Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis

: In today’s scenario, image watermarking has been an integral part in various multimedia applications. Watermarking is the approach for adding additional information to the existing image to protect the data from modiﬁcation and to provide data integrity. Frequency transform domain techniques are complex and costly and degrade the quality of the image due to less embedding of bits. The proposed work utilize the original DCT method with some modiﬁcations and applies this method on frequency bands of DWT. Furthermore, the output is used in combination with a pixel modiﬁcation method for embedding and extraction. The proposed outcome is the improvement of performance achieved in terms of time, imperceptibility, and robustness.


Introduction
Image processing is a part of signal processing that takes an input image, processes it, and then generates the required output image or generates an image that satisfies certain characteristics or features.The authenticity of content is also very much important.During the digital processing of an image, content should not be modified or copied.Different techniques are used for providing authenticity of content such as encryption, cryptography, digital signatures, and steganography [1].However, each has its disadvantages.For example, if an image has been modified then a digital signature can detect that modification, but a digital signature cannot detect the region where it is modified.Encryption does not provide ownership of content.
One way of providing authentication, copyright protection, or ownership identification is to use an image watermarking technique [2].The original image and desired watermark or logo are embedded using different algorithms.Extraction is a process that usually works in a reverse manner to embedding.
With the rapid growth of the Internet and digital multimedia techniques, digital content can be easily copied and can be modified [3,4].So as to resolve the illegal use of content and for the protection of ownership of content [5], the security of a watermark can be used.
The watermarking procedure is shown in Figure 1.It comprises of four steps as watermark generation, embedding, attacks, and extraction.Even if an attacker rotates a host image by some degree, the watermark should not be extracted or visible to that person.
The basic process of Watermarking is shown in Figure 2. Due to different types of attacks such as rotation, translation, filtering, adding noise, compression [6] etc., security through watermarking is of prime concern.Techniques in the frequency transform domain are mainly used in copyrights [7].However, more bits cannot be embedded, as the quality is degraded.Figure 3 shows a visible watermarked image.Techniques of frequency domains are combined with pixel modification techniques in parallel, but they are time-consuming, complex, are not resistant [8] to different types of attacks, and mainly capacity is reduced.The basic process of Watermarking is shown in Figure 2. Due to different types of attacks such as rotation, translation, filtering, adding noise, compression [6] etc., security through watermarking is of prime concern.Techniques in the frequency transform domain are mainly used in copyrights [7].However, more bits cannot be embedded, as the quality is degraded.Figure 3 shows a visible watermarked image.Techniques of frequency domains are combined with pixel modification techniques in parallel, but they are time-consuming, complex, are not resistant [8] to different types of attacks, and mainly capacity is reduced.In watermarking, the most important feature is to provide strong robustness, security, and capacity [10].Watermarking techniques in spatial and frequency transform domains [11] must be resistant to different types of attacks.For example, one image is used  The basic process of Watermarking is shown in Figure 2. Due to different types of attacks such as rotation, translation, filtering, adding noise, compression [6] etc., security through watermarking is of prime concern.Techniques in the frequency transform domain are mainly used in copyrights [7].However, more bits cannot be embedded, as the quality is degraded.Figure 3 shows a visible watermarked image.Techniques of frequency domains are combined with pixel modification techniques in parallel, but they are time-consuming, complex, are not resistant [8] to different types of attacks, and mainly capacity is reduced.In watermarking, the most important feature is to provide strong robustness, security, and capacity [10].Watermarking techniques in spatial and frequency transform domains [11] must be resistant to different types of attacks.For example, one image is used The basic process of Watermarking is shown in Figure 2. Due to different attacks such as rotation, translation, filtering, adding noise, compression [6] etc., through watermarking is of prime concern.Techniques in the frequency transf main are mainly used in copyrights [7].However, more bits cannot be embedde quality is degraded.Figure 3 shows a visible watermarked image.Technique quency domains are combined with pixel modification techniques in parallel, but time-consuming, complex, are not resistant [8] to different types of attacks, and capacity is reduced.In watermarking, the most important feature is to provide strong robustne rity, and capacity [10].Watermarking techniques in spatial and frequency transf mains [11] must be resistant to different types of attacks.For example, one imag In watermarking, the most important feature is to provide strong robustness, security, and capacity [10].Watermarking techniques in spatial and frequency transform domains [11] must be resistant to different types of attacks.For example, one image is used as important evidence in a legal or medical case [12].If someone has made minor changes in that image that cannot be easily detected by human [13] eyes using software such as Photoshop, then this modification will create major changes in such cases.In the event of the images being affected by uncertainties and inaccuracies that affect the overall scenario, fuzzy preprocessing [14,15] is required.Figure 4 shows the classification of Watermarking Techniques based on the type of attacks [16].bedding and extraction.Different attacks are then applied for measuring per-formance [9].The main objective of this work is to propose a modification to basic methods, and to generate a new solution that creates a new algorithm for embedding and extraction by using a hybrid method with modification [17,18].The results are then compared with the previous existing solutions to differentiate the performance of the proposed method and the existing solutions.The scope of this study involves the complete implementation of modifications in basic DCT methods and combinations of DWT, modified techniques with pixel modi-fication that eliminate the use of DCT for finding DC components directly in spatial domains, and analyses of the performance.

Literature Review
Literature related to various techniques on image watermarking for providing copyright control and ownership identification is discussed in this section.
The author in [19] proposed a hybrid watermarking technique by combining two methods of frequency transform domains i.e., DWT-DCT, which will provide high robustness, provide authentication [20], and compare the results with a cox additive algorithm [21].This work uses a hybrid watermarking method (DWT-DCT) which performs two-level, three level, and four-level DWT followed by respective DCT on host images.
A CDMA digital image watermark is proposed [18], which uses wavelet trans-form, is tested in different color spaces, and detects that the RGB color space is more effective for watermark embedding and extraction.
According to [22], high robustness can be provided by using a technique that is based on a hybrid domain.The watermark is embedded in spatial and transform do-mains in parallel, which provides high robustness and resistance to both image pro-cessing and geometric attacks.
In [23], authors presented a method that split the data into two parts for frequen-cy and spatial insertion, based on user preference and data importance, which en-hances the This approach proposes a solution that makes modifications to the basic method, and combines that modified method with existing methods that generate an algorithm for embedding and extraction.Different attacks are then applied for measuring performance [9].The main objective of this work is to propose a modification to basic methods, and to generate a new solution that creates a new algorithm for embedding and extraction by using a hybrid method with modification [17,18].The results are then compared with the previous existing solutions to differentiate the performance of the proposed method and the existing solutions.
The scope of this study involves the complete implementation of modifications in basic DCT methods and combinations of DWT, modified techniques with pixel modification that eliminate the use of DCT for finding DC components directly in spatial domains, and analyses of the performance.

Literature Review
Literature related to various techniques on image watermarking for providing copyright control and ownership identification is discussed in this section.
The author in [19] proposed a hybrid watermarking technique by combining two methods of frequency transform domains i.e., DWT-DCT, which will provide high robustness, provide authentication [20], and compare the results with a cox additive algorithm [21].This work uses a hybrid watermarking method (DWT-DCT) which per-forms two-level, three level, and four-level DWT followed by respective DCT on host images.
A CDMA digital image watermark is proposed [18], which uses wavelet trans-form, is tested in different color spaces, and detects that the RGB color space is more effective for watermark embedding and extraction.
According to [22], high robustness can be provided by using a technique that is based on a hybrid domain.The watermark is embedded in spatial and transform do-mains in parallel, which provides high robustness and resistance to both image processing and geometric attacks.
In [23], authors presented a method that split the data into two parts for frequency and spatial insertion, based on user preference and data importance, which enhances the performance and embeds the important part in the frequency domain and rest in the spatial domain.First, they have separated the watermark into two parts and insert them into the spatial domain to obtain their spatial coefficients [24].Next, they have transformed the first part of watermark Hs by applying DCT to obtain DCT coefficients.They have inserted the second part of the watermark into DCT coefficients [23].Lastly, they have applied IDCT to obtain marked images.The splitting of data doubles the protection, and for more security we can make splitting even more com-plex.The disadvantages of using DCT, are, however, there.A comparative analysis of some of the existing methodologies and their attacks is depicted in Table 1.

Comparison of Existing Methods
All of the methods described above have their advantages and disadvantages.The main aim of watermarking is to provide strong robustness.None of the above techniques provide a solution for finding DC components [20] without applying DCT.None of the techniques of both the domain and their combinational methods provide a complete solution that provides strong robustness against different types of attacks.

Proposed Methodology
Different types of methods are used in both domains for image watermarking: Different types of methods are used in both domains for image watermarking: modification of pixel values, LSB-based method, DWT-based watermarking, DCT based watermarking, SVD based watermarking, DWT-DCT-SVD based watermarking, parallel watermarking, etc.A common problem of all of these methods is that they are not resistant to all types of geometric and image processing attacks.Another problem is that these techniques require applying DCT to find DC components.
Hence, the solution to this is a mechanism which makes modifications in a basic method, and eliminates the use of DCT to find DC components.It then applies this modified method to existing methods of DWT, and then according to the new method, modifies DC and changes the pixel values in the watermark according to the modified DC; then, it replaces those watermark bits in the DC components of the host image.Figure 5 shows the workflow for the proposed methodology.
applying DCT to find DC components.
Hence, the solution to this is a mechanism which makes modifications in a basic method, and eliminates the use of DCT to find DC components.It then applies this modified method to existing methods of DWT, and then according to the new method, modifies DC and changes the pixel values in the watermark according to the modified DC; then, it replaces those watermark bits in the DC components of the host image.Figure 5 shows the workflow for the proposed methodology.Step I: Modification in the basic method The modification in the basic DCT approach is conducted by applying the modification of the LH band of the DWT method.The frequency band is modified with the updated DC values, then further processing is done.The modification of DC compo-nents is shown in Figure 6.Step: II Embedding Algorithm Step 1-Apply Arnold Transform on the watermarked image.Step I: Modification in the basic method.
The modification in the basic DCT approach is conducted by applying the modification of the LH band of the DWT method.The frequency band is modified with the updated DC values, then further processing is done.The modification of DC components is shown in Figure 6.The embedding and extraction process of modified DC coefficients is depicted in Tables 2 and 3 respectively.
then, it replaces those watermark bits in the DC components of the host image.Figur shows the workflow for the proposed methodology.Step I: Modification in the basic method The modification in the basic DCT approach is conducted by applying the mod cation of the LH band of the DWT method.The frequency band is modified with the u dated DC values, then further processing is done.The modification of DC compo-nent shown in Figure 6.Step: II Embedding Algorithm Step 1-Apply Arnold Transform on the watermarked image.Step II: Algorithm 1 shows the embeddign process of modified DC coeffiieients.

Algorithm 1: Embedding Algorithm
Step 1-Apply Arnold Transform on the watermarked image.
Step 2-Apply DWT up to two levels on the host image and take the LH band.
Step 3-Apply DWT up to two levels on the watermark image and take the LL band of the watermark image to embed into the LH band.
Step 5-Find the DC coefficient c (0,0) of each block by summing up the pixels values of a particular block.
Step 11-Repeat steps 5-10 until all blocks are processed and DC's are modified and embedded.
Step III: Algorithm 2 shows the extraction process of the modified DC coefficients embedded in the watermark.

Algorithm 2: Extraction Algorithm
Step 1-Apply DWT up to two levels on the watermarked image.
Step 2-Find the DC coefficient c (0, 0) of each block by summing up the pixels values of a particular block.
Step IV: Attacks and Result Comparison.
The attacks are performed on the host image, and then the original and modified values are calculated.Then, a comparative analysis is done.The complete methodology of embedding, extraction, attack and result comparison is shown in Figure 7.
Step IV: Attacks and Result Comparison The attacks are performed on the host image, and then the original and modified values are calculated.Then, a comparative analysis is done.The complete methodolo-gy of embedding, extraction, attack and result comparison is shown in Figure 7.

Experimental Results
Here, the first modification in basic technique is conducted in the following way.The DC component is directly realized in the spatial domain, which eliminates the use of DCT and IDCT for embedding in the DC component.The MATLAB simulation of modified DC component is shown in Figure 8.

Experimental Results
Here, the first modification in basic technique is conducted in the following way.DC component is directly realized in the spatial domain, which eliminates the use of D and IDCT for embedding in the DC component.The MATLAB simulation of modified component is shown in Figure 8.The following Figure 9 show the result of the embedding and extraction of the watermark.Extraction of watermark after applying different types of attacks such as scaling, cropping, adaptive filtering, salt and pepper noise, Gaussian noise, sharpening, etc. is shown in the following figures.
In the Figure 10, the watermarked image is scaled and then the watermark is extracted for checking performance against scaling attacks.
The Figure 11 demonstrate the first watermarked image is cropped from four corners, and then using the proposed extraction algorithm the watermark is extracted after the cropping attack.
Here, the Figure 12 demonstrates the image-filtering attack is applied on the watermarked image, then the watermark is extracted using the proposed method with high NC.The following Figure 9 show the result of the embedding and extraction of the watermark.Extraction of watermark after applying different types of attacks such as scaling, cropping, adaptive filtering, salt and pepper noise, Gaussian noise, sharpening, etc. is shown in the following figures.
In the Figure 10, the watermarked image is scaled and then the watermark is extracted for checking performance against scaling attacks.Here, the Figure 12 demonstrates the image-filtering attack is applied on the watermarked image, then the watermark is extracted using the proposed method with high NC.In the Figure 13, the salt and pepper noise is added, and the watermark is extracted by using the proposed method.Comparison is conducted for original and extracted watermarks for measuring normalized correlation.The Table 4 below shows the comparison of extracted watermark from different attacks and the original watermark of size 64x64.In the Figure 13, the salt and pepper noise is added, and the watermark is extracted by using the proposed method.Comparison is conducted for original and extracted watermarks for measuring normalized correlation.The Table 4 below shows the comparison of extracted watermark from different attacks and the original watermark of size 64 × 64.

Embedding and Extraction for a Real-Time Host Image Size of 1200 × 1200
For measuring the capacity, different resolution images are used.Different attacks are applied on watermarked images, and then the watermark is extracted after applying the attacks.The different attacks are histogram equalization, Gaussian noise, sharpening, etc.The following Figure 14 show the embedding of a watermark in the real-time image using the proposed method.

Embedding and Extraction for a Real-Time Host Image Size of 1200 × 1200
For measuring the capacity, different resolution images are used.Different attacks are applied on watermarked images, and then the watermark is extracted after applying the attacks.The different attacks are histogram equalization, Gaussian noise, sharpening, etc.The following Figure 14 show the embedding of a watermark in the real-time image using the proposed method.

Embedding and Extraction for a Real-Time Host Image Size of 1200 × 1200
For measuring the capacity, different resolution images are used.Different attacks are applied on watermarked images, and then the watermark is extracted after applying the attacks.The different attacks are histogram equalization, Gaussian noise, sharpening, etc.The following Figure 14 show the embedding of a watermark in the real-time image using the proposed method.

Embedding and Extraction for a Real-Time Host Image Size of 1200 × 1200
For measuring the capacity, different resolution images are used.Different attacks are applied on watermarked images, and then the watermark is extracted after applying the attacks.The different attacks are histogram equalization, Gaussian noise, sharpening, etc.The following Figure 14 show the embedding of a watermark in the real-time image using the proposed method.

Embedding and Extraction for a Real-Time Host Image Size of 1200 × 1200
For measuring the capacity, different resolution images are used.Different attacks are applied on watermarked images, and then the watermark is extracted after applying the attacks.The different attacks are histogram equalization, Gaussian noise, sharpening, etc.The following Figure 14 show the embedding of a watermark in the real-time image using the proposed method.

Embedding and Extraction for a Real-Time Host Image Size of 1200 × 1200
For measuring the capacity, different resolution images are used.Different attacks are applied on watermarked images, and then the watermark is extracted after applying the attacks.The different attacks are histogram equalization, Gaussian noise, sharpening, etc.The following Figure 14 show the embedding of a watermark in the real-time image using the proposed method.

Embedding and Extraction for a Real-Time Host Image Size of 1200 × 1200
For measuring the capacity, different resolution images are used.Different attacks are applied on watermarked images, and then the watermark is extracted after applying the attacks.The different attacks are histogram equalization, Gaussian noise, sharpening, etc.The following Figure 14 show the embedding of a watermark in the real-time image using the proposed method.
Here, in the Figure 15 first histogram equalization attack is applied on a watermarked image and the watermark is extracted using the proposed method, as shown in the figure.
In the Figure 16, Gaussian noise is added and the watermark is extracted after adding noise.
In the Figure 17, the watermarked image is sharpened and then the watermark is extracted using the extraction method.Here, in the Figure 15 first histogram equalization attack is applied on a watermarked image and the watermark is extracted using the proposed method, as shown in the figure.In the Figure 16, Gaussian noise is added and the watermark is extracted after adding noise.In the Figure 17, the watermarked image is sharpened and then the watermark is extracted using the extraction method.The following Table 5 compares the extracted watermark with the original watermark, for checking the similarity and for measuring normalized correlation.The following Table 5 compares the extracted watermark with the original watermark, for checking the similarity and for measuring normalized correlation.The following Table 5 compares the extracted watermark with the original watermark, for checking the similarity and for measuring normalized correlation.

Original Watermark Extracted Watermark
Histogram Equalization Gaussian noise Sharpening The following Table 5 compares the extracted watermark with the original watermark, for checking the similarity and for measuring normalized correlation.

Original Watermark Extracted Watermark
Histogram Equalization Gaussian noise Sharpening The following Table 5 compares the extracted watermark with the original watermark, for checking the similarity and for measuring normalized correlation.

Original Watermark Extracted Watermark
Histogram Equalization Gaussian noise Sharpening The following Table 5 compares the extracted watermark with the original watermark, for checking the similarity and for measuring normalized correlation.

Original Watermark Extracted Watermark
Histogram Equalization Gaussian noise Sharpening

Results Analysis
Performance of execution of the proposed work is one of the criteria that needs to be considered.In this implementation, an image with a size of 512 × 512 and a watermark with a size of 64 × 64 is considered, and in another case, real-time images of sizes 1200 × 1200 and 128 × 128 are taken as input images for embedding algorithms.The maximum size of the image that can be taken is up to 1200 × 1200, and the watermark size is goes up to 256 × 256 bits.
The first total execution time for embedding and extraction with attacks and without attacks is measured as shown in the following Table 6: From Figure 18, it has been concluded that the proposed method can be executed in less time even with changing image size, with attacks and without attacks.The watermark is embedded and the mean square error is computed.Comparative analysis of Existing and Proposed methods is shown on the basis of PSNR and MSE in Table 7.
From Figure 19, it has been concluded that the PSNR is high.Acceptable Values of PSNR must be higher than 30 for better visibility.Therefore, in the proposed case, 69.77 is achieved.
Next, different types of attacks are applied such as scaling, cropping, adaptive filtering, salt and pepper noise, Gaussian noise, etc. on watermarked images, and the watermark is efficiently extracted.Normalized correlation is calculated for measuring the correlation.Comparison of existing and proposed method on the basis of NC value is done in Table 8.
Proposed method for host image of 512 × 512 0.97 1.03 Proposed method for host image of 1200 × 1200 4.07 5.6 From Figure 18, it has been concluded that the proposed method can be executed in less time even with changing image size, with attacks and without attacks.The watermark is embedded and the mean square error is computed.Comparative analysis of Existing and Proposed methods is donw on the basis of PSNR and MSE in Table 7.    Proposed method for host image of 1200 × 1200 69.77 0.0089 From Figure 19, it has been concluded that the PSNR is high.Acceptable Values of PSNR must be higher than 30 for better visibility.Therefore, in the proposed case, 69.77 is achieved.Next, different types of attacks are applied such as scaling, cropping, adaptive filtering, salt and pepper noise, Gaussian noise, etc. on watermarked images, and the watermark is efficiently extracted.Normalized correlation is calculated for measuring the correlation.Comparison of existing and proposed method on the basis of NC value is done in Table 8.  Figure 20, shows the different NC values for existing and proposed approaches.The acceptable value of NC should be near to one.The value of one means that the algorithm is very robust against different types of attacks.From the graph, the proposed method is concluded to be the best for all types of attacks.As the size of the host and water-mark image increase, the value of NC decreases, and time of execution also increases.A Comparative analysis of proposed method with the existing one based on PSNR, MSE, Execution Time and NC value is done in Figure 21.In watermarking, high robustness and resistance to distortion are highly required.In the previous approaches, DWT has been extensively used for watermarking.However, in the LL band frequency, coefficients have high robustness but have a low resistance to distortion, which results in improper watermarking.In the proposed method, the DC coefficients are modified and then the watermarking is conducted in the spatial do-main, which results in both high robustness and higher resistance to distortion that improves the watermarking approach.The proposed method provides higher flexibility and good time-frequency representation.The disad-vantages of using DCT are overcome by eliminating the use of DCT for finding DC, which enhances execution time and the mean square error.The proposed method can be used for different resolution images.As the size of the base image and watermark in-  A Comparative analysis of proposed method with the existing one based on PSNR, MSE, Execution Time and NC value is done in Figure 21.In watermarking, high robustness and resistance to distortion are highly required.In the previous approaches, DWT has been extensively used for watermarking.However, in the LL band frequency, coefficients have high robustness but have a low resistance to distortion, which results in improper watermarking.In the proposed method, the DC coefficients are modified and then the watermarking is conducted in the spatial do-main, which results in both high robustness and higher resistance to distortion that improves the watermarking approach.The pro-posed method provides higher flexibility and good time-frequency representation.The disadvantages of using DCT are overcome by eliminating the use of DCT for finding DC, which enhances execution time and the mean square error.The proposed method can be used for different resolution images.As the size of the base image and watermark increases, robustness decreases and execution time and mean square errors increase; the peak signal to noise ratio will also increase.

Conclusions and Future Enhancement
In this work, different techniques of watermarking are described.Different types of attacks that affect the robustness of images have also been discussed.The presence of a watermark should not distort the quality of the original image.Lots of research has been conducted to design solutions for providing high imperceptibility, strong robustness, more security, and high capacity.In this work, the focus is on providing strong robustness and high capacity.Hence, a modification is conducted to basic technique, and then embedding is performed based on a combination of modified techniques with existing DWT techniques; then, this combined method is used with pixel modification techniques, which enhances the capacity, robustness and imperceptibility, and reduces the total execution time.
Four parameters are analyzed (i.e., MSE, PSNR, NC, time) which show performance improvement of the proposed method.In this system, DWT is combined with a modified method instead of SVD, RDWT, etc.The method can be used and the same approach can also be implemented for video watermarking.

Information 2021 , 23 Figure 1 .
Figure 1.A basic model of a watermarking system.

Figure 2 .
Figure 2. Block diagram of the watermarking process.

Figure 1 .
Figure 1.A basic model of a watermarking system.

Figure 1 .
Figure 1.A basic model of a watermarking system.

Figure 2 .
Figure 2. Block diagram of the watermarking process.

Figure 2 .
Figure 2. Block diagram of the watermarking process.

Figure 2 .
Figure 2. Block diagram of the watermarking process.

Figure 6 .
Figure 6.Relation between DC and Spatial Domain.

Figure 6 .
Figure 6.Relation between DC and Spatial Domain.

Figure 6 .
Figure 6.Relation between DC and Spatial Domain.

Figure 8 .
Figure 8. Modification based on DCT.Tables 2 and 3 shows the calculation of DC component for the Block Image and the final resultant image.4.1.Embedding and Extraction of 512 × 512-Host Image and 64 × 64 Watermark

Figure 9 .
Figure 9. Embedding and extraction using the proposed method for a host image of size 512 × 512 and watermark of size 64 × 64.

Figure 9 . 23 Figure 10 .
Figure 9. Embedding and extraction using the proposed method for a host image of size 512 × 512 and watermark of size 64 × 64.Information 2021, 12, x FOR PEER REVIEW 10 of 23

Figure 10 .
Figure 10.Image scaling attack and extraction of watermark after scaling of watermarked image.

Figure 11 .
Figure 11.Cropping attack and extraction of watermark after cropping a watermarked image.

Figure 11 . 23 Figure 12 .
Figure 11.Cropping attack and extraction of watermark after cropping a watermarked image.Information 2021, 12, x FOR PEER REVIEW 12 of 23

Figure 12 .
Figure 12.Adaptive filtering attack and extraction of watermark after filtering the watermarked image.

Information 2021 , 23 Figure 13 .
Figure 13.Salt and pepper noise on the watermarked image and extraction of the watermark after adding noise.

Figure 13 .
Figure 13.Salt and pepper noise on the watermarked image and extraction of the watermark after adding noise.

Figure 13 .
Figure 13.Salt and pepper noise on the watermarked image and extraction of the watermark after adding noise.

Information 2021 , 23 Figure 13 .
Figure 13.Salt and pepper noise on the watermarked image and extraction of the watermark after adding noise.

Information 2021 , 23 Figure 13 .
Figure 13.Salt and pepper noise on the watermarked image and extraction of the watermark after adding noise.

Information 2021 , 23 Figure 13 .
Figure 13.Salt and pepper noise on the watermarked image and extraction of the watermark after adding noise.

Information 2021 , 23 Figure 13 .
Figure 13.Salt and pepper noise on the watermarked image and extraction of the watermark after adding noise.

Figure 14 .
Figure 14.Embedding and Extraction using the proposed method for a real-time host image of size 1200 × 1200.

Figure 14 . 23 Figure 15 .
Figure 14.Embedding and Extraction using the proposed method for a real-time host image of size 1200 × 1200.Information 2021, 12, x FOR PEER REVIEW 15 of 23

Figure 15 . 23 Figure 16 .
Figure 15.Applying histogram equalization on the watermarked image and extraction of it.

Figure 17 .
Figure 17.Sharpened watermarked image and extraction after sharpening of the watermarked image.

Figure 17 .
Figure 17.Sharpened watermarked image and extraction after sharpening of the watermarked image.

Figure 17 .
Figure 17.Sharpened watermarked image and extraction after sharpening of the watermarked image.

Figure 17 .
Figure 17.Sharpened watermarked image and extraction after sharpening of the watermarked image.

Figure 17 .
Figure 17.Sharpened watermarked image and extraction after sharpening of the watermarked image.

Information 2021 , 23 Figure 21 .
Figure 21.Overall performance comparison of the proposed method with existing methods.

Table 1 .
Comparison of existing methods with mathematical terms.

Table 2 .
Calculation of DC Coefficient.

Table 2 .
Calculation of DC Coefficient.

Table 4 .
Comparison of extracted watermark with original watermark of size 64 × 64.

Table 4 .
Comparison of extracted watermark with original watermark of size 64 × 64.
Information 2021, 12, x FOR PEER REVIEW 13 of 23

Table 4 .
Comparison of extracted watermark with original watermark of size 64 × 64.

Table 4 .
Comparison of extracted watermark with original watermark of size 64 × 64.

Table 4 .
Comparison of extracted watermark with original watermark of size 64 × 64.

Table 4 .
Comparison of extracted watermark with original watermark of size 64 × 64.

Table 4 .
Comparison of extracted watermark with original watermark of size 64 × 64.

Table 5 .
Comparison of extracted watermark with original watermark of size 128 × 128.

Table 5 .
Comparison of extracted watermark with original watermark of size 128 × 128.

Table 5 .
Comparison of extracted watermark with original watermark of size 128 × 128.

Table 5 .
Comparison of extracted watermark with original watermark of size 128 × 128.

Table 5 .
Comparison of extracted watermark with original watermark of size 128 × 128.

Table 5 .
Comparison of extracted watermark with original watermark of size 128 × 128.

Table 6 .
Execution time comparison.

Table 7 .
Results comparison of PSNR and MSE.

Table 7 .
Results comparison of PSNR and MSE.

Table 8 .
Results comparison of NC for different types of attacks.

Table 8 .
Results comparison of NC for different types of attacks.