using Back Propagation Neural Network for healthcare applications, where three watermarks were used such as medical image, the signature code and diagnostic information. He and Hu [23] presented a DWT-DCT-SVD based color image watermarking method in YUV color space. One-level DWT decomposition was applied to the luminance component of the cover image. Arnold scrambled watermark image was embedded into the singular values of DCT transformed HH band of the cover image. Similar study was proposed by Xu et al. [79], in which LL band of the cover image was used for watermark embedding. Al-Afandy et al. [2] presented DWT-SVD based and Stationary Wavelet Transform (DSWT)-DCT based color image watermarking methods. In DWT-SVD based method, one-level DWT decomposition was applied to each color components of the cover image. The watermark was embedded into the singular values of the LL bands of each color components. On the other hand, in DSWT-DCT based method, the DCT was applied on each color components of the cover image. Then, 3-level DSWT was performed to the DCT coefficients of the color components and watermark embedding was performed in the LL band. Thanki and Borra [75] proposed Finite Ridgelet Transform (FRT) and DWT based color image watermarking method. FRT was applied to each color components of the cover image. Then, one-level DWT was performed to the ridgelet coefficients of each color components. In this method, Arnold scrambled color watermark image was embedded into the wavelet coefficients in the LL band.

In the literature, most of the color image watermarking techniques have been developed based on DCT and DWT transform domains. Block based DCT watermarking techniques have been commonly used, in which DCT has been performed on non-overlapping blocks of the cover image, and watermark embedding has been generally performed in the middle frequency sub-bands. On the other hand, in DWT watermarking techniques, multi-level decomposition has been usually used which decomposes the cover image hierarchically into set of LL, HL, LH, and HH sub-bands. Watermark embedding has been commonly performed in the LL sub-band in these techniques. Moreover, DWT, DCT, and SVD based hybrid color image watermarking methods have been improved in recent years. In most of these methods, firstly multi-level DWT has been applied to the cover image. Then, only one sub-band (generally the LL sub-band) has been selected for watermark embedding. Block based DCT has been applied to the selected sub-band. Finally, watermark has been generally embedded into the singular values of the DCT transformed sub-band. Furthermore, in most of the color image watermarking techniques, RGB color space of the cover image has been converted to YCbCr color space, and the watermark has been usually embedded only into the luminance color component.

In this paper, an efficient DCT-DWT based hybrid color image watermarking method in RGB color space is proposed. Unlike the related methods, firstly global DCT has been performed to each color components of the RGB cover image in the proposed method. Then, one-level DWT has been applied to the DCT coefficients of each color components. In this method, grayscale image has been used as a watermark. Before embedding process, this watermark image has been scrambled by using Arnold transform. DCT has been implemented to the scrambled watermark image. Then, DCT transformed watermark image has been divided into 12 equal smaller parts. Finally, DCT coefficients of each watermark parts have been embedded into LL, HL, LH and HH bands of each color components of the RGB cover image. By embedding the watermark parts separately into all the DWT bands of each color components of the cover image, high robustness and imperceptibility have been obtained with the proposed method.

3 Proposed method

DCT and DWT based color image watermarking method is proposed to provide copyright protection. The proposed method consists of two main parts; watermark embedding and watermark extracting.

3.1 Watermark embedding method

The block diagram of the proposed watermark embedding method is given in Fig. 1. Also, the pseudocode form of the watermark embedding process is presented in Algorithm 1. In this method grayscale watermark image of size 96x96 is embedded into the RGB cover image of size 1024x1024x3. The basic steps of the watermark embedding method are as follows:

  1. 1.

    Separate the original RGB cover image, Io, into color components of red, green and blue, \( {I}_c^o\left(c=R,G,B\right) \).

  2. 2.

    Apply DCT to each color components:

Fig. 1
figure 1

Block diagram of proposed watermark embedding method

$$ {I}_c^{DCT}= DCT\left({I}_c^o\right) $$
  1. 3.

    Apply one-level DWT using Haar wavelet to each DCT coefficients of the color components to obtain 512x512 LLc, LHc, HLc, HHc bands:

$$ {LL}_c,{LH}_c,{HL}_c,{HH}_c= DWT\left({I}_c^{DCT}\right) $$
  1. 4.

    Scramble the grayscale watermark image, W, using Arnold transform.

  2. 5.

    Convert the 96x96 scrambled watermark, Ws, to 9216x8 binary watermark, Wbin.

  3. 6.

    Divide the binary watermark, Wbin, into three parts, and by using zero-padding obtain three 160x160 binary watermark blocks, Wc(c = R, G, B).

  4. 7.

    Apply DCT to each watermark block:

$$ {W}_c^{DCT}= DCT\left({W}_c\right) $$
  1. 8.

    Divide DCT coefficients of each 160x160 watermark block into 80x80 non-overlapped sub-blocks:

$$ {W}_c^{DCT}=\bigcup \limits_{k=1}^2\bigcup \limits_{l=1}^2{W}_c^{DCT}\left(k,l\right)\kern0.5em $$
  1. 9.

    Insert each 80x80 sub-block into the upper left corner of 512x512 zero matrix to obtain four 512x512 watermark blocks, Wc, s(c = R, G, B and s = A, B, C, D), for each color component’s DWT bands.

  2. 10.

    Embed the watermark blocks, Wc, s, into the coefficients of the LLc, LHc, HLc, and HHc bands by using scaling factor, k, for each color components:

    $$ {\displaystyle \begin{array}{c}L{L}_{c,w}=L{L}_c+{W}_{c,A}\ast k\\ {}L{H}_{c,w}=L{H}_c+{W}_{c,B}\ast k\\ {}H{L}_{c,w}=H{L}_c+{W}_{c,C}\ast k\\ {}H{H}_{c,w}=H{H}_c+{W}_{c,D}\ast k\end{array}} $$
  3. 11.

    Apply inverse DWT (IDWT) to LLc, w, LHc, w, HLc, w, and HHc, w bands for each color components:

$$ {I}_{c,w}^{DCT}= IDWT\left({LL}_{c,w},{LH}_{c,w},{HL}_{c,w},{HH}_{c,w}\right) $$
  1. 12.

    Apply inverse DCT (IDCT) to obtain watermarked color components:

$$ {I}_{c,w}= IDCT\left({I}_{c,w}^{DCT}\right) $$
  1. 13.

    Reconstruct watermarked color components, IR, w, IG, w, and IB, w to obtain watermarked color image, Iw.

Algorithm 1: Watermark Embedding Process

figure c

3.2 Watermark extracting method

The block diagram of the proposed non-blind watermark extracting method is illustrated in Fig. 2. In addition, the pseudocode form of the watermark extracting process is given in Algorithm 2. Original RGB cover image is required to extract the watermark image in the proposed method. The basic steps of the watermark extracting method are as follows:

  1. 1.

    Separate the original cover image, Io, and watermarked image, Iw, into red, green and blue color components, \( {I}_c^o \) and \( {I}_c^w, \) (c = R, G, B).

  2. 2.

    Apply DCT to each color components of the watermarked image:

    $$ {I}_{c,w}^{DCT}= DCT\left({I}_c^w\right) $$
  3. 3.

    Apply one-level DWT to each DCT coefficients of the color components of the watermarked image to obtain LLc, w, LHc, w, HLc, w, HHc, w bands:

Fig. 2
figure 2

Block diagram of proposed watermark extracting method

$$ {LL}_{c,w},{LH}_{c,w},{HL}_{c,w},{HH}_{c,w}= DWT\left({I}_{c,w}^{DCT}\right) $$
  1. 4.

    Apply DCT to each color components of original cover image:

$$ {I}_c^{DCT}= DCT\left({I}_c^o\right) $$
  1. 5.

    Apply one-level DWT to each DCT coefficients of the color components of original cover image:

    $$ {LL}_c,{LH}_c,{HL}_c,{HH}_c= DWT\left({I}_c^{DCT}\right) $$
  2. 6.

    Extract four 512x512 watermark blocks, \( {W}_{c,s}^{ext} \), from the coefficients of the LLc, w, LHc, w, HLc, w, and HHc, w bands by using scaling factor, k, for each color components:

    $$ {\displaystyle \begin{array}{c}{W}_{c,A}^{ext}=\left(L{L}_{c,w}-L{L}_c\right)./k\\ {}{W}_{c,B}^{ext}=\left(L{H}_{c,w}-L{H}_c\right)./k\\ {}{W}_{c,C}^{ext}=\left(H{L}_{c,w}-H{L}_c\right)./k\\ {}{W}_{c,D}^{ext}=\left(H{H}_{c,w}-H{H}_c\right)./k\end{array}} $$
  3. 7.

    Get four 80x80 sub-blocks from the upper left corners of 512x512 extracted watermark blocks, \( {W}_{c,s}^{ext} \), for each color components.

  4. 8.

    Merge the 80x80 sub-blocks to obtain 160x160 extracted watermark DCT coefficients, \( {W}_c^{\mathit{\operatorname{ext}}, DCT} \).

  5. 9.

    Apply IDCT to each 160x160 extracted watermark DCT coefficients for each color components:

    $$ {W}_c^{ext}= IDCT\left({W}_c^{\mathit{\operatorname{ext}}, DCT}\right) $$
  6. 10.

    Merge three 160x160 color watermark blocks (\( {W}_R^{ext} \), \( {W}_G^{ext} \), and \( {W}_B^{ext} \)) and reconstruct 9216x8 extracted binary watermark, \( {W}_{bin}^{ext} \).

  7. 11.

    Convert the 9216x8 extracted binary watermark, \( {W}_{bin}^{ext} \), to 96x96 grayscale scrambled watermark, \( {W}_s^{ext} \).

  8. 12.

    Descramble the extracted watermark, \( {W}_s^{ext} \), using inverse Arnold transform to obtain extracted grayscale watermark image, Wext.

Algorithm 2: Watermark Extracting Process

figure d

4 Experimental results

In order to demonstrate the performance of the proposed method, 1024x1024x3 Baboon, Pears, Peppers, Jet Plane, and Barbara, cover images (as shown in Fig. 3) and 96x96 grayscale Lena, Cameraman and Saturn watermark images (as shown in Fig. 4) are used.

Fig. 3
figure 3

Original 1024x1024x3 RBG cover images a Baboon, b Pears, c Peppers, d Jet Plane, e Barbara

Fig. 4
figure 4

Original 96x96 watermark images a Lena, b Cameraman, c Saturn

To determine the transparency of the watermarked images, PSNR are calculated using the equation as given below:

$$ PSNR=10{\mathit{\log}}_{10}\left(\frac{255^2}{\left(\frac{1}{mxnxp}\right){\sum}_{i=1}^m{\sum}_{j=1}^n{\sum}_{k=1}^p{\left({I}_{i,j,k}^o-{I}_{i,j,k}^w\right)}^2}\right) $$

where, mxnxp is the size of the original cover image, \( {I}_{\left(i,j,k\right)}^o \) and \( {I}_{\left(i,j,k\right)}^w \) denote the pixel values at position (i, j, k) of the original covet image, Io, and the watermarked image, Iw, respectively.

NC values between the embedded watermarks and extracted watermarks are calculated as follows:

$$ \mathrm{NC}=\frac{\sum_{i=1}^M{\sum}_{j=1}^N\left({W}^{ext}\left(i,j\right)-{W}_m^{ext}\right)\left(W\left(i,j\right)-{W}_m\right)}{\sqrt{\left({\sum}_{i=1}^M{\sum}_{j=1}^N{\left({W}^{ext}\left(i,j\right)-{W}_m^{ext}\right)}^2\right)\left({\sum}_{i=1}^M{\sum}_{j=1}^N{\left(W\left(i,j\right)-{W}_m\right)}^2\right)}} $$

where, MxN is the size of the grayscale watermark image, W(i, j) and Wext(i, j) are the pixel values of the embedded original watermark and the extracted watermark, respectively. Wm and \( {W}_m^{ext} \) denote the mean values of the embedded and extracted watermarks, respectively.

The watermarked images embedded by Lena watermark for scaling factor, k, values of “40” and “70” are illustrated in Fig. 5. The period of the Arnold transform is chosen as 10 to scramble watermark images [62]. The PSNR values of the watermarked images are higher than 35 and 30 dB for scaling factor values of “40” and “70”, respectively. It can be seen from the figure that the quality and the transparency of the watermarked images have been protected.

Fig. 5
figure 5

Watermarked images embedded by Lena watermark for scaling factor values of: a-b “40” and c-d “70”

The robustness of the proposed color image watermarking method is conducted by applying various image processing operations to the watermarked images. Median filter (MF), average filter (AF) and sharpen attacks have been applied with 3x3 kernel size to the watermarked images. For blurring, Gaussian low-pass filter with filter kernel size of 5x5 has been performed. Gaussian white noise (GWN) with mean 0 and variance of 0.001, Speckle noise (SN) with variance of 0.01, Salt-and-pepper noise (S&PN) with density of 0.01, and Poisson noise (PN) have been added to the watermarked images. JPEG compression with quality of 20%, clockwise 25° rotation, and bilinear resizing (1024 → 512 → 1024) have been also performed.

Extracted watermarks from attacked watermarked Baboon images for the scaling factor value of “40” are shown in Fig. 6. It can be seen from the figure that watermarked Baboon image is robust under blurring, AV, JPEG, MF, and GWN attacks. Also, extracted watermarks are recognizable under sharpen, resizing, PN, SN, S&PN, and rotation attacks. For the scaling factor value of “70”, extracted watermarks from attacked watermarked Baboon image are illustrated in Fig. 7. As can be seen from the figure that the watermarked Baboon image is more robust under all the attacks. Extracted watermarks from attacked watermarked Pears images are shown in Figs. 8 and 9, for scaling factor values of “40” and “70”, respectively. It is clear from the figures that the watermarked Peers image is robust under all the attacks except PN, SN, S&PN, and rotation attacks for the scaling factor value of “40”. However, extracted watermarks are recognizable under all these attacks. Also, watermarked Pears images are more robust under all the attacks for the scaling factor value of “70”. It can be also seen from the figures that the visual effects of the extracted watermarks from attacked Pears images are better than the extracted watermarks from attacked Baboon images.

Fig. 6
figure 6

Extracted watermarks from attacked Baboon image for scaling factor value of “40” a sharpen, b blurring, c AV, d resizing, e JPEG, f PN, g MF, h GWN, i SN, j S&PN, k rotation

Fig. 7
figure 7

Extracted watermarks from attacked Baboon image for scaling factor value of “70” a sharpen, b blurring, c AV, d resizing, e JPEG, f PN, g MF, h GWN, i SN, j S&PN, k rotation

Fig. 8
figure 8

Extracted watermarks from attacked Pears image for scaling factor value of “40” a sharpen, b blurring, c AV, d resizing, e JPEG, f PN, g MF, h GWN, i SN, j S&PN, k rotation

Fig. 9
figure 9

Extracted watermarks from attacked Pears image for scaling factor value of “70” a sharpen, b blurring, c AV, d resizing, e JPEG, f PN, g MF, h GWN, i SN, j S&PN, k rotation

Performance of the proposed color image watermarking method is evaluated for various scaling factors. NC values of the extracted watermarks from attacked Baboon images are given in Table 1. It can be seen from the table that, stronger robustness is obtained for larger scaling factor values. PSNR values of the watermarked Baboon images are also shown in Table 2. It is clear from the table that higher transparency can be obtained for smaller scaling factor values. NC values of the extracted watermarks from attacked Pears, Peppers, Jet Plane, and Barbara images and given in Tables 3, 4, 5, and 6 respectively. PSNR values of the watermarked images are also shown in Table 2. As can be seen from the tables, as the scaling factor value increases, the PSNR values decrease and NC values increase.

Table 1 NC values of the extracted watermarks from attacked Baboon images
Table 2 PSNR (dB) values of the watermarked images
Table 3 NC values of the extracted watermarks from attacked Pears images
Table 4 NC values of the extracted watermarks from attacked Peppers images
Table 5 NC values of the extracted watermarks from attacked Jet Plane images
Table 6 NC values of the extracted watermarks from attacked Barbara images

PSNR value higher than 30 dBs is considered to be acceptable transparency of the watermarked image [50, 78]. Experimental results illustrate that the proposed method has better transparency (PSNR > = 35 dBs) and is robust under various attacks for the scaling factor value of “40”.

5 Conclusions

In this paper, an efficient DCT-DWT based hybrid image watermarking method has been proposed for copyright protection of color images. RGB cover image has been divided into red, green and blue components in this method. Firstly global DCT has been performed to each color components, and then one-level DWT has been applied to the DCT coefficients of the color components. Grayscale image has been used as a watermark. Before embedding process, the watermark image has been scrambled, and then has been transformed with DCT. Transformed watermark image has been divided into equal smaller parts. Finally, DCT coefficients of each watermark parts have been embedded into all four frequency bands of each color components of the RGB cover image. The robustness of the method has been demonstrated by applying various attacks to the watermarked images. Experimental results illustrate that the proposed method is robust under various attacks and the imperceptibility and transparency of the watermarked images have been protected. The most important contribution of our paper is that, by embedding the DCT transformed watermark parts separately into all the DWT bands of each color components of the cover image, high robustness and imperceptibility have been obtained with the proposed method.

As a future work, in order to improve the proposed method, different scaling factors can be used for the DWT bands and the color components. In addition, multi-level DWT can be performed for the proposed method. Furthermore, the robustness of the proposed method can be developed for print/scan attacks.