1 Introduction

In recent years, digital image watermarking is used widely to solve ownership issues and verify the authenticity issue of text, image, audio or video. Researchers have proposed a lot of effective techniques aiming to secure information, and copyright protection authentication (Wang et al. 2012). One can define watermarking as process of hiding data, which can be logo, signature, image, sound, label or text, into multimedia object (text, image, audio or video). The embedded object will be later extracted by the other side to achieve the intended purpose such as securing information, authentication of an object and checking ownership (AL-Mansoori and Kunhu 2012).

Watermarking techniques could be categorized into two essential groups that are in spatial domain or in frequency domain. In spatial domain, watermark is embedded directly into pixels of original image by changing pixel values themselves. Least significant bits (LSB) is the simplest technique of all spatial domain techniques, LSB is based on modifying the least significant bits of the original image by watermarking (Ali et al. 2014). Generally, most spatial domain techniques are easy to implement. Unfortunately, spatial domain techniques are not robust to attacks (Ali et al. 2014).

In frequency domain, embedding process is done by transforming representation of spatial domain into frequency domain then modifying its frequency coefficients to embed the watermark. There are a lot of transform domain watermarking methods such as Discrete Fourier Transforms (DFT) (Lu et al. 2010), Discrete Cosine Transforms (DCT) (Phadikar et al. 2011), SVD (Mohammad et al. 2008), and DWT (Ouhsain and Hamza 2009). Frequency domain techniques are better than most of spatial domain techniques in terms of resisting attacks, but require higher computational cost (Ali et al. 2014).

This paper presents an efficient digital image watermarking technique for color image hiding. The proposed approach embeds a color image into a gray scale image by using DWT, SVD and wavelet fusion. Image wavelet fusion is known as the process of combining two or more images to improve the quality and reduce redundancy (James and Dasarathy 2014). The main idea is to split the color image into three basic components (red, green, blue), then fuse every channel with a gray scale image, and integrate the three fused images to construct watermark image by using fusion. Finally, a stego-image is constructed by embedding the watermark into a gray scale cover image by using DWT and SVD. The stego-image then sent via Internet. The transmitted image will appear to attacker as a completely gray scale image.

The rest of this paper is organized as the following arrangement, Sect. 2 briefly discusses the problem of data hiding while Sect. 3 shows the previous related work to solve the problem. Section 4 presents the principles of watermarking and some details for the DWT, SVD and Wavelet Fusion algorithms. Section 5 presents the proposed approach embedding and extracting process. Section 6 introduces the image quality measures and presents the experimental results. Finally, the paper conclusions are shown in Sect. 7.

2 Problem statement

Today, many secret data are being transmitted on the Internet. However, most of secret important messages may get high risks while being transmitted over many public communication channels. The problem now is how to achieve safe secret communication of critical messages.

Some researchers show that a private message can be easily encrypted into some cipher text using a cryptographic technique like data encryption standard (DES) before sending out through the communication channel, to appear meaningless and hence guarantee safe secret communication. Nevertheless, the appearance of secret information as cipher texts readily attract the hackers’ attention. Under such circumstances, if the message is attacked and decrypted by unwanted parity, the data will no longer be secured. In addition, even though chances for the hackers to perform decryption of ciphertexts is weak because of the cryptographic system strong security, at least the upset hackers can destroy the ciphertexts easily and spoil the transmission process.

To easily fix this problem, various kinds of plaintexts like images, audios, videos, etc., are used as a cover to hide the existence of the secret message from the attacker. Although there are multitude plaintext media, images are known to be the most commonly used as they are widely ubiquitous and readily found on the Internet. Also, the higher distortion tolerance degree that images have over other diverse kinds of plaintexts provides them with a very large hiding capacity.

3 Related work

Abdallah et al. (2007a) proposed a robust simple image watermarking technique which embed a watermark in transform domain using the fast Hadamard transform (FHT), DWT and SVD. The applied technique makes improvements in the data embedding system efficiently. As it improves the watermark imperceptibility and resist against several attacks. Abdallah et al. (2007b) proposed a tensor video watermarking scheme which is based on SVD technique. The main idea is to embed a watermark image into the stable coefficients of video frames. That can be applied by modifying singular values (SVs) of high order tensors which belongs to intra-frames video. The proposed method performance shows good robustness and surviving against various attacks such as frame averaging, frame dropping and geometric attacks.

Hemdan et al. (2013a) proposed a hybrid image watermarking technique that is based on fusing two gray scale images using wavelet fusion. Their experimental results demonstrate that wavelet fusion is really an efficient algorithm. Hemdan et al. (2013b) proposed a robust efficient hybrid watermarking technique which is based on wavelet fusing to two gray scale images using three-level DWT and wavelet fusion. Their proposed algorithm increases the embedded information capacity without affecting the original image perceptual scene, and is robust against severe attacks like Gaussian noise, filtering and cropping attacks.

Agarwal et al. (2014) proposed an optimized watermarking embedding and extracting technique which is based on DWT and SVD. The LL3 sub-band SVs coefficients of the cover image are modified by using of watermark SVs. Experimental results declare that the proposed technique guarantee high PSNR values, good visual quality after attack and high robustness against some image processing operations.

Mohananthini and Yamuna (2015) proposed a scheme which is based on fusing the two watermarks into single watermark then embed it into the cover original image using the discrete wavelet transforms. The experimental results declare that this proposed algorithm give the watermarked image good visual quality and is survival to a lot of image attacks like: Gaussian noise, salt and pepper noise, speckle noise, cropping, median filtering, and rotation.

Narula et al. (2015) proposed two watermarking approaches DWT and DWT–SVD which are applied to ensure image content security and watermark robustness. After that they applied both watermarking approaches and compared values of peak signal to noise ratio (PSNR). Experimental results show that the hybrid DWT–SVD is much better than DWT approach alone. It is shown that after applying the two watermarking approaches, the quality of the watermarked image degrades significantly when using DWT approach watermark embedding in comparison to DWT–SVD.

Naidu et al. (2016) proposed a DWT–SVD watermarking method that aims to embedding a single watermark image that can be exactly as large as the cover image. It is proved that modifying the cover image SVs of DWT domain provides highly robustness against several common attacks. Another beneficial point of DWT–SVD algorithm is high PSNR and high correlation coefficient of the watermarked image compared to the results of using only DWT.

4 Preliminaries

4.1 Principles of image watermarking

Generally, image-watermarking scheme has two main phases; embedding process, and extraction process, as shown in Fig. 1. In embedding process, the insertion of watermark into original image is done using an algorithm that produces watermarked image. This watermarked image is then transmitted to the other side via communication channel. It may pass safely or be exposed to an attack. In extraction process, the other side receives the watermarked image and uses that chosen algorithm to separate the watermark and original images. Without attack, the extracted watermark is often the same as the watermark before sending. However, with attack, without a robust algorithm, the extracted watermark will be ruined.

Fig. 1
figure 1

General framework of digital image watermarking. a Without attack, b with attack

The image watermarking algorithm should fulfill the following requirements which must integrate with each other in addition to trade-offs in order to produce a powerful watermarking algorithm (Singh 2011):

  1. (1)

    Robustness the watermark shouldn’t be affected or removed by an unauthorized party. Therefore, it should be very resilient against common signal processing manipulations like cropping, filtering, or compression.

  2. (2)

    Imperceptibility the watermark shouldn’t degrade the quality of the original image and it shouldn’t be observed by human naked eye.

  3. (3)

    Capacity maximum number of bits which can be buried in the original image.

  4. (4)

    Security watermark should be only detected by the authorized party.

4.2 Discrete wavelet transform

Discrete wavelet transform (DWT) is widely used in the field of signal processing. It can be used in removal of noise in audio as well as compression of image, audio and video. One dimensional DWT or one level DWT decomposes the image into 4 bands denoted by lower resolution image approximation (LL), horizontal (HL), vertical (LH) and diagonal (HH) as shown in Fig. 2a (Hemdan et al. 2013a; Mohamed 2010). Multi-level DWT is done by applying previous decomposition again on a band. The image can be decomposed onto N level wavelet transformation, as shown in Fig. 2b (Bhatnagar and Raman 2009).

Fig. 2
figure 2

Discrete wavelet transform (DWT). a One level DWT, b Multi level DWT

4.3 Singular value decomposition

Singular value decomposition (SVD) is a mathematical technique that is based on linear algebra theorem which shows that the rectangular matrix ‘A’ can be decomposed into three matrices (Hemdan et al. 2013b): U (Orthogonal matrix), S (Diagonal matrix) and V (Transpose of an orthogonal matrix). The theorem can be presented usually as:

$$A = USV^{T} .$$
(1)

4.4 Wavelet fusion

4.4.1 Definition

Image fusion is defined as the process that can combine two or more images into a single image which is called Fused Image. This is shown in Fig. 3. The fused image keeps most important features of the original cover image. Image fusion is a vital technique used in many applications such as computer vision, microscopic imaging, robotics and remote sensing (Hemdan et al. 2013b).

Fig. 3
figure 3

Fusion of two images

Image fusion’s common form of transform is the wavelet transform fusion (Hill et al. 2002). First, two images are transformed into wavelet transforms. Then, the transformed images are combined in transform domain by using a defined fusion rule. At last images transformed back to spatial domain to give the resultant fused image. Mathematically wavelet transform fusion can be defined by considering wavelet transforms W of two registered input images \(I_{1} \left( {x,y} \right)\) and \(I_{2} \left( {x,y} \right)\) together with fusion rule ∅. After that, inverse wavelet transform ω−1 is computed, and fused image \(I\left( {x,y} \right)\) is reconstructed. This process is shown in Fig. 4 and expressed by Eq. (2) (Hill et al. 2002).

Fig. 4
figure 4

Fusion of wavelet transforms of two images

$$I\left( {x,y} \right) = \omega^{ - 1} \left( {\emptyset \left( {\omega \left( {I_{1} (x,y)} \right)} \right),\omega \left( {I_{2} (x,y)} \right)} \right)$$
(2)

4.4.2 Why to choose wavelet fusion?

The proposed approach applies multi-level wavelet decomposition for both the cover and watermark image. When images apply wavelet decomposition, their components are separated directly into bands which have approximately equal bandwidth. This idea is like retina of human eye when it splits any image into its components. So, it is expected to use discrete wavelet transform as it makes the independent processing of resulting components much like human eye. For that reason, using of wavelet decompositions for fusion of images is very popular. Fusion is known as the process of combining information (Kundur and Hatzinakos 1997).

5 Proposed approach

In this section, color image watermarking approach is proposed. It is based on SVD, DWT and wavelet fusion techniques. The major goal of this proposal is to embed a colored watermark image into a gray scale image without perceptual degradation of colored watermark image taking into account robustness against common attacks. The proposed watermarking approach consists of two main phases; embedding phase and extraction phase.

5.1 Embedding process

Figure 5 illustrates the embedding process of the proposed algorithm. It works as follows:

  1. 1.

    Analyze/split colored watermark image into three channels; red, green, and blue.

  2. 2.

    Fuse every channel of colored image into the same gray scale image separately using wavelet fusion. This produces ‘Fused Image1’ for red channel, ‘Fused Image2’ for green channel and ‘Fused Image3’ for blue channel.

  3. 3.

    Fuse ‘Fused Image1’ and ‘Fused Image2’ using wavelet fusion to produce ‘Fused mixed1’.

  4. 4.

    Fuse ‘Fused mixed1’ and ‘Fused Image3’ using wavelet fusion to produce ‘Total Fused Watermark’ that will be embedded onto an original gray scale image.

  5. 5.

    Apply one-level DWT to ‘Original Image’ as well as ‘Total Fused Watermark’.

  6. 6.

    Apply SVD to A matrix of the resultant ‘Total Fused Watermark’

    $$A = U_{1} S_{1} V_{1}^{T}$$
    (3)
  7. 7.

    Apply SVD to resultant ‘Original Image’ matrix B according to equation:

    $$B = USV^{T}$$
    (4)
  8. 8.

    Add SVs of Matrix B ‘Original Image’ to SVs of Matrix A ‘Total Fused Watermark’ according to equation

    $$D = S + k*S_{1}$$
    (5)

    where, k is a gain factor that controls the watermark strength.

  9. 9.

    Apply SVD to the new altered D matrix resultant from step 8 as:

    $$S_{w} = U_{w} DV_{w}^{T}$$
    (6)
  10. 10.

    Obtain resultant image \(A_{w}\) By using altered matrix:

    $$A_{w} = US_{w} V^{T}$$
    (7)
  11. 11.

    Apply one-level inverse DWT (IDWT) to resultant image A w To produce the ‘Watermarked Image’, which is gray scale image.

Fig. 5
figure 5

Embedding process of the proposed approach

5.2 Extraction process

Figure 6 illustrates the extraction process of the proposed algorithm. It works as follows:

Fig. 6
figure 6

Extraction process of the proposed approach

  1. 1.

    Apply one-level DWT to ‘Extracted Watermarked Image’ to produce ‘Extracted Resultant Image’.

  2. 2.

    Apply SVD to ‘Extracted Resultant Image’ \(A_{w}^{*}\) matrix according to equation:

    $$A_{w}^{*} = U^{*} S_{w}^{*} V^{*T}$$
    (8)
  3. 3.

    Compute matrix \(D^{*}\) according to equation:

    $$D^{*} = U_{w} S_{w}^{*} V_{w}^{T}$$
    (9)
  4. 4.

    Obtain ‘Extracted Total Fused Watermark’ W* according to the equation.

    $$W^{*} = \frac{{D^{*} - S}}{k}$$
    (10)
  5. 5.

    Apply IDWT (inverse DWT) to construct the ‘Extracted Total Fused Watermark’

  6. 6.

    Apply Anti-fusion on the resultant ‘Extracted Total Fused Watermark’ to produce ‘Extracted Fused mixed1’ and ‘Extracted Fused Image3’.

  7. 7.

    Apply Anti-fusion to ‘Extracted Fused mixed1’ to produce ‘Extracted Fused Image1’ and ‘Extracted Fused Image2’.

  8. 8.

    Apply Anti-fusion to ‘Extracted Fused Image1’, ‘Extracted Fused Image2’ and ‘Extracted Fused Image3’ to produce the extracted channels (red, green, blue) respectively.

  9. 9.

    Combine the three extracted channels to obtain ‘Extracted Colored Image’.

Note that * is a mark of probable corruption resultant from attacks.

6 Experimental results and discussion

The proposed algorithm is coded in MATLAB ® R2015a environment and implemented on a PC which has 8 GB RAM and core i5 processor.

6.1 Quality metrics

In this paper, PSNR, Correlation (Cr) and mean square error (MSE) are chosen as quality measure factors (Avcibas et al. 2002, 2003)

6.1.1 Peak signal to noise ratio

Watermarked image quality can be measured by using peak signal to noise ratio (PSNR). In the ideal case, the PSNR should be infinite (AL-Mansoori and Kunhu 2012). In fact, this can’t be accomplished with watermarked image. So, the larger PSNR the better. The PSNR is defined as:

$$PSNR = 10log_{10} \left( {\frac{max*max}{MSE}} \right)$$
(11)

where max = 255 for grey scale image.

6.1.2 Mean square error

Mean square error (MSE) is a standard quality measurement. In ideal case, the MSE must be zero(Mohamed and El Mohandes 2012; Planitz and Maeder 2005). In fact, this is can’t be reached with watermarked image. So, the smaller the value of MSE, the better the quality is. MSE is defined as:

$$MSE = \sum\limits_{i = 1}^{m} {\sum\limits_{j = 1}^{n} {\frac{{ORG\left( {i,j} \right) - WM\left( {i,j} \right)}}{m \times n}} }$$
(12)

where, ‘ORG’ is original image, ‘WM’ is watermarked image and m & n are the original image width and height respectively.

6.1.3 Correlation coefficient

Correlation coefficient (Cr) is used in measuring closeness between original image and watermarked image. In ideal case, Cr should equal 1(Avcibas et al. 2003; Hemdan et al. 2013b). In real, this can’t be achieved so the value of Cr near one. The Cr is defined as:

$$C_{r} = \frac{{\sum\nolimits_{m} {\sum\nolimits_{n} {\left( {Xi - X^{\prime}} \right)\left( {Yi - Y^{\prime}} \right)} } }}{{\sqrt {\left( {\sum\nolimits_{m} {\sum\nolimits_{n} {\left( {Xi - X^{\prime}} \right)^{2} } } } \right)\left( {\sum\nolimits_{m} {\sum\nolimits_{n} {\left( {Yi - Y^{\prime}} \right)^{2} } } } \right)} }}$$
(13)

where, X′ is original image average value and Y′ is watermarked image average value.

Note that, PSNR, MSE and Cr are calculated for gray scale image. For color image, the calculation of each parameter may be done by taking the average value of corresponding parameter of the colored image three channels because each channel is considered as a gray scale image.

6.2 Experimental results

In this section, several experiments are carried out to evaluate performance of the proposed watermarking approach. Here, the proposed approach is tested on variety of reference test images (different original and watermark images) and different attacks.

6.2.1 First case

The first test is carried out by using “elephant.jpg” image as the original/cover image and “bg_global_logo.jpg” image as color watermark image, as shown in Fig. 7. The purpose is to determine the best quarter (LL, LH, HL or HH) to embed the watermark and to find the proper gain factor. Indeed, to test robustness of the proposed watermarking approach several kinds of common attacks have been used. Four types of attacks have been applied on watermarked image including: Gaussian noise, blurring filtering, wrap and cropping (50 and 75%).Both watermarked image and its attacked version are taken in account to calculate robustness of watermarking. Tables 1, 2, 3, and 4 show PSNR for color image with and without attack for the sub-bands LL, LH, HL and HH respectively, at various gain factor from 0.1 to 1. These results show that, with no attack PSNR equals infinity. This means that extracted image after attack is identical to the watermark image before attack. Also, it is obvious from the results that PSNR increases as gain factor increases. From these results, embedding a color watermark image into a gray scale image in HH sub-band achieves best results compared to results from other bands. This deduction proves that, the best quarter for embedding a color watermark image into a gray scale image is the fourth quarter (HH) with gain factor equal to 1. Table 5 shows MSE, PSNR, and Cr at best case, sub-band HH with gain factor 1.

Fig. 7
figure 7

Cover and watermark images of first test. a Cover image (elephant.jpg), b Watermark color image (bg_global_logo.jpg)

Table 1 Results for first quarter (Ll) at various gain factor
Table 2 Results for second quarter (LH) at various gain factor
Table 3 Results for third quarter (HL) at various gain factor
Table 4 Results for fourth quarter (HH) at various gain factor
Table 5 Results for best Case (sub-band HH with gain factor = 1)

6.2.2 Other cases

Evaluation of proposed watermarking approach is done with several color watermark images and gray images which play the role of host/cover image. Test images are selected from MATLAB image database. Table 6 shows test images used with their names in MATLAB. In addition, four types of attacks have been applied to the watermarked image including: Gaussian noise, blurring filtering, wrap and cropping. Table 7 shows experimental results for different images considering sub-band HH with gain factor =1. It shows MSE, PSNR, and Cr with and without attack.

Table 6 Test images
Table 7 Results for best case (sub-band HH with gain factor = 1) for images in Table 6

6.2.3 Limitations of one level DWT

Although proposed watermark approach is robust against attacks, the quality of the extracted image after attack is low. Figure 8, shows the various stages of embedding process in HH sub-band while Fig. 9, shows the various stages of extraction process. Figure 10, shows extracted color image after Gaussian noise attack. It is clear from Fig. 10, that the extracted image quality is low. The extracted image reveals some details of original image (elephant image). This problem appears also with all other types of test cases in Table 7

Fig. 8
figure 8

Proposed embedding algorithm for images in Fig. 7

Fig. 9
figure 9

Proposed extraction algorithm for images in Fig. 7

Fig. 10
figure 10

Extracted color image

6.2.4 Suggested solution

To solve the low-quality problem of the extracted image, the proposed approach is modified by using multi-level DWT instead of using one level DWT. The problem now is to determine which level of the DWT is the best for embedding process. Table 8 shows PSNR of color image for first 6 levels of multilevel DWT considering the fourth quarter (HH) and gain factor =1. This test is done on test images shown in Fig. 7, where, “elephant.jpg” image is used as the original/cover image and “bg_global_logo.jpg” image is used as a colored watermark image. From Table 8, level 6 DWT achieves best PSNR value.

Table 8 Results of multilevel DWT for HH and gain factor = 1

Figure 11, shows quality improvement of extracted image. It shows the extracted image when using level 6 of multilevel DWT and extracted image when using level 1 DWT.

Fig. 11
figure 11

Quality improvement of extracted image

Table 9 shows a comparative study between the PSNR of color image when applying 1 level DWT and applying 6 level DWT on test images of Table 6. The results indicate that applying 6th level DWT is better than applying 1st level DWT.

Table 9 PSNR Comparison between 1st level and 6th level for images of Table 6 considering sub-band HH with gain factor = 1

7 Conclusion

In this paper, a new efficient color image watermarking approach for data hiding by using SVD, multi- DWT and wavelet fusion is developed, discussed, and tested. The suitable quarter of DWT and suitable gain factor are first selected. Then, many tests are done using the best HH quarter with gain factor 1 with and without attack. Another improvement has been achieved in the proposed watermarking approach by applying 6th level DWT to overcome the problem of revealing some details of original image in the extracted image. The simulation results demonstrate that watermarked images generated by proposed watermarking approach are tolerant to versatile attacks such as Gaussian, blur, wrap, and cropping. The experimental results prove that using multi-level DWT improves colored watermark image quality after extraction. In addition, experimental results show that using the 6th level DWT is more robust against severe attacks.