Abstract
Imperceptibility, robustness, security and capacity are the main features of a digital image-watermarking scheme, and their simultaneous acquisition is a challenging problem. In the recently presented watermarking algorithms, the focus was mainly on increasing robustness against different attacks and the lack of a comprehensive and robust method to these attacks while maintaining acceptable imperceptibility and capacity is evident. By considering the watermarking as a multi-objective problem, this paper presents a new intelligent hybrid method to increase the robustness to a large number of attacks while increasing imperceptibility and embedding capacity. In the proposed algorithm, the cover image is decomposed into the set of non-overlapping blockes and by analyzing the eadge map of each block, the proper blocks are selected and transferred to the frequency domain using Contourlet Transform (CNT). Using the outstanding features of the CNT, i.e. multidirectional and multiresolution, the suitable frequency coefficients are selected which form the feature matrix for the embedding procedure. Then, SVD transform is performed on the feature matrix as well as the watermark image. In addition, to increase the robustness without losing the transparency, the dynamic scaling factors are automatically selected by PSO based on the attack test results, instead of using fixed or manually set the scaling factors. Moreover, to increase the security and solve the False Positive Problem (FPP), which is a common problem in the most SVD-based watermarking techniques, a new method is proposed to increase the partial information of matrix U to the singular values with a security key. Finally, the watermark image is inserted into the cover image based on the obtained optimal values of the scaling factors. The experimental and comparative results in terms of imperceptibility, robustness, capacity and security, demonstrate that our algorithm offers very good imperceptibility with a PSNR value of 57.31 dB and a significant enhancement in robustness against a wide range of geometric and destructive attacks. The proposed scheme also obtains a large capacity and sufficient security. Moreover, the proposed method is free of false positive detection error.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig13_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig14_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig15_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13197-0/MediaObjects/11042_2022_13197_Fig16_HTML.png)
Similar content being viewed by others
References
Abdelhakim AM, Abdelhakim M (2018) A time-efficient optimization for robust image watermarking using machine learning. Expert Syst Appl 100:197–210
Abdulazeez AM, Hajy DM, Zeebaree DQ, Zebari DA (2021) Robust watermarking scheme based LWT and SVD using artificial bee colony optimization. Indones J Electr Eng Comput Sci 21(2):1218–1229
Akhaee MA, Sahraeian SM, Marvasti F (2009) Contourlet-based image watermarking using optimum detector in a noisy environment. IEEE Trans Image Process 19(4):967–980
Al-Haj A (2007) Combined DWT-DCT digital image watermarking. J Comput Sci 3(9):740–746
Ali M, Ahn CW (2014) An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain. Signal Process 94:545–556
Ali M, Ahn CW, Siarry P (2014) Differential evolution algorithm for the selection of optimal scaling factors in image watermarking. Eng Appl Artif Intell 31:15–26
Altay ŞY, Ulutaş G (2021) Self-adaptive step firefly algorithm based robust watermarking method in DWT-SVD domain. Multimed Tools Appl 80:23457–23484
Ambadekar SP, Jain J, Khanapuri J (2019) Digital image watermarking through encryption and DWT for copyright protection. Recent Trends Signal Image Process 727:187–195
Ansari IA, Pant M (2018) Quality assured and optimized image watermarking using artificial bee colony. Int J Syst Assur Eng Manage 9(1):274–286
Ariatmanto D, Ernawan F (2020) An improved robust image watermarking by using different embedding strengths. Multimed Tools Appl 79:12041–12067
Bajaj A (2014) Robust and reversible digital image watermarking technique based on RDWT-DCT-SVD. In: 2014 International conference on advances in engineering and technology research (ICAETR), pp 1–5. IEEE
Barni M, Bartolini F, Cappellini V, Piva A (1998) A DCT-domain system for robust image watermarking. Signal Process 66(3):357–372
Bartolini F, Tefas A, Barni M, Pitas I (2001) Image authentication techniques for surveillance applications. Proc IEEE 89(10):1403–1418
Bentley PJ, Wakefield JP (1998) Finding acceptable solutions in the pareto-optimal range using multiobjective genetic algorithms. Soft computing in engineering design and manufacturing. Springer, London, 1998. 231–240
Cayre F, Fontaine C, Furon T (2005) Watermarking security: theory and practice. IEEE Trans Signal Process 53(10):3976–3987
Cetinel G, Çerkezi L (2016) Robust chaotic digital image watermarking scheme based on RDWT and SVD. Int J Image Graphics Signal Process 8(8):58–67
Chandra DS (2002) Digital image watermarking using singular value decomposition. In: 2002 Midwest symposium on circuits and systems, pp 264–267. IEEE
Choudhary R, Parmar G (2016) A robust image watermarking technique using 2-level discrete wavelet transform (DWT). In: 2016 International conference on communication control and intelligent systems (CCIS), pp 120–124. IEEE
Cox IJ, Miller ML (2002) The first 50 years of electronic watermarking. EURASIP J Adv Signal Process 2002(2):126–132
De Moura Meneses AA, Machado MD, Schirru R (2009) Particle swarm optimization applied to the nuclear reload problem of a pressurized water reactor. Prog Nucl Energy 51(2):319–326
Do MN, Vetterli M (2003) Contourlets. In: Studies in Computational Mathematics 10:83-105. Elsevier
Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14(12):2091–2106
Ernawan F, Kabir MN (2018) A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 6:20464–20480
Fakhredanesh M, Rahmati M, Safabakhsh R (2013) Adaptive image steganography using contourlet transform. J Electron Imaging 22(4):043007
Fan D, Wang Y, Zhu C (2019) A blind watermarking algorithm based on adaptive quantization in Contourlet domain. Multimed Tools Appl 78(7):8981–8995
Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik 127(2):964–972
Gaur S, Srivastava VK (2017) A hybrid RDWT-DCT and SVD based digital image watermarking scheme using Arnold transform. In: 2017 International conference on signal processing and integrated networks (SPIN), pp 399–404. IEEE
Gong M, Jiao L, Yang D, Ma W (2009) Research on evolutionary multi-objective optimization algorithms. J Software 20(2):271–289
Hsu CT, Wu JL (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1):58–68
Huynh-The T, Banos O, Lee S, Yoon Y, Le-Tien T (2016) Improving digital image watermarking by means of optimal channel selection. Expert Syst Appl 62:177–189
Islam M, Laskar RH (2018) Geometric distortion correction based robust watermarking scheme in LWT-SVD domain with digital watermark extraction using SVM. Multimed Tools Appl 77:14407–14434
Jain C, Arora S, Panigrahi PK (2008) A reliable SVD based watermarking scheme. https://arxiv.org/abs/0808.0309
Jimson N, Hemachandran K (2018) DFT based digital image watermarking: a survey. Int J Adv Res Comput Sci 9(2):540–544
Kang X, Chen Y, Zhao F, Lin G (2020) Multi-dimensional particle swarm optimization for robust blind image watermarking using intertwining logistic map and hybrid domain. Soft Comput 24(12):10561–10584
Kazemivash B, Moghaddam ME (2018) A predictive model-based image watermarking scheme using regression tree and firefly algorithm. Soft Comput 22(12):4083–4098
Kennedy J, Eberhart R (1995) Particle swarm optimization. In: 1995 International conference on neural networks (ICNN), pp 1942–1948. IEEE
Kim WH, Nam SH, Kang JH, Lee HK (2019) Robust watermarking in curvelet domain for preserving cleanness of high-quality images. Multimed Tools Appl 78(12):16887–16906
Kusyk J, Eskicioglu AM (2005) A semi-blind logo watermarking scheme for color images by comparison and modification of DFT coefficients. Multimed Syst Appl VIII 6015:60150C
Lala H (2017) Digital image watermarking using discrete wavelet transform. Int Res J Eng Technol 4(1):1682–1685
Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE trans Multimed 4(1):121–128
Liu F, Zhou Z (2015) A new data classification method based on chaotic particle swarm optimization and least square-support vector machine. Chemometr Intell Lab Syst 147:147–156
Loukhaoukha K, Chouinard JY (2010) Security of ownership watermarking of digital images based on singular value decomposition. J Electr Imaging 19(1):013007
Loukhaoukha K, Refaey A, Zebbiche K (2017) Ambiguity attacks on watermarking algorithm based on chirp z-transform, discrete wavelet transform and singular value decomposition. J Electr Syst Inf Technol 4(3):359–368
Lu Y, Do MN (2003) CRISP contourlets: a critically sampled directional multiresolution image representation. Proceedings Vol. 5207, Wavelets: Applications in Signal and Image Processing X
Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process 10(1):34–52
Makbol NM, Khoo BE, Rassem TH, Loukhaoukha K (2017) A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. InfSci 417:381–400
Makbol NM, Khoo BE, Rassem TH (2018) Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimed Tools Appl 77(20):26845–26879
Mehta R, Gupta K, Yadav AK (2020) An adaptive framework to image watermarking based on the twin support vector regression and genetic algorithm in lifting wavelet transform domain. Multimed Tools Appl 79:18657–18678
Mekarsari YA, Sari CA, Rachmawanto EH (2018) Non-blind RGB image watermarking technique using 2-level discrete wavelet transform and singular value decomposition. In: 2018 International conference on information and communications technology (ICOIACT), pp 623–627. IEEE
Mingzhi C, Yan L, Yajian Z, Min L (2013) A combined DWT and DCT watermarking scheme optimized using genetic algorithm. J Multimed 8(3):299–305
Mohan A, Anand A, Singh AK, Dwivedi R, Kumar B (2021) Selective encryption and optimization based watermarking for robust transmission of landslide images. Comput Electr Eng 95:107385
Mohanty SP (1999) Digital watermarking: A tutorial review. https://informatika.stei.itb.ac.id/~rinaldi.munir/Kriptografi/WMSurvey1999Mohanty.pdf
Najafi E (2017) A robust embedding and blind extraction of image watermarking based on discrete wavelet transform. Math Sci 11(4):307–318
Najafi E, Loukhaoukha K (2019) Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. J Inf Secur Appl 44:144–156
Pandey P, Kumar S, Singh SK (2014) A robust logo watermarking technique in divisive normalization transform domain. Multimed Tools Appl 72(3):2653–2677
Pandey P, Kumar S, Singh SK (2014) Rightful ownership through image adaptive DWT-SVD watermarking algorithm and perceptual tweaking. Multimed Tools Appl 72(1):723–748
Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit Signal Process 20(6):1597–1611
Poljicak A, Mandic L, Agic D (2011) Discrete Fourier transform-based watermarking method with an optimal implementation radius. J Electron Imaging 20(3):033008
Pourhadi A, Mahdavi-Nasab H (2020) A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain. Multimed Tools Appl 79:21653–21677
Prajwalasimha SN, ChethanSuputhra S, Mohan CS (2019) Performance analysis of DCT and successive division based digital image watermarking scheme. Indones J Electr Eng Comput Sci 15(2):750–757
Rao VS, Shekhawat RS, Srivastava VK (2012) A reliable digital image watermarking scheme based on SVD and particle swarm optimization. In: 2012 Students conference on engineering and systems, pp 1–6. IEEE
Roy S, Pal AK (2017) A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling. Multimed Tools Appl 76(3):3577–3616
Salehnia T, Fathi A (2021) Fault tolerance in LWT-SVD based image watermarking systems using three module redundancy technique. Expert Syst Appl 179:115058
Sangeetha N, Anita X (2018) Entropy based texture watermarking using discrete wavelet transform. Optik 160:380–388
Shaik A, Masilamani V (2021) A novel digital watermarking scheme using dragonfly optimizer in transform domain. Comput Electr Eng 90:106923
Sharma V, Mir RN (2019) An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. J King Saud Univ-Comput Inform Sci. In press
Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol 2(9):165–175
Singh SK, Kumar S (2011) Singular value decomposition based sub-band decomposition and multi-resolution (SVD-SBD-MRR) representation of digital colour images. Pertanika J Sci Technol 19(2):229–235
Singh SK, Kumar S, Srivastava M, Chandra A, Srivastava S (2009) Wavelet based robust digital watermarking technique using reverse Additive algorithm (RAA). 2009 UKSim European symposium on computer modeling and simulation, pp 241–244. IEEE
Singh AK, Dave M, Mohan A (2013) A hybrid algorithm for image watermarking against signal processing attacks. In: International workshop on multi-disciplinary trends in artificial intelligence. Springer, Berlin/ Heidelberg, pp. 235–246
Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. J Med Imaging Health Inform 5(3):607–614
Singh R, Nigam S, Singh AK, Elhoseny M (2020) Wavelet transforms: from classical to new generation wavelets. In: Intelligent wavelet based techniques for advanced multimedia applications. Springer, Cham, 13–29
Sisaudia V, Vishwakarma VP (2021) Copyright protection using KELM-PSO based multi-spectral image watermarking in DCT domain with local texture information based selection. Multimed Tools Appl 80:8667–8688
Solachidis V, Pitas L (2001) Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans Image Process 10(11):1741–1753
Soppari K, Subhash Chandra N (2020) Development of improved whale optimization-based FCM clustering for image watermarking. Comput Sci Rev 37:100287
Swaraja K, Meenakshi K, Padmavathi K (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 55(2):101665
Taha DB, Taha BT, Al Dabagh NB (2020) A comparison between the performance of DWT and LWT in image watermarking. Bull Electr Eng Inf 9(3):1005–1014
Tewari TK, Saxena V (2010) An improved and robust DCT based digital image watermarking scheme. Int J Comput Appl 3(1):28–32
Thakkar F, Srivastava VK (2021) An adaptive, secure and imperceptive image watermarking using swarm intelligence, Arnold transform, SVD and DWT. Multimed Tools Appl 80(8):12275–12292
The Image Library (n.d.) https://homepages.inf.ed.ac.uk/rbf/HIPR2/library.htm
The USC-SIPI image database (n.d.) Signal and Image Processing Institute, University of Southern California, https://sipi.usc.edu/database/
Tian C, Wen RH, Zou WP, Gong LH (2020) Robust and blind watermarking algorithm based on DCT and SVD in the contourlet domain. Multimed Tools Appl 79:7515–7541
Vali MH, Aghagolzadeh A, Baleghi Y (2018) Optimized watermarking technique using self-adaptive differential evolution based on redundant discrete wavelet transform and singular value decomposition. Expert Syst Appl 114:296–312
Varghese J, Subash S, Hussain OB, Nallaperumal K, Saady MR, Khan MS (2016) An improved digital image watermarking scheme using the discrete Fourier transform and singular value decomposition. Turk J Electr Eng Comput Sci 24(5):3432–3447
Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IEEE Tech Rev 32(6):479–496
Wang XY, Zhang SY, Wen TT, Yang HY, Niu PP (2019) Coefficient difference based watermark detector in nonsubsampled contourlet transform domain. Inf Sci 503:274–290
Wu JY, Huang WL, Xia-Hou WM, Zou WP, Gong LH (2020) Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition. Multimed Tools Appl 79:22727–22747
Yusof Y, Khalifa OO (2007) Digital watermarking for digital images using wavelet transform. In: 2007 International conference on telecommunications and Malaysia international conference on communications, pp 665–669. IEEE
Zainol Z et al (2021) Hybrid SVD-based image watermarking schemes: a review. IEEE Access 9:32931–32968
Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882
Zhang Y, Sun Y (2019) An image watermarking method based on visual saliency and contourlet transform. Optik 186:379–389
Zhao ZZ, Guan QX, Zhao XF, Yu HB, Liu CJ (2018) Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain. Multimed Tools Appl 77(11):14093–14113
Zheng Z, Saxena N, Mishra KK, Sangaiah AK (2018) Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications. Future Gener Comput Syst 88:92–106
Zhou A, Qu BY, Li H, Zhao SZ, Suganthan PN, Zhang Q (2011) Multiobjective evolutionary algorithms: a survey of the state of the art. Swarm Evol Comput 1(1):32–49
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hatami, E., Rashidy Kanan, H., Layeghi, K. et al. An optimized robust and invisible digital image watermarking scheme in Contourlet domain for protecting rightful ownership. Multimed Tools Appl 82, 2021–2051 (2023). https://doi.org/10.1007/s11042-022-13197-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13197-0