1 Introduction

Prior to the advanced time, the image takers or associations generally sign their photographs or structures utilizing their mark or decorating seals to help recognize the proprietors of the pictures, particularly if the Licensed innovation (IP) gets shared. Watermarking is another method for marking the picture by the proprietor for destroying the endeavors of assailants. A watermark is a superimposed logo put over an image with an aim of recognizing the proprietor of the image. Analog watermarks existed for quite a long time which are unmistakable and are generally simpler to recreate. Advanced Watermarking as a major aspect of digital right management (DRM) framework allows concealing the copyright proprietor/wholesaler/circulation chain/buyer in the pictures as a proof of ownership if there should arise an occurrence of copyright security and copyright law requirement [6,7,8]. A few tasks associated with putting away/altering/transmitting may contort, erase, or generally may meddle with watermarks. Although there are a lot of watermarking methods that are accessible web-based, watermarking is yet a difficult errand when managing attacks [9, 42]. Tools, for example, Checkmark, Optimark, and StirMark are the couple of programming techniques that evaluate the watermarking techniques [9].

In the literature, different sorts of schemes are proposed for image watermarking [1, 9, 12,13,14, 27, 28, 30, 35, 41,41,42,44, 46, 51,51,53]. The transform-based schemes are well known and are more focused as they exhibit better characteristics [28]. As of late, hybrid image watermarking strategies have been proposed to check their viability in watermarking. A large portion of these strategies are non-blind, require cover image for watermark extraction, which might be hard to deliver. The blind watermarking strategies do not require original images for watermark extraction and are adaptable to be utilized in numerous applications including image verification, copyright insurance, and electronic frameworks. The robust watermarking is the technique can example, duplicate control; authentication and copyright insurance as they get by against a wide scope of attacks and when the watermarks get non-damaging in the event of attacks [14].

Recently, many medical information is exchange from one healthcare centre to other healthcare center. When this medical information (particularly medical image) is transfer using open communication channel then it is vulnerable against manipulation in it. Thus, security and privacy of medical image is required when it transmits over communication channel. For integrity and privacy issue of medical image in telemedicine applications, researchers were show the useful of watermarking for security of medical images in telemedicine applications [2, 4, 19, 20, 36, 39,39,41]. The main requirements of watermarking for telemedicine applications are that scheme should be provided higher imperceptibility, better robustness against watermarking attacks and extraction of watermark information done using blind approach [41, 46].

The various types of proposed watermarking schemes for integrity and security of medical images in recent time are discussed here. Thakkar et al. [41] proposed blind medical image watermarking using discrete wavelet transform (DWT) and singular value decomposition (SVD) for security of medical image for telemedicine applications. This scheme equally works for grayscale as well as color medical images. Singh et al. [36] proposed redundant discrete wavelet transform (RDWT) based hybrid medical image watermarking scheme. But the limitation of this scheme is that it has less imperceptibility for watermarked medical images. Aparna et al. [4] proposed blind crypto- watermarking scheme for security of medical images. This scheme was developed using advanced encryption standard (AES) and arithmetic encoding algorithm along additive watermarking approach. This scheme was generated watermarked medical image with less imperceptibility. Kahlessenane et al. [19] proposed blind watermarking scheme using DWT for security of medical images.

Anand et al. [2] proposed non-blind watermarking scheme using combination of DWT – SVD for security of medical images. The main limitation of this scheme is that at receiver side, original cover image requires for extraction of watermark image from the watermarked image. Swaraja et al. [40] proposed blind and optimized watermarking scheme using DWT and schur transform with combination of optimization algorithm such as particle swarm bacterial for-aging (PSBF) for security of medical image. In this scheme, optimization algorithm was used to get optimized watermarked medical images. Singh et al. [39] proposed blind watermarking scheme using polar harmonic Fourier transformation (PHFT) for security of medical image. The scheme differs than other schemes because it uses different kind of transform for generation of watermarked images. Kahlessenane et al. [20] proposed blind watermarking scheme using non-subsample contourlet transform (NSCT) and schur transform for security of medical images. The limitation of this scheme is that it generates watermarked medical images with low imperceptibility.

In this paper, a blind and robust image watermarking scheme dependent on non-subsampled contourlet transform (NSCT) and redundant discrete wavelet transform (RDWT) is proposed for security of general images and medical images. The main strength of this proposed scheme is that it provides higher imperceptibility along with better robustness and blind extraction possible which shows that the proposed scheme has achieved all basic requirements of watermarking for security of medical images in telemedicine applications. Also, this scheme is equally working on general images. This is beauty of this proposed scheme without any minor changes, it works good for any kind of images.

In this scheme, a watermark (binary logo or monochromic image) is inserted into the wavelet sub band of contourlet sub band of the cover image in such a way that blind extraction is possible. The proposed scheme is tested and analyzed over several general images and medical images and its performance in term of imperceptibility and robustness is compared with existing watermarking schemes in the literature [11, 20, 33, 37, 38]. Following are some few other contributions provided by the proposed scheme.

  • Improved imperceptibility and robustness: The high frequency contourlet coefficients are utilized to achieve better imperceptibility, while coefficients of wavelet sub-band of host are utilized for better robustness. In this way, combination of these two transforms is used in this proposed scheme to improves the limitations of existing schemes [11, 20, 33, 37, 38].

  • Improved Security: In the existing schemes [11, 20, 33, 37, 38], watermark or secret information is straightaway inserted into the cover image. Therefore, these schemes provide lesser security for watermark or secret information. To overcome this limitation, in this proposed scheme, the PN patterns are produced using a secret key. Here, the PN pattern are inserted into cover image according to value of watermark image. Therefore, security of watermark or secret information is achieved in the scheme without inserted actual value of watermark image into cover image.

  • Blind Extraction: Many existing scheme [2, 17, 18, 23, 29, 37, 38, 45, 49, 50] are non-blind, where cover image information is required at extraction of watermark. This proposed scheme is blind where it requires only the secret key for extraction of watermark.

The remainder of the paper is composed as pursues: the related works are examined in section 2. The working of proposed watermarking scheme is given in section 3, followed by results in Section 4. At last, section 5 concludes the research work.

2 Related Works

In this section, the overview of various related watermarking schemes is provided.

2.1 NSCT based Watermarking Schemes

Kumar et al. [21] provide non-blind watermarking scheme using NSCT for security of multiple watermark images. Jayalakshmi et al. [18] modified high frequency contourlet coefficients of cover image create watermarked image, followed by non-blind extraction approach. Yang et al. [50] proposed support vector regression (SVR) and NSCT based non-blind watermarking scheme for copyright protection of grayscale images. In this scheme, low frequency contourlet sub-band is changed for watermark inserting. This system gives robustness strength against geometric attacks. C. Narasimhulu and K. Prasad [29] proposed another comparable hybrid non-blind image watermarking system using CT and SVD domains. Alternately, an NSCT based color watermarking scheme is proposed by Sadreazami et al. [34].

S. Das and M. Kundu [11] proposed blind medical image watermarking scheme which embeds AES encrypted watermark in DCT coefficients of NSCT low pass subband of cover image using secret key. In Patil and Rindhe [32] non-blind approach, first, NSCT is applied on cover image and contourlet coefficients of low pass subband of it are altered by bits of watermark to get watermarked version of cover image. V. Ananthaneni and U. Nelakuditi [3] proposed blind medical image watermarking utilizing NSCT, DCT, and SVD. The contourlet coefficients of two sub-bands are separated into 16 × 16 non-overlapping squares. The DCT is applied to the squares of these coefficients to get hybrid coefficients of cover image, followed by the SVD application to estimate hybrid coefficients of cover image into which the watermark picture is embedded utilizing secret keys. In this method, the watermark picture is additionally isolated into 16 × 16 non-covering squares. Singh et al. [38] proposed a similar approach, where the contourlet coefficients of all the sub-bands of cover image are utilized for watermark inserting.

2.2 RDWT based Watermarking Schemes

Bajaj et al. [5] proposed watermarking scheme combining RDWT – DCT – SVD for images. It employs non-blind extraction which demands for original cosine frequency coefficients of chosen wavelet sub-band of cover image. A RDWT – SVD based Arnold scrambled biometric watermarking is proposed by Singh et al. [37]. Thanki et al. [45] proposed another non-blind CS based encryption and RDWT – SVD based watermarking scheme where three types of watermarks are inserted into each channel of color cover image. Independent component analysis (ICA) based blind watermarking scheme is proposed by Hien et al. [16] where in watermark is inserted in RDWT domain. The wavelet sub-band of cover image is altered by PN patterns in accordance with the watermark bits in Mankar et al. [25] method. A principal component analysis (PCA) based watermarking scheme where in RDWT is utilized for watermark insertion, and the ICA – PCA for non-blind watermark extraction is proposed by Oskooei et al. [31].

Yet another RDWT and SVD based scheme for non-blind extraction is proposed by Lagzian et al. [23]. Makbol and Khoo [24] proposed blind image watermarking scheme using the same domains. Here, singular estimations of all wavelet sub-band of cover image are changed by watermark and watermarking key. Roy et al. [33] proposed watermarking scheme utilizing mixture of RDWT – DCT for images where encrypted bits of watermark inserted into selected hybrid coefficients of host to get watermarked image.

3 Background

In the proposed blind watermarking scheme, the watermark inserting, and extraction are performed in mixture of NSCT and RDWT. Therefore, in this section, the information of these two transforms is covered.

3.1 Non-Subsampled Contourlet Transform (NSCT)

The NSCT is a one of the types of contourlet transform (CT) [15]. The properties such as repetitive change and invariant moving of this transform makes it a decent possibility for usage in the process of watermark inserting. This transform converts image in to multiscale and multidirectional dimension by utilizing various filter channel banks such as laplacian pyramid (LP) and directional channel (DC). Here, the LP provides multiscale portrayal while DC provides multidirection portrayal to image. The output coefficients after these two filter channel banks process are known as contourlet coefficients. The coefficients provide rich directional information and smooth shapes of image compared to wavelet transform [10, 15, 26]. This transform also overcomes sub-band blending issue of wavelet transform. Figure 1 shows 1st level NSCT decomposition of image where image decomposed into two different sub-bands such as lowpass and bandpass. The frequency of lowpass sub-band is low and has visual information of image, while frequency of bandpass sub-band is high and has smooth as well as edges information of image. Figure 2 shows sample image and its contourlet coefficients. Here, 1st level decomposition provides one lowpass sub-band and five bandpass sub-bands.

Fig. 1
figure 1

NSCT Decomposition of Image

Fig. 2
figure 2

(a) Lena image, (b) Low pass contourlet coefficients, (c) – (g) Band pass contourlet coefficients

3.2 Redundant Discrete Wavelet Transform (RDWT)

The most common transform used for watermarking is DWT, which down samples the original image while making sub bands [16, 23]. The result is a restriction on the payload capacity of watermarking. Further, the DWT is also shift variant which may lead to failure in watermark extraction. These problems can be overcome by employing redundant discrete wavelet transform (RDWT) for watermarking. The RDWT provides shift invariance for better extraction of watermark. The RDWT eliminates downsampling and the upsampling process of discrete wavelet transform. The difference between discrete wavelet transforms (DWT) and redundant discrete wavelet transform (RDWT) is shown in Fig. 3.

Fig. 3
figure 3

Main difference between DWT and RDWT (a) Image Analysis and Synthesis using DWT (b) Image Analysis and Synthesis using RDWT

4 Proposed Watermarking Scheme

The proposed scheme is based on combination of two transform NSCT and RDWT. In this scheme, first 1st level NSCT after that 1st RDWT is applied on cover image to get its hybrid coefficients. After that, the PN patterns are inserted into hybrid coefficients of cover image according to value of watermark image such way that extraction of watermark image is done blindly at extraction side. The various combinations of these coefficients are tried to use to generated watermarked image. The proposed watermarking scheme incorporates two processes: inserting (shown in Fig. 4) and extraction (shown in Fig. 5). The details of these processes are given in next subsections.

Fig. 4
figure 4

Block Diagram of Watermark Inserting Process

Fig. 5
figure 5

Watermark Extraction Process in Proposed Watermarking Technique

4.1 Inserting Process

The steps of this process are given below:

  1. Step 1:

    Decompose cover image into its contourlet sub-bands, 1st level NSCT is applying on it.

  1. Step 2:

    Select any bandpass contourlet sub-bands of cover image. Then, apply 1st level RDWT to get wavelet sub-bands of selected contourlet sub-band of cover image. After RDWT decomposition, contourlet sub-band of cover image is decomposed into 4 sub-bands, for example, Cψ, ψ∈ LL, LH, HL, and HH.

  2. Step 3:

    Choose any sub-band of wavelet sub-bands and divide it into non-covered blocks with size of 8 × 8.

  3. Step 4:

    With the help of secret seed and noise generator, generate two PN patterns which are uncorrelated in the nature.

  4. Step 5:

    Insert a bit of watermark in each block of selected wavelet sub-band of contourlet sub-band of cover image using following equations:

  1. a.

    If watermark contains zero bit, then:

$$ {WC}_{S\psi}={WC}_{S\psi}+k\times {P}_0 $$
(1)

else

$$ {WC}_{S\psi}={C}_{S\psi}+k\times {P}_1 $$
(2)

Where, WC is modified selected wavelet sub-band, C is originally selected wavelet sub-band of contourlet sub-band of cover image, k is the scaling factor, P0 corresponds to PN pattern for bit 0, and P1 corresponds to the PN pattern for bit 1.

  1. Step 6:

    Perform 1st level IRDWT on modified selected wavelet sub-band to get modified selected contourlet sub-band. Then perform 1st level INSCT on it to generate a watermarked image, WI.

4.2 Extraction Process

The steps of this process are given below:

  1. Step 1:

    The watermarked image decomposed into its contourlet sub-bands such as lowpass and bandpass with the help of 1st level NSCT decomposition. Then, select a similar high frequency contourlet sub-band that was chosen during watermark inserting process.

  2. Step 2:

    Perform 1st level RDWT to get modified wavelet coefficients of contourlet sub-band of watermarked image.

  3. Step 3:

    Select a similar wavelet sub-band of contourlet sub-band of watermarked image (WI) which was chosen during inserting process. Convert this sub-band into non-covered blocks.

  4. Step 4:

    Take two PN patterns which was generated during inserting process.

  5. Step 5:

    Calculate the parameters CS1 and CS2 using correlation process (corr2) such that:

    $$ CSI= cor{r}^2\left({WI}_{S\psi},{P}_0\right) $$
    (3)
    $$ CS2= cor{r}^2\left({WI}_{S\psi},{P}_1\right) $$
    (4)

If CS1 < CS2, assign watermark bit as 1, else as 0.

  1. Step 6:

    After getting all bits of watermark, the reshaping operation is applied on vector of these bits to get recovered watermark.

5 Results and discussion

The performance for the proposed scheme is tested on grayscale host [47] and watermark image [33]. The size of cover image and watermark is 256 × 256 pixels and 8 × 8 pixels. The performance relies upon the choice of subbands during watermark inserting. Figure 6 demonstrates the test cover image and watermark.

Fig. 6
figure 6

Test Cover images (a) Lena (b) Peppers (c) Airplane (d) Baboon and (e) Watermark

5.1 Performance Measures

The peak signal to noise ratio (PSNR) [22] is used to measure the similarity between original cover image and watermarked image and is given in eq. 5. The PSNR is measured in dB value. The MSE is calculated using eq. 6 which gives a real value. The MSE finds error between cover image and watermarked image. A high value of PSNR indicates more similarity of images, indicating high imperceptibility of hidden watermark.

$$ PSNR=10\times {\log}_{10}\left(\frac{255^2}{MSE}\right) $$
(5)
$$ MSE=\frac{1}{M\times N}\sum \limits_{x=0}^{M-1}\sum \limits_{y=0}^{N-1}{\left(C\left(x,y\right)- CW\left(x,y\right)\right)}^2 $$
(6)

Where, C is original cover image and CW is watermarked image, respectively.

The robustness of the watermarking scheme can be measured by Normalized Correlation (NC) [22] and Structural Similarity Index Measure (SSIM) [48]. The NC and SSIM can be calculated using Eqs. 7 & 8, respectively. While NC measures the correlation between original and extracted watermark images, the SSIM measures the similarity between them. The robustness of any watermarking scheme is high if NC and SSIM values are closer to one.

$$ NC=\frac{\sum \limits_{x=1}^M\sum \limits_{y=1}^Nw\left(x,y\right)\times w\ast \left(x,y\right)}{\sum \limits_{x=1}^M\sum \limits_{y=1}^N{w}^2\left(x,y\right)} $$
(7)

Where, w is the original watermark image and w* is the recovered watermark image.

$$ SSIM=\frac{\left(2{\mu}_w{\mu}_{w\ast }+{C}_1\right)\left(2{\sigma}_{ww\ast }+{C}_2\right)}{\left({\mu}_w^2+{\mu}_{w\ast}^2+{C}_1\right)\left({\mu}_w^2+{\mu}_{w\ast}^2+{C}_2\right)} $$
(8)

Where, μw is the average of original watermark image, μw* is the average of recovered watermark image, σww* is the covariance of original watermark image and recovered watermark image, and C1, C2 are constant values.

Using above measures, imperceptibility test and robustness test of proposed scheme are performed for various tested cover images.

5.2 Selection of Coefficients for Inserting Watermark Image in to Cover Image

In the proposed scheme, the NSCT breaks down cover image into six diverse contourlet sub-bands. Out of these sub-bands, low frequency contourlet coefficients (C (1, 1)) cannot be utilized for inserting process as it contains enormous visual data of cover image. The RDWT breaks any high frequency contourlet sub-band into four distinctive wavelet sub-bands. A total of 20 combinations of NSCT and RDWT are available in the proposed scheme, and the performance varies for each combination. The PSNR and NC are estimated for each combination of NSCT – RDWT and are listed in Table 1. The robustness of the proposed scheme is high for the combinations of C (1, 4) (1, 1) and C (1, 4) (1, 2) sub-bands with any wavelet sub-band. Subsequently, to accomplish better robustness with the proposed scheme, the combination of C (1, 4) (1, 1) contourlet sub band – HH wavelet sub-band is utilized for watermark inserting process.

Table 1. Performance of proposed scheme for various combination of NSCT – RDWT sub-bands

5.3 Imperceptibility Test

In the proposed scheme, a cover image of size 512 × 512 is taken as cover image. The 1st level NSCT followed by 1st Daubechies (db1) RDWT is applied on cover image to get its hybrid coefficients with size of 512 × 512. After that, these coefficients are divided into 4096 non-overlapping blocks with size of 8 × 8. The watermark image which is of size 32 × 128 pixels is converted into a vector of size 4096. Then according to the watermark bits, selected hybrid coefficients of each block of cover image are modified using two PN sequences, and a scaling factor. After watermark embedding, the inverse 1st db1 RDWT, followed by inverse 1st level NSCT are applied to get watermarked image.

The proposed scheme is tested using different general images to check how the image degrade after inserting process. The performance of inserting process depends on the scaling factor k used in Eq. 2. The amount of degradation on the watermarked image and extracted image is analyzed, by varying the scaling factor k, and the corresponding subjective and objective results are presented in Fig. 7 and Table 2. The results indicate the quality of extracted watermark improves with k, maintaining the visual quality of watermarked images.

Fig. 7
figure 7

Watermarked Images and Extracted Watermarks for Different Scaling Factor Values using Proposed Scheme. (a) Subjective results with scaling factor k = 5. (b) Subjective results with scaling factor k = 15. (c) Subjective results with scaling factor k = 25

Table 2. Objective results for variation in scaling factors

In Table 3, the imperceptibility performance of proposed scheme is compared with other existing RDWT and NSCT based schemes in the literature. It is to be noted that the maximum PSNR achieved using proposed scheme is 57.60 dB which is comparatively high compared to PSNR achieved by existing schemes in the literature.

Table 3. Performance Comparison

5.4 Robustness Test

To verify the robustness test of the proposed scheme, various watermarking attacks such as JPEG compression, different filtering attacks, different noise addition attacks, motion blur, sharpening, histogram equalization and geometric attacks are applied on the watermarked images, and then watermark extraction is attempted and the subjective and objective results are given in Figs. 8, 9, 10, 11 and 12, and Table 4. The robustness of proposed scheme against various watermarking attacks is measured by normalized correlation (NC) and structural similarity index measure (SSIM). For robustness test, the scaling factor k is set to 25.

Fig. 8
figure 8

Subjective Results of Proposed Scheme against Compression Attacks

Fig. 9
figure 9

Subjective Results of Proposed Scheme against Noise Addition Attacks

Fig. 10
figure 10

Subjective Results of Proposed Scheme against Filter Attacks

Fig. 11
figure 11

Subjective Results of Proposed Scheme against various types of Attacks

Fig. 12
figure 12

Subjective Results of Proposed Scheme against various types of Geometric Attacks

Table 4 Quantitative Results of Proposed Scheme against Various Types of Attacks

5.5 Application of Proposed Scheme for Security of Medical Images in Telemedicine

The proposed scheme is additionally analyzed for its applicability to medical images [11] [54] in telemedicine applications, for example, CT, MRI, and US which are shown in Fig. 13. The subjective results (shown in Fig. 14) and objective results (shown in Figs. 15 and 16) for medical images show that this scheme is effectively works for security of medical images.

Fig. 13
figure 13

Test Cover Medical Images (a) CT (b) MRI (c) US (d) Watermark image

Fig. 14
figure 14

(a) – (c) Watermarked medical image (d) – (f) Extracted watermark image using watermarking key k = 25.

Fig. 15
figure 15

NC values of proposed scheme against various attacks for various medical images

Fig. 16
figure 16

SSIM values of proposed scheme against various attacks for various medical images

Figures 15 and 16 shows that the NC and SSIM estimations of recovered watermark image from watermarked medical images against different watermarking attacks. The qualities show that this proposed scheme is robust to a large portion of the basic attacks. This recommends the proposed scheme for its use in security of medical images in telemedicine applications.

5.6 Performance Comparison with Performance of Existing Schemes

The performance comparison of the proposed scheme with RDWT and NSCT based existing schemes [11, 20, 33, 37, 38] is given in Tables 5 and 6 with respect to PSNR and NC. The comparison is performed after considering the same test cover image. The comparison demonstrated that proposed scheme provides better imperceptibility and robustness compared to existing schemes [11, 20, 33, 37, 38].

Table 5. Performance comparison of the proposed scheme with existing RDWT based schemes
Table 6. Performance comparison of the proposed scheme with existing NSCT based schemes

6 Conclusions

This paper proposed hybrid, robust and blind watermarking scheme for security of general images and medical images. The proposed scheme is used combination of NSCT and RDWT to achieved high imperceptibility when PN patterns are used to achieved blind extraction of watermark image at extraction side. The proposed scheme is tested on different kinds of cover images and performance of scheme is compared with many existing schemes in the literature. It is observed that the proposed scheme showed superiority to the existing schemes as far as imperceptibility and robustness is concerned. The proposed scheme is also contrasted with existing watermarking schemes, to suit applications for example, copyright assurance in telemedicine and E-commerce. In future, this scheme will be tested on DICOM version of medical images.