1 Introduction

From last few decades the extraordinary growth in technology of computer and computer networks provides quality of service and higher bandwidth for both wired and wireless networks. The representation of media in digital form and evolution of internet also made easy to share digital media such as image, audio and video in an effortless way. Various applications where sharing of such information is required are distributed or cloud environments, healthcare applications, education etc. However these advancements also raised some security related issues such as copyright violation, ownership identification and identity thefts. Sharing and storing sensitive information over unsecured networks is an important concern. Hence some data hiding techniques are required for the protection of multimedia data. The goal of data hiding is not to restrict the access to host channel, but to ensure that the embedded data should be inviolate and recoverable [7, 47]. There are two techniques for data hiding: Steganography and Watermarking. Steganography is defined as the technique of hiding communication, the hidden content is embedded in some cover media so that there will not be any eavesdropper’s suspicion [9, 37]. In watermarking, a watermark (document or image) is embedded into digital content to protect it from unauthorized access. Later on this secret information can detected and extracted out to check the identity of digital media or real owner [26, 42, 43, 47].

The digital watermarks are playing an important role in Fingerprinting, Healthcare, Copyright protection, Source Tracking, Remote Education, Insurance Companies and Secured E-Voting Systems (http://www.digitalwatermarkingalliance.org/faqs.asp) [46, 56]. The watermark has various important characteristics such as robustness, capacity, imperceptibility, security and computational cost. Watermarking and encryption methods are providing high degree of confidentiality, integrity, availability and authenticity to sensitive data/information [26, 43, 46, 56]. The goal of watermarking techniques is not to restrict the access to host channel, but to ensure that the embedded data should be inviolate and recoverable. This means that watermark is embedded into host image in such a way that any attack or alteration to the watermarked image affects the watermark and similarly any attack to the embedded watermark affects the quality of watermarked image [7, 47]. Therefore any alteration or attack to the watermarked image can be detected by using imperceptibility and robustness related parameters. These parameters check whether the watermark get affected because of various attacks or not. The security of sensitive information can be ensured using cryptography However, after decryption this data becomes insecure. This vulnerability issue of decrypted data can be solved using watermarking. Therefore the combination of watermarking and cryptography provides more security and authentication to sensitive information [9, 26, 37, 42, 43, 46]. Watermarking techniques can be divided as spatial and transform domain watermarking techniques. In spatial domain [26, 42, 43, 46] watermark is embedded by modifying values of pixels. Spatial domain techniques are less robust against signal processing attacks. In transform domain techniques host image is converted into transform domain and then watermark is embedded in transform coefficients and after that inverse transform is performed. Various transform domain techniques are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD) and Discrete Fourier Transform (DFT). They provide more robustness as compared to spatial domain techniques [26, 42, 43, 46, 56].

Various factors such as imperceptibility, robustness, capacity and security need to be considered in the watermarking methods. Minimization of the computational complexity is also important for practical implementation. In order to reduce the computational complexity LWT (Lifting Wavelet Transform) can be used as an alternative approach for DWT [13, 19, 21, 33, 34, 40, 49] to transform image into frequency domain. LWT is also called second generation fast wavelet transform. The split and merge process used in LWT reduces computational complexity by 50% as compared to DWT [22, 36, 50].

In this paper an approach based on LWT-DCT-SVD of colored digital images is proposed. In commonly used RGB (Red, Green and blue), R, G and B channels are highly correlated [14, 16, 35] and for better watermarking algorithm (with better robustness and imperceptibility) it is important that the channels should be uncorrelated. Therefore other color image models such as YIQ, YCbCr can be used to un-correlate the R, G and B channels [1, 5, 20, 23, 28, 41, 48]. The robustness of three color image models is tested in this paper and the model that provides better robustness in either low or high gain factors is used for further analysis. The host color image is decomposed into third-level LWT and LL3, LH3 sub bands of the third level LWT are transformed by DCT-SVD. The security of logo (image watermark) is enhanced using message-digest (MD5) hash algorithm and then it is transformed using DCT-SVD before embedding it into LH3 sub band. The robustness of Info (Text watermark) is increased by encoding it using Hamming error correcting code. The error correcting code adds extra bits to the watermark, therefore a lossless compression technique arithmetic coding is applied to reduce its length in order to enhance the imperceptibility of watermarked image.

The remaining components of paper are put in order as: Section 1.1 describes related work and contribution of proposed approach is mentioned in Section 1.2. The details of the proposed algorithm (embedding and extraction algorithm) are given in Section 2. Section 3 covers the experimental results and analysis part and the conclusion of the paper is mentioned in Section 4.

1.1 Related work

Digital Image Watermarking (DIW) in combination with cryptography is efficient for authentication, confidentiality and security. Cryptography converts information into an unreadable cipher. However, after decryption this data becomes insecure. Hence this vulnerability issue of decrypted data is solved using DIW. The compression techniques used with DIW can also enhance the imperceptibility of the watermarked image. Because after compression the watermark bits required to be embedded in the cover image reduces to some extent. Therefore compression can be used to increase the embedding capacity. The amalgamation of DIW, cryptography and compression for the protection of digital content provides security and robustness to watermark and also enhances the imperceptibility of watermarked image [15, 25, 45, 46, 51]. The review of some proposed watermarking algorithms in which cryptography or compression is applied along with DIW is given below:

Data hiding scheme based on Least Significant Bit (LSB) for producing colored medical images is proposed in [8] where QR code is used as watermark accommodating the entire patient’s data. The size of image is not affected as the dispersal of embedded watermark is over the whole image. This robust technique resists rotational attacks which are demonstrated through testing. Perpetual hash and Fast Discrete Cosine transform based blind, robust and zero watermarking technique is proposed in [27]. Logistic chaotic encryption of the watermark ensures improved safety factor. The first level of FDCT contains this encrypted data in low frequency coefficients. Techniques in [31, 32] are experimentally proven to be inferior as compared to this technique in terms of imperceptibility and robustness characteristics.

Using second level DWT and SVD, Avaghi et al. in [4] proposed a blind watermarking technique. Encryption is applied to the watermarked image to provide better protection. Visual encryption of the watermarked image is done with fingerprint image using IWT. Both intentional and unintentional attacks are thus prevented with these techniques. As compared to [6] it provides better security and authentication. For improving medical data authenticity a watermarking technique based on RONI is proposed in [38]. Fourth level LWT is used to place multiple character watermarks inside the cover image. This technique is tested robust and secure. For telemedicine applications, a secure encryption-watermarking approach is introduced by Dagadu and Li in [10]. Security of medical information is ensured using LWT-LSB in this watermarking method. For real-time and mobile applications also, this method is suitable which is indicated by experimental results. Watermarking technique for medical images based on DWT-KLT is proposed in [2]. Fuzzy interference system for optimization of visibility factor and turbo error correcting code for reducing the channel noise distortion is used in this approach. This method is suitable for medical data security as demonstrated by experimental results.

For medical applications a fragile watermarking is developed in [44] and to provide secure medical transmission SVD and Arnold transform is used. LSB of the cover image is embedded with two different watermarks bits of size ‘12 bits’ and ‘20 bits’. This method imperceptibly embeds watermark and is robust for other attacks. The non-fragile tempered images and other important tempering issues are not tested in this proposed method. Elhoseny et al. [12] introduced a secure patient information transmission model in IOT. To provide secure patient information transmission, combination of AES and RSA cryptographic method along with steganography is used. The proposed method is computationally expensive. SWT and DCT based zero watermarking is proposed in [11]. The visual feature vector of the host image is embedded with the watermark which is extracted using SWT-DCT. Using chaotic map the watermark is encrypted to improve the authenticity. Against conventional and geometric attacks this watermarking technique is proven robust. The pixel value of the host image does not change and maintains low complexity even after embedding more data which is experimentally demonstrated. A watermarking technique based on biometric is proposed in [3] for protecting medical data. Encrypted EPR report and minutia feature of the fingerprint is considered as watermark in this method. The ROI part of the cover is embedded with the watermark. To generate final watermark image compression using arithmetic coding scheme is done on resulting watermark image. Inside the cover image a pseudo random number_Id and final watermark data is placed. The reliability and proficiency of the method for authentication of medical data is shown by different results.

1.2 Contribution of the research

The main objectives of the research are to provide secure watermarking algorithm which provides robustness to the embedded watermark that can withstand different kind of attacks. Along with that we also focused on improving the imperceptibility of the watermarked image. The main challenge faced while implementing secure, robust and imperceptible watermarking technique is combining cryptography and compression [46]. Furthermore, it is challenging to find out the color component in the cover image for embedding watermarks in order to meet research objectives. In this method popular transform domain techniques such as LWT, DCT, SVD are used. As compared to general wavelets, reconstructing image using LWT provides increase in smoothness and reduction in aliasing effects [22, 36, 50]. LWT also helps to increase intactness of watermark, prevents loss of information and improves robustness of watermark. In addition to this LWT also requires less memory, computation and computational complexities [5, 20, 24, 28, 39, 55]. DCT has property of energy compaction [1, 17, 18, 23, 29, 30, 47, 52,53,54,55]. SVD is used so that the slight variations in the singular values do not affect the quality of watermarked image. The other contribution of this research is given below:

  • In this approach, multiple (text and image) watermarks are embedded into single cover image. These two watermarks helps in increasing security with good performance in terms of BER, NC and PSNR. The Signature image watermark’s security is improved by using message-digest (MD5) hash algorithm. The Info text watermark contains important information related to image is embedded into the higher LWT sub-band for authentication purpose and its robustness is enhanced using Hamming error correcting code. Arithmetic coding is applied to compress the encoded text watermark which is further used to improve the imperceptibility of watermarked image.

  • Conversion of color image from RGB color space to YIQ and YCbCr color space removes the correlation that exists between the R, G and B color components which results in improved robustness and imperceptibility [14, 16, 35, 41, 48, 50].

  • Embedding multiple text and image watermarks into cover image can save storage and bandwidth requirements [24, 29, 39, 53,54,55].

2 Proposed algorithm

Proposed algorithm has been divided into embedding and extraction process as shown in Figs. 1 and 2. The size of cover image and watermarked image used for the implementation of the proposed algorithm is 512 × 512 × 3 and 64 × 64 respectively. The results are validated according to the standard parameters used to evaluate watermarking algorithm. The proposed algorithm depends on image size and type of cover and watermark image. It may show variations in PSNR, BER and NC values when we increase or decrease the size of cover and watermark image. However for evaluating the proposed algorithm according to different parameters we have kept the size of cover image and watermark image constant. The algorithm is tested for different cover image and watermark image combinations in Table 4. The embedding process and extraction process for image and text watermark is defined in the following sections.

Fig. 1
figure 1

a Watermark embedding and b Watermark extraction Process

Fig. 2
figure 2

a Earth, b India-map, c Lena Meyer, d Lump, e Mountain, f Peppers

2.1 Embedding process for image watermark

  • Step1: Read the images

Input: Color Cover Image (512 × 512 × 3), Watermark image (64 × 64)

  • Step2: Select the color component to embed the watermark.

  • Step3: Apply 3rd-level LWT transform over selected component and select LH3 sub band.

  • Step4: Apply Discrete Cosine Transform to LH3 sub band and then apply SVD.

    $$ {\mathrm{S}}_{\mathrm{DCT}}\leftarrow \mathrm{DCT}\ \left(\mathrm{LH}3\right) $$
    (1)
    $$ {\mathrm{U}}_{\mathrm{c}}{\mathrm{S}}_{\mathrm{c}}{{\mathrm{V}}_{\mathrm{c}}}^{\mathrm{T}}\kern0.5em \leftarrow \mathrm{SVD}\left({\mathrm{S}}_{\mathrm{DCT}}\right) $$
    (2)
  • Step5: Hash the logo (image watermark) using MD5 and then apply DCT-SVD to the resulting hash coefficients.

    $$ \mathrm{W}1\leftarrow \mathrm{hash}\ \left(\mathrm{Watermark}\right) $$
    (3)
    $$ {\mathrm{W}}_{\mathrm{DCT}}\leftarrow \mathrm{DCT}\ \left(\mathrm{W}1\right) $$
    (4)
    $$ {\mathrm{U}}_{\mathrm{w}}{\mathrm{S}}_{\mathrm{w}}{{\mathrm{V}}_{\mathrm{w}}}^{\mathrm{T}}\leftarrow \mathrm{SVD}\ \left({\mathrm{W}}_{\mathrm{DCT}}\right) $$
    (5)
  • Step6: Embed the watermark into selected sub band of cover image

    $$ {\mathrm{S}}_{\mathrm{w}\mathrm{at}}\leftarrow {\mathrm{S}}_{\mathrm{c}}+\left(\mathrm{k}\ast {\mathrm{S}}_{\mathrm{w}}\right) $$
    (6)
  • Step7: Apply inverse SVD, inverse DCT and inverse LWT in order to obtain modified selected color component.

  • Step8: Concatenate modified color component with other two color components to obtain watermarked image.

  • Step9: Convert the watermarked image to RGB color space if they are watermarked in YIQ and YCbCr color space.

2.2 Extraction process for image watermark

  • Step1: Read the images

    Input: Color Cover Image (512 × 512 × 3), Color Watermarked image (512 × 512 × 3)

  • Step2: Select the color component from watermarked and cover image for watermark extraction.

  • Step3: Apply 3rd-level LWT transform over selected component of watermarked and cover image and select their corresponding LH3 sub band.

  • Step4: DCT-SVD is applied to the selected LH3 sub band of cover and watermarked image.

    $$ {\mathrm{S}}_{\mathrm{DCT}}\leftarrow \mathrm{DCT}\ \left(\mathrm{LH}3\right) $$
    (7)
    $$ {\mathrm{U}}_{\mathrm{c}}{\mathrm{S}}_{\mathrm{c}}{{\mathrm{V}}_{\mathrm{c}}}^{\mathrm{T}}\kern0.5em \leftarrow \mathrm{SVD}\ \left({\mathrm{S}}_{\mathrm{DCT}}\right) $$
    (8)
    $$ {\mathrm{S}}_{\mathrm{WDCT}}\leftarrow \mathrm{DCT}\ \left(\mathrm{LH}3\right) $$
    (9)
    $$ {\mathrm{U}}_{\mathrm{w}1}{\mathrm{S}}_{\mathrm{w}1}{{\mathrm{V}}_{\mathrm{w}1}}^{\mathrm{T}}\leftarrow \mathrm{SVD}\ \left({\mathrm{S}}_{\mathrm{WDCT}}\right) $$
    (10)
  • Step5: Extract the watermark from corresponding SVD coefficients of cover and watermark image.

    $$ {\mathrm{W}}_{\mathrm{ext}}\leftarrow \left({\mathrm{S}}_{\mathrm{w}1}\hbox{--} {\mathrm{S}}_{\mathrm{c}}\right)/\mathrm{k} $$
    (11)
  • Step6: Apply inverse SVD and inverse DCT to Wext.

  • Step7: Rehash the inverse DCT coefficients to obtain final extracted watermark

2.3 Embedding process for text watermark

Text watermark (Info) is embedded using following process:

  • Step1: Read the images

  • Input: Color Cover Image (512 × 512 × 3)

  • Step2: Select the color component for watermark embedding

  • Step3: Apply LWT on selected color component, decompose it into its sub bands and select LL3 sub-band.

  • Step4: Text watermark (Info) is converted into binary bits.

  • Step5: Apply Hamming encoder and then Arithmetic encoding algorithm to the info watermark and replace 0 by -1.

  • Step6: Embed the watermark into cover image’s LL3 sub band using following equation.

    $$ \mathrm{B}^{\prime}\left(\mathrm{x},\mathrm{y}\right)=\mathrm{B}\left(\mathrm{x},\mathrm{y}\right)\left(1+\mathrm{k}\ast {\mathrm{W}}_{\mathrm{t}}\right) $$
    (12)
    \( {\mathrm{B}}_{\mathrm{i}}^{\prime}\left(\mathrm{x},\mathrm{y}\right) \):

    After embedding LL3 LWT coefficients

    B(x,y):

    Before embedding LL3 LWT coefficients

    Wt:

    Text watermark bits and k is the gain factor.

  • Step7: Apply inverse LWT in order to obtain watermarked selected component.

  • Step8: Concatenate the watermarked component with other two color components.

  • Step9: Convert the watermarked image into RGB color space if they were previously converted into YIQ or YCbCr color image model.

2.4 Extraction process for text watermark

Watermark (Info) can be extracted by following method: -

  • Step1: Read the images

Input: Color Cover Image (512 × 512 × 3), Color Watermarked image (512 × 512 × 3)

  • Step2: Select the color component from the cover and watermarked image for watermark extraction.

  • Step3: Apply 3rd-level LWT transform on selected component of watermarked and cover image and select their corresponding LL3 sub-bands.

  • Step4: Extract the text watermark bits from the coefficients of LL3 sub band of watermark and cover image.

    $$ {\mathrm{Wt}}_{\mathrm{i}}^{\prime }=\frac{{\mathrm{B}}^{\prime}\left(\mathrm{x},\mathrm{y}\right)-\mathrm{B}\left(\mathrm{x},\mathrm{y}\right)}{\mathrm{k}\ast \mathrm{B}\left(\mathrm{x},\mathrm{y}\right)} $$
    (15)
  • Step5: Apply Arithmetic decoder and then Hamming decoder algorithm to the extracted text watermark bits.

  • Step6: Convert the extracted bits into text to get final extracted Info watermark.

3 Experimental results and analysis

The performance of this hybrid approach for text watermarking has been evaluated in terms of Peak Signal to Noise Ratio (PSNR) for watermarked image, Normalized Correlation (NC) for image watermark and BER (Bit Error Rate) for text watermark [24, 29, 39, 52,53,54,55]. The color image having size 512 × 512 × 3 and watermark image having size 64 × 64 are considered for watermarking. The standard evaluation criteria used to check the effectiveness of watermarking algorithm is the imperceptibility of the watermarked image and robustness of embedded watermarks. Peak Signal to Noise Ratio (PSNR) value is used to check the imperceptibility of watermarked image. The robustness of the embedded watermarks is checked using Bit Error Rate (BER) parameter for text watermark and Normalized Correlation (NC) parameter for image watermark.

The algorithm can be tested for different size of text watermark, image watermark and cover image. For testing purpose we have downloaded images from internet. However these images can be application specific such as medical images for telemedicine applications. We have used only three standard parameters for testing the proposed algorithm. In addition to these standard parameters, various other parameters such as number of changing pixel rate (NPCR), unified averaged changed intensity (UACI), and structural similarity index (SSIM) can be used for evaluating the proposed approach. Image watermark’s security is increased by using MD-5. Info watermark containing information related to image for authentication purposes is used as text watermark.

Figure 2a-f shows the cover images: Earth, India-map, Lena Meyer, Lump, Mountain, and Peppers. Figure 3a-d shows the watermark images: logo, moon, stone and peppermint. Text watermark is given in Fig. 4. Figure 5a-f shows the corresponding watermarked images.

Fig. 3
figure 3

a logo, b moon, c stone, d peppermint

Fig. 4
figure 4

Text watermark (Info)

Fig. 5
figure 5

Watermarked, a Earth, b India-map, c Lena Meyer, d Lump, e Mountain, f Peppers

Figure 6a-d shows the corresponding extracted watermarks The size of text watermark Info is considered as 80 characters for Tables 3, 4 and 5. In Table 3, BER, PSNR and NC values for this approach has been computed for different scaling factors.

Fig. 6
figure 6

Extracted Watermarks, a logo, b moon, c stone, d peppermint

In Table 1, the performance of algorithm is tested for different components in three color image models i.e. RGB, YIQ, YCbCr. The size for text watermark used for this table is 40 characters. The maximum PSNR value is 34.60 at gain factor 0.01 in Y component of YIQ model and minimum PSNR value is 27.59 in Y component of YCbCr model. Maximum NC value is obtain at Y component of YCbCr model i.e. 0.9984 and minimum NC value is −0.3997 obtained in I component of YIQ model. The BER is 0% in different components of color image model and the highest BER obtained is 50.357% in Cr component of YCbCr model. Only the Y component of YIQ and YCbCr model provides high NC values with 0% BER. The NC values are higher in YCbCr model for Y component. Therefore Y component of YCbCr model is use for further performance testing.

Table 1 PSNR, BER, NC values for various Color Image models at Various Scaling Factors

In Table 2 the performance is evaluated for different size of text watermark at various gain factors. Maximum PSNR value obtained is 34.55 for text watermark of size 20 at gain factor 0.01 and minimum value obtained is 25.59 for 80 characters at gain factor 0.15. Therefore the PSNR values decrease with increase in number of characters and gain factor.

Table 2 PSNR, BER, NC values for various text watermark size at various scaling factors

Figure 7 represents Table 2 graphically. Values of PSNR, NC and BER are averaged for different characters. Table 3 shows the performance of the algorithm at different scaling factors. The highest and lowest PSNR values are 34.47 and 24.31 at gain factors 0.01 and 0.18 respectively. The BER is 0 for all gain factors. Maximum NC value is 0.9989 which is obtained at 0.1 gain factor and lowest NC value is 0.9092 at gain factor 0.01. Figure 8 is used for the graphical representation of Table 3. However the scaling factor ‘0.06’ is considered for the experimental purpose in Tables 4 and 5 because it provides PSNR value greater than 30 i.e. 31.31 with robust NC value of 0.9975.

Fig. 7
figure 7

Average of PSNR, BER, NC values for various Text Watermark Size at different gain Factors

Table 3 PSNR, BER, NC values at various scaling factors
Fig. 8
figure 8

PSNR, BER, NC values at various scaling factors

Table 4 PSNR, BER, NC Performance for various images (Cover and Watermark) at Gain 0.06
Table 5 BER, NC results for various Attacks at Gain 0.06

Table 4 shows the BER, PSNR and NC values for various images (cover and watermark). The maximum PSNR obtained is 32.61 for Mountain as cover image and logo as watermark image Minimum value for PSNR is 29.51 for India Map cover image and logo as watermark. NC value obtained for mountain image is 0.9976 which is also the highest NC value and minimum NC value is 0.9383 for peppers as cover image and mint watermark.

The BER is ‘0’ for maximum cover and watermark images except 44.10% BER are obtained for for India-map cover image and logo watermark image. Figure 9 shows Table 4 graphically. The BER and NC values of this approach against various attacks are given in Table 5.

Fig. 9
figure 9

PSNR, BER, NC Performance for various images (Cover and Watermark) at Gain 0.06

The lowest NC value is obtained for Average filter attack i.e. 0.4968 and highest NC value is obtained for Gaussian noise (m = 0, v = 0.001) which is 0.9892. The BER is 0 for maximum attacks however maximum value for BER is obtained at Rotation (5°) i.e. 54.107. Figure 10 demonstrates the graphical representation of Table 5.

Fig. 10
figure 10

BER, NC results for various Attacks at Gain 0.06

Table 6 shows the comparison our proposed method with technique proposed in [45]. The maximum NC value obtained by our technique is 0.9965 and maximum value of NC is [45] for 0.9837. The method proposed in [45] has better NC values as compared to our proposed technique for Average filter ([3 3]) and Speckle (v = 0.01), and the values corresponding to these attacks are 0.7346 and 0.8819 respectively. However the NC values of our proposed method for these attacks are 0.4968 and 0.8389. For other attacks the NC performance of our proposed method is better than the approach in [45].

Table 6 Comparing NC performance of proposed method with Singh [45]

From these experimental results we can conclude that the performance of this algorithm depends on the type of color image model, cover image, watermarks size, scaling factors, size of text watermark, and noise variations. The PSNR value highly depends on scaling factor and number of characters. As we increase the scaling factor and number of characters the PSNR value decreases. NC values are not showing any pattern (increasing or decreasing) in relation with text watermark size and scaling factor. Even for high scaling factor NC values decrease. For some attacks and cover image BER is high. This may happen because of combined encryption and compression. If some bits get garbled because of some attacks then the extracted text watermark may show high bit error rate.

4 Conclusion

In this paper, hybrid image watermarking technique using LWT-DCT-SVD has been proposed. The important properties of the proposed approach are: 1) LWT provides increase in smoothness and reduction in aliasing effects, prevents loss of information and improves robustness of watermark. In addition to this LWT also requires less memory and computational complexity. Therefore combination of LWT-DCT-SVD achieves excellent performance. 2) Embedding multiple watermarks into single cover image increases capacity and also helps in authentication. 3) Conservation of transmission bandwidth by using multiple watermarks. 4) Compression of text watermark using Arithmetic coding helps in embedding more bits into cover image or can be used to improve imperceptibility. Therefore the proposed method is suitable for the protection of digital documents from theft/modification/alteration in different social applications.

In future we will increase the efficiency of proposed algorithm by testing it with other security related algorithms and compression techniques. The BER performance of the proposed method requires improvement.

We would like to improve the performance of proposed method by using various optimization techniques. Deciding the scaling factor with which the watermark should be embedded into the cover image is major research gap which requires consideration. Therefore we will try to improve the proposed algorithm by determining the optimal scaling factor with the help of machine learning techniques.