1 Introduction

Nowadays, digital image copyright protection is required for the rapid growth of the Internet technology, illegal copy distribution of ownership, and multimedia transmission. Copyright protection could overcome these security issues by providing a solution for both image authentication and protection [8]. The main aim of the image watermarking process is to hide watermark secret data (text, image, audio, and video) into the color or gray cover images. Therefore, the ownership can guarantee the copyright protection of the host image by efficiently extracting the secret watermark data [9, 25]. Moreover, watermarking has been developed as a generic technique to offer essential security of these transmitted digital data. There are three types of watermarking applications: (1) to transfer ownership information, (2) to confirm that object content has not altered, and (3) to exchange object-specific data to a community of willing receivers [25, 29].

A powerful watermarking scheme must have the following important parameters such as (Robustness and Imperceptibility). Robustness is measured when the watermarked image is attacked while imperceptibility is the invisibility perception between original and watermarked images [6, 36]. Major attacks applied to the watermarked image can be classified as signal processing (adding noise, filtering, and blurring), signal compression (jpeg), and geometric (rotation, cropping, scaling, and translation) [26]. Over the last decade, most of the developing and proposed watermarking schemes are considerably focused on image and movie files instead of audio files due to the sensitivity of the human auditory system (HAS) than the human visual system (HVS). A high imperceptible audio watermarking requires a robust embedding technique [17].

The use of digital video applications, namely digital TV, video conferencing, digital cinema, videophone, distance learning, and video-on-demand has rapidlydeveloped over the last decade. Nowadays, it is much easier for digital data owners to exchange multimedia data over the Internet; therefore, the data can be perfectly duplicated and quickly redistributed on a wide scale [3]. As a result, the significance of copyright protection for multimedia data has become more critical. In addition, the techniques of image watermarking could be extended effortlessly to watermark video image sequences [21, 27]. It is worth mentioning that video watermarking schemes require to meet some other challenges: a large volume of unnecessary data among frames, unbalance between motion and still locales [3], and real-time broadcasting that makes the video signals highly susceptible to pirate attacks involving frame dropping, averaging, swapping, and statistical analysis [21]. Recently, the digital video watermarking scheme is proposed to insert the watermark in “intra-pictures” of MPEG video sequence through changing the Variable Length Codes (VLCs) directly in order to prevent reverse quantization [3, 17, 23, 24].

Digital image watermarking could be applied in both spatial (original data) and frequency (transform data) domains. In the spatial domain, the watermark directly changes the pixel value of the cover or host image which is lead into low-cost calculations whereas in the frequency domain, the cover image pixel data is transformed to coefficient value instead of pixel value by using forward transformation. Thus, the watermark bits alter these coefficient values. This domain is more robust than the spatial one especially against image processing and compression attacks. On the one hand, the spatial domain shows low resistance against several image-processing operations and is subsequently classified as a weak watermarking. On the other hand, the frequency domain methods such as those applying Discrete Cosine Transforms (DCT), Discrete Wavelet Transforms (DWT) techniques are helpful to identify the potential locations to embed the watermark in order to get better results. Hence, many watermarking are carried out in the frequency domain is therefore classified as a robust watermarking [10].This is due to the fact that the insertion of watermark data modifies coefficient values. As a consequence, when the inverse transformation is performed, the watermark data is spread out non-uniformly over the cover image [13].Some spatial image watermarking schemes are proposed in the literature based on the LSB algorithm for both color and gray images [4, 20, 34].

Other watermarking techniques are based on 3D mesh watermarking which can be simply adapted to the 3D objects. These objects could be represented in different ways including NURBS, voxels, and polygonal meshes [2]. 3D watermarking schemes comprise of embedding directly the watermark data by modifying either the topology of the triangles or the 3D mesh geometry. These techniques are usually not complex and need less computational time. Nevertheless, they are not robust enough to resist different types of attacks. Recently, some watermarking schemes have been developed and proposed for 3D meshin the frequency domain that are mainly based on multi-resolution mesh analysis (wavelet transform and spectral decomposition) and show better resistance against geometrical attacks [1].

Discrete Fourier Transformation DFT, DCT, DWT, and Singular Value Decomposition SVD is among those techniques that have a significant robustness for almost all types of attacks [5, 12, 18, 19]. Furthermore, hybrid transformation is used such as DCT-DFT [11], DWT-SVD [16, 30, 36, 37], and DCT-DWT-SVD [10, 38] to improve the invisibility and the robustness of the watermark insertion process. In addition, digital image watermarking is also classified as non-blind, semi-blind, and blind methods. In the non-blind method, the host image information, original watermark, and watermarked image are required for extracting the embedded watermark [15, 31] while in semi-blind method, both original watermark and watermarked image are used for the watermark extraction process [33]. The blind watermarking scheme only needs a watermarked image for watermark extraction. Generally, the less the cover image information is used; the more sophisticated the watermarking algorithm becomes [14]. A watermarking scheme is commonly inserted as unrecognizable, however, in some cases, it is intentionally recognizable. The unrecognizable called invisible watermarking and the latter is visible watermarking [7]. Visible and/or transparent image watermarking is said to be visible when the content is visible to the human eye while transparent watermarks are also described as invisible watermarks, in which the content is not visible to the human eye [28].

The rest of the paper is organized as follows: an overview of recent related works of the digital image watermarking in frequency domain has been presented in section 2. In section 3, a brief description of the proposed DWT-SVD based watermarking has been introduced. Section 4 shows the performance evaluation based on PSNR and NCC tested on different image samples (SD and HD) quality for different kinds of attacks. Finally, the conclusions and some suggestions for future work are presented in Section 4.

2 Related works

Security provocations and vulnerabilities for the high quality images (1K, 2K, and 4K) transmission via the communication channels give rise to a security issue. Researchers in this field began to develop and implement an efficient image watermarking scheme based on transforms domain in terms of imperceptibility (invisibility of the watermark inside the host image) and robustness (resist the most type of attacks).Piva Alessandro et al. [23] proposed a new method depending on an image watermarking algorithm which embeds the code in the DWT for each frame. The scheme has been tested on various video sequences, each frame composed of two different objects: the background (Video Object 1), and the player (Video Object 2). After the watermarking process, the frame was sequentially compressed to obtain an MPEG-4 coded video bit-stream with a rate of 500 Kb/s per Video Object Layer (VOL). Next, the video stream was decompressed, and the two objects were separated in each frame obtaining two different images, where the detection process was implemented. They also applied the detection process to the completed frame without choosing the objects. Their result shows that the correlation peak of the tennis player (VO 0) was lower than the response of the background (VO 1) since low watermark energy can be embedded into the tennis player. Moreover, the correct detection of the two objects shows that the system is robust to conversion from MPEG-4 to MPEG-2.

Tay R and J P Havlicek [35] presented an image watermarking scheme used 2D discrete wavelet transform to decompose an image into different frequency channels. A scaled image, which has been used as the watermark, added into a mid-frequency wavelet channel. The watermark embedded image is constructed through taking the inverse 2D discrete wavelet transform of the modified wavelet decomposition. Image size, the channel where the watermark is embedded, non-zero scaling factor, and the wavelet transform filters are used as security keys for the extraction of the inserted watermark. The technique of the proposed watermark extraction is totally independent of the original image. Also, three different types of attacks, such as JPEG compression, image cropping, and median filter are applied via adjusting the scaling factor to achieve a compromise between visually perceptible artifacts and resiliency in preserving the watermark. The paper’s results indicate that the technique of the watermark embedding is resilient to the above three types of attacks, and in all case the watermark was successfully recovered which supports the robustness of the image watermarking.

PredaRadu and DragosVizireanu [24] suggested a video watermarking technique based on multi-resolution wavelet decomposition. A binary image is applied for the watermark which is embedded within the wavelet coefficients of the LH, HL, and HH sub-bands of the second wavelet decomposition level through quantization. A unique key is used to spread each bit of the watermark over a number of wavelet coefficients. The proposed method has achieved great resilience against several various attacks in the spatial, temporal, and compressed domains since test results show that the embedded watermark is imperceptible and robust to attack. In addition, the performance of the technique can be improved via using error correction codes and by redundantly embedding the same watermark in different frames of the video.

Singh Siddharthet al. [33] proposed a hybrid semi-blind grayscale image watermarking method based on Wavelet, Contourlet and singular value decomposition. The main objective of the work is to focus attention on the effectiveness of redundant wavelet transforms in digital image watermarking. This is due to the sensitivity of the classical wavelet transformation toward the shift-invariance and directional information which is required for better reconstruction of the watermarked image. For embedding a single watermark, host images are sub-sampled followed by one level of Non-sampled Contour let Transform NSCT and Redundant Discrete Wavelet Transform RDWT decomposition. Furthermore, Singular Value Decomposition SVD has been performed on attained RDWT coefficients. Just the same, image watermark data has been transformed by a hybrid NSCT-RDWT-SVD technique. Differently, inverse SVD-RDWT-NSCT transformation is applied to provide a watermarked image. For the watermark extraction, the NSCT-RDWT-SVD decomposition and SVD coefficients are needed with the same scaling factor that has been used in the embedding process. While in the dual watermarking, Arnold transform is utilized to encrypt the text watermark before embedding phase. The proposed scheme improved the performance against some geometrical and image processing attacks. Objective and subjective test evaluations using peak signal to noise ratio (PSNR), correlation coefficient (CC), bit error rate (BER) and structural similarity index metric (SSIM) show the robustness of the method and outperform the previous related methods.

VaidyaPrasanth and Chandra Mouli [36] proposed a robust semi-blind watermarking scheme for color images based on multiple decompositions. The main aim is to preserve the copyrights of the original (owner) host image. The gray watermark is inserted into a color image by applying multiple decompositions. To improve security the gray watermark is encrypted with SVD and Arnold transforms via generating secret keys. The luminance component of the given host image is subjected to DWT, Contourlet Transform (CT), Schur decomposition, and SVD sequentially and finally, the watermark is added. Without the aid of the original watermark and image, the watermark is extracted from various attacked images in the semi-blind extraction process. Their results indicate that the proposed watermark guarantees both imperceptibility and robustness against image and signal processing attacks. In addition, the proposed method compared with the related watermarking methods is more secure, robust, and efficient.

Yadav Bandana et al. [37] proposed a robust digital image watermarking scheme relied on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD). In the paper, they first applied DWT with three levels of decompositions on the cover image. Then, SVD is performed on the third level sub-bands to obtain the diagonal matrices of singular values. The watermark data is then inserted in these singular values. The simulation results show that the PSNR has a better value in term of quality compared to other related approaches. In addition, the acquired test results also demonstrate that the present method can properly extract the watermark image when the watermarked image is subjected to various malicious attacks such as (signal processing, geometric, and compression).

Pal Arup and Soumitra Roy [22] developed a robust and blind watermarking scheme based on DCT for protecting the originality of digital images. In the initial stage, the image is decomposed into non-overlapping blocks, and then DCT is applied on each extracted block to insert a binary bit of watermark into each transformed block via enhancing some middle important AC coefficients by repetition code. Throughout the embedding stage, DC and some higher AC coefficients are saved intact after zigzag scanning of each DCT blocks to confirm the high quality of the watermarked image. Consequently, the proposed method is suitable to preserve the copyright information even in the compressed form of the watermarked image because the scheme exploits middle bands of DCT coefficients for inserting the watermark bits. The obtained results showed that they achieved satisfactory visual quality of the watermarked image.

Gupta Ritu et al. [10] proposed a watermarking scheme that uses a progressed encryption method is commonly known as Elliptic Curve Cryptography (ECC). It is applied to embed a binary image as a watermark in several grayscale images in a semi-blind way. According to their results the ECC technique is a quick encryption method that effectively encrypts the subject with significantly less number of bits as compared to other well-known encryption techniques, namely Rivest Shamir Adleman (RSA) and Direct Selling Association (DSA). DWT-SVD domains are performed on the grayscale images before the embedding process. Furthermore, the schemeis divided into two parts. In the first part, entropy-based HVS parameters are calculated block-wise to recognize the most suitable blocks in spatial domain. First level DWT is applied for the selected blocks and watermark embedding is performed via applying the calculated SVD parameters. Conducted results showed that the use of hybrid DWT-SVD with ECC had a better performance. In the second part, the model of HVS in the DCT domain is applied, and compared with the entropy-based HVS model used in the transform domain to insert the ECC entropy binary watermark in images. Test results of this part demonstrated thatthe proposed watermarking scheme got better results in terms of imperceptibility and robustness as compared to other schemes.

Savakar Dayanand and Anand Ghuli [30] proposed an imperceptible hybrid watermarking algorithm based on blind and non-blind watermarking schemes. The blind scheme is operated as an inner scheme whereas a non-blind scheme utilized as an outer scheme. A watermark secret binary data is embedded in an inner cover image by using (DWT) with the assistance of the blind watermarking method combined with the predefined binary digit sequence block and gain factor α to obtain the inner watermarked image. Subsequently, the watermarked image is embedded into an outer cover image using DWT and SVD by the non-blind watermarking method to achieve the hybrid watermarked image. On the other hand, the secret binary image is extracted by non-blind and blind watermark extraction techniques. Test results show that the proposed approach has better robustness against various attacks (JPEG compression, image rotation, salt and pepper noise, Gaussian noise, speckle, and Poisson noise.

3 The proposed watermarking algorithm

The main aim of developing the proposed semi-blind image watermarking is to improve the robustness and imperceptibility of the embedded watermark before and after applying different kinds of attacks. The watermark (logo of Sulaimani and Halabja universities) is hiding in both standard quality images (Lena, Cameraman, Baboon) and high quality images (1K, 2K, 4K). The host image is first transformed in the frequency domain using two passes of wavelet transformation. Then, the watermark image is also transformed using one pass of wavelet transformation and applying SVD on the LL band of the watermark. Eventually, the watermarked image is subjected to the objective evaluation based on PSNR and Correlation Coefficient. JPEG compression, signal processing, and geometric transformation are used as an attacker tool. The general block diagram of the proposed image watermarking scheme is shown in Fig. 1.

Fig. 1
figure 1

General diagram of the proposed scheme

3.1 Color space conversion

There are many reasons for using grayscale instead of color information in image processing. First of all, converting RGB into a gray image is simply reducing the complexity of calculation because the data is fetching from one channel. Another reason is the sensitivity of the human vision system HVS to the brightness than the RGB color. Finally, the grayscale images are mostly used in steganography and watermarking techniques.

3.2 Watermark embedding process

In the proposed approach scheme, the hidden watermark must be imperceptible to human eyes and robust against image processing attacks. To get by, the watermark logo must first transform into the frequency domain using wavelet transformation. And then, SVD is applied to the LL band to get the Singular values of the diagonal matrix. In the following subsections, DWT, SVD,and embedding process are described.

3.2.1 2D – Wavelet transformation

DWT has a significant multi-resolution property. It decomposes the gray image (both cover and watermark) on a logarithmic scale for the constant frequency bandwidth. DWT transforms the input image into four sub-bands namely LL (Low–Low or approximation),LH (Low–High or horizontal), HL (High–Low or vertical), and HH (High–High or diagonal) at the first level of decomposition. Additional decomposition of LL sub-band provides LL2, LH2,HL2, and HH2 at the second level and others. As a general rule, LL appears for the smooth variations in a color while(LH, HL, and HH) represent the sharp variations of the color level. Differently, the basic structure of an image is composed by the LL, and the edges which give the details are composed by LH, HL, and HH. In this paper, the cover image is transformed by DWT for two levels of decomposition. Moreover, the watermark image is also transformed at the first level.

3.2.2 SVD transformation

In this paper, let A represents a matrix of watermark image. When the SVD transform is applied to A, it is transformed into three matrices. They are similar in size to the original matrix. On the report of linear algebra, an array of nonnegative elements which can be considered as a matrix can be shown as an image. If an image is denoted by A, where A ∈ Rnxn, R is the realnumber domain, then SVD of A is given by [37]:

$$ \mathrm{A}={\mathrm{USV}}^{\mathrm{T}} $$
(1)

U ∈ RnxnandV ∈ Rnxnare orthogonal matrices and S ∈ Rnxn is a diagonal matrixgiven by,

$$ S=\left[\begin{array}{ccc}{\rho}_1& & \\ {}& {\rho}_2& \\ {}& & {\rho}_n\end{array}\right] $$
(2)

Here ρ’s (diagonal elements) are known as singular values which satisfy:

$$ {\rho}_1\ge {\rho}_2\ge {\rho}_r\ge {\rho}_{r+1}={\rho}_{r+2}\dots ={\rho}_n=0 $$
(3)

SVD properties are useful in image watermarking schemes. In recent times, image watermarking techniques based on SVD have been combined with other kinds of transformation including DWT, DCT, and DWT. This hybridization improves the robustness and the imperceptibility of the watermark hiding in different image watermarking applications.

3.2.3 Proposed embedding scheme

The following steps are performed to embed the watermark data into the host image using zigzag technique.

  1. 1.

    A color image using as a host image ‘I’ with different sizes 256 × 256, 1 K, 2 K, 4 K and a color watermark image ‘w’ having the size of 128 × 128 are taken.

  2. 2.

    Both cover and watermark images are converted into a gray scale images.

  3. 3.

    2nd level DWT decomposition is applied to the host image. 1st level of DWT decomposition is performed on the watermark image.

  4. 4.

    Furthermore, the LL1 band of the watermark is transformed by SVD. It gives USVT matrices. Then, the HH2 band of the host image is modified by the singular values of the watermark S. To keep the proposed scheme semi-blind, only the S values of the watermark LL1band is embedded in the HH2 band of the host image. Other bands (LH1, HL1, HH1) are set to zero. A copy of the original watermark is saved in HL2 band for the extraction process.

$$ {HH}_2={HH}_2+\propto S $$
(4)

Where ∝ represents the scale factor.It is used to control the strength of the watermark to be embedded.

  1. 5.

    Inverse DWT is performed on the modified HH2band to obtain the watermarked image Iw

Figure 2 shows the proposed embedding process diagram.

Fig. 2
figure 2

Watermark embedding flowchart

3.2.4 Zigzag embedding technique

When the singular values of the diagonal matrix (64 values) is embedded into the HH2 band of the host image, the watermark data is visible and clearly appear on the watermarked image. Therefore, a new strategy is followed to embed the watermark based on the zigzag mechanism. The technique distributes the watermark data according to Fig. 3.The figure shows only a block (16*16) of the HH2 band of the host image. Singular diagonal values S of the watermark are embedding by starting from the column 20 with a step size 16 as described below.

Fig. 3
figure 3

Watermark embedding using zigzag technique

S = diag(S′);

zigzag_HH2 = zigzag(HH2);

zigzag_HH2 (20:16:w*h) = zigzag_HH2(20:16: w*h) + (alpha*S);

Here, S is the diagonal matrix of SVD and w,h represents the width and the height of HH2 band of the cover image.

In Fig. 4, the imperceptibility of the watermarked image is shown with and without zigzag technique.

Fig. 4
figure 4

Imperceptible watermark with zigzag embedding

3.3 Watermark extracting process

To extract the watermark from the watermarked image, the following steps are performed.

  1. 1.

    Second order of DWT decomposition is applied to the watermarked image (Iw).

  2. 2.

    Reconstruct the singular value S using the following formula:

$$ S=\left({HH}_2-{HL}_2\right)/\rho $$
(5)
  1. 3.

    Reconstruct the LL1 of the watermark from S, U, and VT values.

  2. 4.

    Apply one level IDWT to the LL1 and set LH1, HL1, and HH1 to zero.

  3. 5.

    Extract the 128 × 128 watermark image.

  4. 6.

    Compare the similarity between the extracted watermark and the original one using correlation coefficient measurement.

3.4 Attack on the watermarked image

To find the robustness of the proposed scheme, several types of attack must be applied to the watermarked image in order to evaluate the performance of the proposed system in terms of imperceptibility and resistance against attacks. Figure 5 illustrates the attack preformed on the watermarked image.

Fig. 5
figure 5

Signal processing attacks

4 Test results

In the next subsection 4.1, the test samples of watermark and host image for both SD, and HD qualities are described whereas the performance parameters are presented in subsection 4.2. In subsections (4.3 and 4.4) the imperceptibility and the robustness of the proposed watermarking scheme are calculated by conducting different tests.

4.1 Test samples

In this research work, three images as a watermark of size 128 × 128 (Sulaimani University Logo and Halabja University Logo, Cameraman) plus a binary logo and three standard image qualities as a host of size 512 × 512(Lena, Pepper, and Baboon) are used. In addition, three high definition image qualities of size 1 K, 2 K, and 4 K (Nature, Flower, and HoneyBees respectively) are also used to carry out optimal results. Figure 6 shows the watermark and the host images.

Fig. 6
figure 6

Test samples

4.2 Performance parameters

The imperceptibility and the robustness of the proposed image watermarking are measured between original, watermarked images and original, extracted watermarks respectively. Peak Signal to Noise Ratio (PSNR) value using Mean Squared Error (MSE) and the similarity using Normalized Correlation Coefficient (CC) are formulated according to the following equations:

$$ \kern1.25em PSNR=10\log \left(\frac{\mathit{\operatorname{MAX}}\left({I}_o^2\right)}{MSE}\right) $$
(6)
$$ \kern1em MSE=\frac{1}{nxm}{\sum}_{i=1}^n{\sum}_{j=1}^m{\left({I}_o\left(i,j\right)-{I}_w\Big(i,j\Big)\right)}^2 $$
(7)
$$ \kern1em NCC=\frac{\sum_{i=1}^n{\sum}_{j=1}^m\left({W}_o\left(i,j\right)-{W}_e\Big(i,j\Big)\right)}{\sum_{i=1}^n{\sum}_{j=1}^m{\left({W}_o\left(i,j\right)\right)}^2\ast {\sum}_{i=1}^n{\sum}_{j=1}^m{\left({W}_e\left(i,j\right)\right)}^2} $$
(8)

Here, Io(i, jand Iw(i, j)are the original and watermarked images respectively. Here,   Wo(i, j)is the original watermark and We(i, j) is the extracted watermark.

4.3 Imperceptibility

The proposed image watermarking scheme with normal and zigzag embedding techniques wasted on the all mentioned previously test samples. Table 1 shows the test results of PSNR and NCC when there is no attack performing on the watermarked image. The first part of the test is done with a normal distribution (normal code) of the watermark data within host images while the second part is performed when the zigzag embedding is used (improved code). Test results show that there is a significant improvement in imperceptibility when the improved embedding technique is applied.

Table 1 PSNR (dB) and NCC without attacks

As illustrated in Fig. 4, the visual perception of the watermarked image has perfect quality in all cases, especially when for the improved embedding technique. For comparison reasons with other related works, a new logo as a watermark has been used. Table 2 presents the PSNR and NCC without applying any attacks. The logo is a simple binary image 128*128 taking from [12].

Table 2 PSNR (dB) and NCC without attacks (new logo)

4.4 Robustness

To evaluate the performance of the proposed watermarking scheme, the watermarked images are subjected to the common attacks for different parameters. In Tables 3, the test results in terms of NCC between the original and the extracted watermarks are presented only when the improved technique is used.

Table 3 NCC for different attacks with improved technique

According to the obtained results, the proposed approach has better robustness when the image processing attacks are used. In Table 4 some extracted watermarks with different kinds of attacks are shown.

Table 4 NCC between original and extracted watermarks.

Tables 3 and 4 show that the proposed approach has higher robustness especially for high quality images (2 K and 4 K) which is a new contribution to the field of image watermarking. Moreover, there are various researches that can be compared with the proposed scheme. However, they are few works tested uniquely on the HD image quality. For that reason, the robustness is also tested with a new logo. In Table 5, the test results in terms of NCC between the original and the extracted watermarks are presented only when the improved technique is used. Test results show that the proposed approach outperforms other works mainly for image compression attack using a jpeg compression factor of 50% and 75%. Furthermore, it could be noticed that the proposed image watermarking scheme indicates an optimal result in term of robustness NCC particularly for HD images (2 K and 4 K). Table 6 presents some extracted watermarks with image compression attack for the binary logo.

Table 5 NCC for different attacks with improved technique (new logo)
Table 6 Extracted watermarks with jpeg compression attack.

4.5 Comparison with the existing approaches

The performance evaluation in terms of imperceptibility and the robustness of the proposed approach is compared with some existing research works that used DWT and/or SVD schemes.

Table 7 consists of NCC measure between the original and extracted watermark data as the robustness metric of the various type of attacks. The robustness performance is measured by the same measurement corresponding to the existing schemes. Therefore, the NCC values of the existing scheme were taken from the corresponding reference.

Table 7 Performance comparisons with NCC

The first comparison has been done with [14], which is based on DWT-SVD transforms and performed on both SD and HD images. Another comparison is done with [4, 25, 36] which contains different SD quality images. Finally, we found the SSIM of the improved scheme between cover and watermarked image for different bitrates (0:1:0.1) in order to compare with the result given in [32]. Test results in Fig. 7 show that our proposed technique is significantly efficient for the texture images. SSIM values are always greater than 0.99 which can be consider as an accurate watermark embedding system.

Fig. 7
figure 7

SSIM comparison with different embedding rates

The effect of the different type of attack parameters such as (compression, salt & pepper noise, and Gaussian noise) is studied for the performance metrics PSNR and NCC as shown in Fig. 8. In the conducted test, only the improved technique is used and applied to the Lena image. Figure 8-A illustrates that a high NCC (almost 1.00) is obtained for jpeg quality factors 75% and 90% respectively while for the QF = 50, the NCC is decreased to ~0.8. Moreover, the imperceptibility PSNR is decreased when the quality of the watermarked image is degraded especially for QF = 50. Figures 8-B and 8-C present the impact of the Salt & Pepper and Gaussian noise parameters on the proposed method performance. Accordingly, it can clearly be seen that both NCC and PSNR are reduced for the larger amount of noise.

Fig. 8
figure 8

Effects of attack parameters on PSNR and NCC (a) compression (b) Salt & Pepper noise (c) Gaussian noise

4.6 Computational cost for improved technique

It can be clearly seen from the Fig. 8 that the execution time for embedding and extracting processes increases as the quality of the cover image increases, even though the embedded logo size is always constant (128 X 128). This due to the transformation of the cover images into frequency domain using DWT algorithm. When the high quality cover images are used, more time is required to transform them into the frequency domain.

Another equally important point from Fig. 8 is that the embedding time is higher than the extraction time, especially in the case of using high quality cover images, in which embedding requires twice the time of extraction. This is because in the case of embedding the cover images have to go into one more step that the extraction process does not have it, which is 2-level Inverse Discrete Wavelet Transform (IDWT). In other words, after transferring the cover images into frequency domain and adding the diagonal singular values of the logos to them, they have to be reconstructed in order to reconstruct them (i.e. watermarked image).

5 Conclusion

In this paper, a semi-blind image watermarking scheme in DWT and SVD transform domain is developed. It mainly emphasizes on improving the imperceptibility using PSNR metric for both SD and HD quality images as presented in Fig. 4 and Table 1. The proposed zigzag embedding technique has increased the invisibility of the watermark data inside the host image for all image types. In most cases, it has better robustness compared with other related works for different kinds of attacks especially for image compression attack as illustrated in Table 6. Furthermore, two types of watermarks are used to show the performance of the developed approach. For instance, high texture and simple binary images are utilized for the embedding process. Test results show that the quality of the watermarked image has attained an optimal value 54.826 dB for SD images and 72.611 dB for HD images. In addition, the optimal NCC has reached for a binary logo watermark when a jpeg compression (50%) attack is performed to the watermarked image and it is 0.975 for 2 K image and 0.979 for SD image. Also, the computational cost of the improved proposing scheme is calculated for both embedding and extracting processes as depicted in Fig. 9. Finally, the improved scheme is compared with references [4, 14, 25, 36] for both SD and HD images as described in Table 7.

Fig. 9
figure 9

Computational cost for improved technique