Analysis of Digital Image Watermarking Techniques through Hybrid Methods

. Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. For designing an eﬃcient and robust digital image watermarking system, the trade-oﬀ among imperceptibility, robustness, capacity, and security must be maintained. Various studies regarding this concern have been performed to ensure these requirements by hybridizing diﬀerent domains, such as spatial and transform domains. In this paper, we have presented an analytical study of the existing hybrid digital image watermarking methods. At ﬁrst, we have given a standard framework for designing a hybrid method that ensures the basic design requirements of watermarking for various applications. After a brief literature review, we compared and analyzed the complexity of several existing hybrid methods in a tabular form. The limitations and applications of these methods are also highlighted. Finally, we summarized the challenges of the existing methods and concluded the study by giving future research directions.


Introduction
Multimedia technology is improving day by day. erefore, it is easy to modify, duplicate, reproduce, and distribute the digital image during communications via local networks and throughout the Internet with low cost and immediate delivery without quality degradation. Image security and privacy are a significant concern for the multimedia revolution. Digital image watermarking is a significant advancement of technology in recent years for identifying ownership information of copyright holders and providing multimedia security. is technology embeds the watermark data into a multimedia product (such as text, image, audio, and video) and later extracts or detects it from the watermarked product to assert the product [1]. us, the host data are protected by inserting the watermark data that cannot be removed or replaced by an eavesdropper. is technology ensures content authentication, integrity verification, and tamper resistance and produces highly protected images. e cover (or host) image quality and beauty are maintained by an invisible watermarking. In recent years, various methods have been proposed based on either spatial or transform domain or both. e spatial domain method embeds the watermark by modifying the pixel values in the host image. However, in the transform domain, the coefficients of transforms are modified. ese transformations include discrete cosine transform (DCT), discrete Fourier transform (DFT), or discrete wavelet transform (DWT) [2]. e hybrid method combines any two or three transformations by maintaining a trade-off among imperceptibility, robustness, capacity, and security. However, in recent years, the transform domain algorithms have gained attention for their improved performance and almost replaced the spatial domain algorithms. Broadcast monitoring, ownership identification, fingerprinting, content authentication, integrity verification, and telemedicine security are important and the latest potential applications of digital image watermarking. e contributions of this research are (i) We present the current trends of hybrid methods (ii) We identify the limitations of the state-of-the-art hybrid methods of digital image watermarking (iii) We point out the challenges that must be addressed by future researchers In this research, the existing hybrid domain-based digital image watermarking methods are reviewed in Section 2. e framework of the hybrid method is revised in Section 3. Section 4 contains the design requirements and classification of hybrid methods. After that, the paper makes comparative studies of these hybrid methods in a tabular form. en, the paper lists some challenges and open research issues that must be addressed by future researchers. Finally, the last section concludes the study.

Literature Review
In recent years, many hybrid digital image watermarking methods have been developed for hiding data to take into account increasing robustness, capacity, and security by maintaining the visual quality of the watermarked image. e paper [3] proposed a discrete wavelet transform-(DWT-) and discrete cosine transform-(DCT-) based digital image watermarking technique for copyright protection. Here, the watermark image is encrypted using the Arnold transform. e system computes the block-based DCT of DWT LL subband, which provides better visual quality of the image to the human eye. Here, the watermark is embedded into the midfrequency DCT coefficient of the host image. e system is also robust against various attacks and performs better than a single DCT-based method. Another paper [4] combines DWT and singular value decomposition (SVD) for significant improvement of robustness and imperceptibility. Here, two-level (2L) DWT is applied to the host image, and then the watermark is embedded to the singular values of the 2L DWT subband (HL/LH). Hemdan et al. [5] proposed a hybrid watermarking technique based on DWT-SVD. Here, the wavelet fusion algorithm is used for embedding the watermark by using DWT and SVD. eir system is robust and provides better imperceptibility along with improving capacity. e lifting wavelet transform (LWT) and DCT are combined in a study [6], where the LWT is first applied to the host image. en, the watermark is embedded in the DCT of the selected LWT subband. Here, the original host image is decomposed by using LWT. is paper does not require the original host image for extracting the watermark. Jane et al. [7] proposed a hybrid nonblind watermarking method that combines DWT and SVD for embedding data into the host image. Here, the host image is decomposed into four subbands (HH, HL, LH, and LL), and then SVD is applied to the LL subband. e diagonal singular value coefficients are modified with the watermark image. e experimental result shows significant improvement in peak signal-to-noise ratio (PSNR) values of the watermarked image. eir proposed method is robust against JPEG compression, Gaussian noise, scaling, filtering, cropping, and rotation. Another paper is proposed to protect medical data for telemedicine applications [8]. For transferring medical data over the network by maintaining robustness and security, this paper uses a hybrid method that combines DWT and DCT. Here, the medical host image is divided into two parts: nonregion of interest (NROI) and region of interest (ROI). Multiple watermark images are embedded into the ROI part, and the text watermark is embedded into the NROI part. Here, the Rivest-Shamir-Adleman (RSA) algorithm is applied to the text watermark before embedding for enhancing security. is hybrid method preserves the host image visual quality without any degradation after embedding the watermark. Another hybrid method is proposed based on DCT-DWT and autothresholding. e DCT is applied to the host image prior to DWT. e algorithm uses the best threshold value for choosing the best embedding region and ensures better imperceptibility and high robustness against scaling, cropping, rotation, noising, and compression attacks [9]. Another hybrid method is presented [10] that combines the DWT and DCT domains by maintaining robustness and imperceptibility. In this paper, DWT-DCT coefficients are selected for embedding the watermark based on the human visual system. Here, quantization index modulation (QIM) is applied to the DWT-DCT coefficients of the host image for improving the performance in terms of imperceptibility and robustness.
For color image watermarking, another method is proposed based on the SVD and DCT Walsh hybrid transform [11]. is method uses low-frequency coefficients for embedding the watermark rather than middle-frequency transform coefficients of DCT. e experimental result shows significant robustness of this method against noise addition, histogram equalization, compression, and cropping attack. For securing medical images, another method combines DWT, DCT, and SVD for improving the robustness of the system [12]. Here, an invisible watermark image is embedded into the medical image. e third-level (3L) DWT is applied to the medical host image. Here, the high-frequency subbands of DWT coefficients of the medical host image are used. en, DCT and SVD transformations are applied to the host image. e system ensures better imperceptibility and improved robustness against noise addition (Gaussian and salt-and-pepper noise), Wiener filter, average filter, and median filter. e LWT, DCT, and SVD are combined in another scheme [13] that uses edge detection for selecting the best region for embedding the watermark. e particle swarm optimization (PSO) algorithm has been used to maintain the trade-off between robustness and imperceptibility. e experimental result shows that the system is robust against various attacks and also preserves the host image quality. A frequency domainbased hybrid DCT-SVD-based method is presented in the paper [14] for ensuring more capacity. is robust watermarking technique uses the Arnold transform for texturizing the watermark logo. At first, two-dimensional (2D) DCT is applied to the host image, and then SVD of the watermark logo is taken. Different weights are selected according to the decreased singular values for minimizing the distortion of the host image. For protecting copyright information, two transform domain methods like discrete Fourier transform (DFT) and DCT are combined [15]. At first, DFT is applied to the host image. e imperceptibility is achieved by using the DFT magnitude. en, DCT is applied to this DFT magnitude of the host image that improves the robustness of the system. e watermark is encrypted by using the Arnold transform before embedding, and the watermark is embedded into the middle-band DCT coefficients of the host image. e method shows that there is no visual difference between the host image and the watermarked image. e system shows improved robustness against different kinds of attacks. In another study [16], at first different levels of DWT are applied to the host image, and then DCT is applied to it. en, spread transform QIM is used for implementing the watermark embedding. e method shows significant improvement in terms of robustness and imperceptibility over the existing methods. A combination of DCT-and DWTbased robust color image watermarking method is proposed in another study [17]. At first, the RGB host image is divided into three components (red, blue, and green), and then DCT and DWT are applied to that image. Arnold transform encrypts the grayscale watermark image. e encrypted watermark is divided into equal smaller parts, and the DCT coefficient of each part is computed. After then, each DCT coefficient of the watermark part is embedded into the DWT subbands of the color host image. e experiment shows that the watermarked image is robust against resizing, noise adding, rotation, filtering, and JPEG compression attacks. Also, the system shows better imperceptibility compared to other methods. A combination of blind and nonblind watermarking technique is proposed where inner and outer watermarking techniques are used, respectively [18]. Here, a binary watermark image is embedded into the inner host image by using DWT with the help of the inner scheme. en, the resultant inner watermarked image is embedded into the outer host image by using DWT and SVD. e watermark extraction is done in a reverse manner.
is proposed system is robust against Gaussian noise, salt-andpepper noise, Poisson noise, speckle noise, rotation, and JPEG compression. Apart from the idea of combining spatial and transform domain algorithms, current trends are integrating them with various machine learning and artificial neural network algorithms for improving the performance. ese algorithms are used to find out the most effective embedding function. In 2020, an image watermark is proposed based on matrix factorization with Q learning which is a reinforcement learning model [19]. Here, Q learning is used to find out the appropriate host blocks for embedding by using the trial and error method. It has a better result for imperceptibility and robustness than random embedding. But, the performance against various attacks is not shown here. Another article is proposed that uses the support vector machine with a genetic algorithm [20]. Here, significant regions are selected by the fuzzy entropy, and then prominent low-frequency regions are calculated from these significant regions by the support vector regression model which increases robustness in a significant way than traditional methods. e watermark scaling factor (strength) is calculated here by the genetic algorithm-an optimization algorithm. Optimization algorithms, such as the genetic algorithm, particular swarm optimization, ant colony optimization, and firefly algorithm, are commonly used for finding the right embedding function or the right block for embedding [21][22][23]. e neural network is now becoming more popular than other machine learning algorithms. A spiking neural network (SNN) with DWT is proposed which has less time complexity, and the extraction problem is treated as an optimization problem that is solved by SNN [24]. Many works are done based on a neural network which then integrated with contourlet transform, Kurtosis coefficients, and YCbCr spaces besides the known frequency domains like DCT or DWT [24][25][26].

Framework of Hybrid Methods of Digital Image Watermarking
Digital watermarking technology is the way of altering multimedia data by adding information into the host media to protect its copyright information [27]. First, the system takes the host image and embeds the watermark image to it with the help of the embedding algorithm and the key. en, the system gets the watermarked image and sends it over the communication channel. Finally, the system extracts the watermark image by using the watermark extraction algorithm and the key. Figure 1 shows the above procedure. Digital watermarking can be done by either spatial or transform or hybrid domains. Spatial domain techniques do not provide high robustness against attacks or any manipulation [28]. For this concerned issue, transform domain techniques have gained attention for multimedia security [29]. However, due to the limited payload capacity of transform domain methods, hybrid domain methods are preferred in recent years [30]. In hybrid domain methods, two or more than two image transformations are used for watermarking. ese hybrid domain methods are the extended versions of transform domain methods [31]. ese methods provide more imperceptibility and high robustness to multimedia data and mainly used for multimedia security and copyright protection. e hybrid digital image watermarking method takes the host image and applies two or more transform domain methods (DCT, DFT, DWT, and SVD) to it. is process is called hybridization. e watermark image is encrypted by any lightweight encryption method, and then the encrypted watermark image is divided into n-blocks. After then, the encrypted block-based watermark image is embedded into the host image. Here, n-places of the host image are selected randomly for embedding n-blocks of the encrypted watermark. en, the inverse transformation is applied, and the watermarked image is finally obtained. e watermark extraction is done in a reverse manner. Figure 2 shows the framework of the watermark embedding for hybrid methods.

Design Requirements and Classification of
Hybrid Image Watermarking e digital image watermarking technique embeds data into an image in such a manner so that the data cannot be easily removed or destroyed. For effective watermarking, there Advances in Multimedia exist some design requirements. Moreover, hybrid watermarking can be done by combining various transform domain methods. is section discusses design requirements and the classification of hybrid digital image watermarking methods.

Design Requirements of Hybrid Digital Image
Watermarking. Due to the Internet and multimedia, it is easy to duplicate, transmit, and distribute the digital image when it is transmitted over the Internet or the personal network. erefore, to prevent unauthorized access, digital image watermarking adds information to the host media. erefore, the system should be efficient. Some requirements must be satisfied for designing efficient hybrid digital image watermarking methods. Among other requirements, the four basic requirements are imperceptibility, robustness, capacity, and security. ese requirements are depicted in Figure 3.
Imperceptibility is one of the important requirements of hybrid digital image watermarking methods that evaluates the performance of the watermarking system. It means there is no visual difference between the host image and the watermarked image. ey are perceptually indistinguishable to human eyes even after degradation in brightness or contrast [27,32]. Robustness is the requirement where the watermark image can still be detected after the watermarked image has been affected by some common image processing operations. ese operations include scanning, printing, scaling, translation, spatial filtering, rotation, color mapping, and lossy compression [27]. Robustness can be categorized into robust, fragile, and semifragile. Payload capacity evaluates the amount of embedded information to the host image based on the host image size. But, inserting more watermark bits to the host image is a difficult task that depends on practical applications [33]. Security is an important design requirement for fingerprinting, copyright protection, data authentication, and digital content tracking. Security is confirmed by encrypting the watermark image with various encryption methods.
ese include the Arnold transform, chaosbased method, DCT, and logistic map-based methods. ese methods ensure the security and confidentiality of the watermark image [34].

Comparative Study of Hybrid Digital Image Watermarking Methods
Some performance metrics determine the overall performance of the watermarking system. Hence, this section discusses the performance evaluating metrics. en, it highlights the experimental results of state-of-the-art hybrid methods in Tables 1 and 2. en, the complexity analysis of these hybrid methods is shown in Tables 3 and 4. e limitations and associated applications are highlighted in Table 5.

Performance Evaluating Metrics.
Quality recognizes an image-based object, and this quality is measured by some performance evaluating metrics that can be treated as benchmark tools for evaluating performance. ese include peak signal-to-noise ratio (PSNR), mean squared error (MSE), bit error rate (BER), mean absolute error (MAE), normalized correlation (NC), Euclidean distance (ED), structural similarity index (SSIM), feature similarity indexing method (FSIM), image fidelity (IF), and correlation quality (CQ). e more the PSNR, the more quality image is obtained. For an effective system, it is better to have PSNR > 30 dB, NC � 1.0, and SSIM � 1.

Experimental Results of Various Schemes.
In recent years, various hybrid methods have been developed for improving robustness, imperceptibility, and security, along with enhanced embedding capacity. However, this section keeps an eye on the summary of the state-of-the-art hybrid methods in Tables 1 and 2. Table 1 includes schemes, used techniques for imperceptibility, robustness, security requirements, size, type, and color of the cover image and the watermark image, and also embedding capacity. Table 2 includes schemes, test image, and imperceptibility measured in PSNR (dB) without any deformation of the watermarked image.

Complexity Analysis of Hybrid Digital Image Watermarking Methods.
e watermarked image goes through a communication channel and is attacked by common signal processing operations or attacks. is section analyzes the complexity of various hybrid methods with the help of Tables 3 and 4. Table 3 consists of the schemes and test images and evaluates the PSNR, SSIM, BER, MAE, and NC values under type 1 attacks that include histogram equalization (HE), Gaussian noise (GN), salt-and-pepper noise (SPN), low-pass Gaussian filtering (LPGF), JPEG compression, JPEG 2000, cropping, and rotation. Table 4 consists of the schemes and test images and evaluates the PSNR, SSIM, and NC values under type 2 attacks that include sharpening, blurring, average filter (AF), median filter (MF), resizing/scaling, Poisson noise (PN), Gaussian white noise (GWN), and speckle noise (SN). Here, QF � quality factor, CR � compression ratio, μ � mean, and var � variance.

Limitations and Applications of Various Hybrid Digital
Image Watermarking Methods. From the above summary, it is concluded that the hybrid domain digital image watermarking methods are more robust and provide better imperceptibility with high security. However, they have some limitations. ey cannot resist combined attacks like HE + GN, HE + SPN, GN + JPEG compression, SPN + JPEG compression, and LPGF + SPN. ese hybrid methods can be applied for multimedia security, telemedicine security, digital image security, and copyright protection. Figure 5 highlights the associated applications of hybrid digital image watermarking methods. e limitations and applications of various state-of-theart hybrid digital image watermarking methods are summarized in Table 5.

Challenges of Hybrid Methods of Digital
Image Watermarking e existing hybrid digital image watermarking methods are not so much robust against rotation, sharpening, blurring, average filtering (AF), Poisson noise (PN), speckle noise (SN), and print/scan attacks. Also, they are not much robust against combined attacks, like HE + GN, HE + SPN, GN + JPEG compression, SPN + JPEG compression, and LPGF + SPN. ese techniques increase higher computational complexity (time and space). Also, they cannot achieve high performance with a trade-off between imperceptibility, robustness, security, and capacity. Moreover, security is a big challenge for this technology. However, the recent induction of the Internet of ings (IoT) and blockchain-based authentication provide better security. IoT devices use lightweight encryption algorithms for enhancing security, whereas a computer uses sophisticated encryption algorithms. Besides, IoT needs limited storage and requires less computing complexity [35]. On the other side, a blockchain-based authentication is a decentralized approach. A blockchain contains digital information blocks that are linked together and secured by cryptography. is blockchain technology stores the signature of the host image on the blockchain. erefore, the host image cannot be modified by an attacker. For locating the tampered region and authenticity of the host image, the signature can be

Advances in Multimedia
For checking the authenticity of pharmaceutical products in the IoT environment, a method is proposed that uses the NFC or near-field communication [37]. e method ensures session key security by using the ROR (real-or-random) model which is effective from computation and communication cost perspectives. A contentbased image retrieval (CBIR) method is proposed without accessing cloud-server information [38]. Here, images are represented by extracting feature vectors. e secure k-nearest neighbor (kNN) algorithm protects the feature vector. For ensuring the security of existing devices, a blockchain-based secured mutual authentication (termed as BSeIn) method is proposed that ensures privacy and security [39]. A lightweight blockchain-based RFID authentication protocol, LBRAPS, is designed for supply chains in the 5G mobile environment. e method is secured against various attacks [40]. In addition, a new authentication method related to cloud-assisted cyber-physical system (CPS) is designed in reference [41]. Here, the external user can access the cloud server information. Cloud server data can communicate securely by the authentication scheme between a cloud server and a smart meter. e method ensures the security of the system. Recently, Wazid et al. [42] proposed a LAM-CIoT (lightweight authentication mechanism in a cloud-based IoT environment) mechanism where the authorized users can access the IoT data remotely. e method uses cryptographic hash functions and bitwise XOR operations and has shown better security experimentally.  from the direct voice. At first, voice to text conversion will be done and then the text will be inserted to the cover image. It will be more secured than traditional authentication for the extra step voice to text as it finds applications in natural language processing. (ii) Biometric Authentication. An effective invisible biometric authentication system is very much demanding in today's digital world, as it has huge applications in the medical field, e-commerce, and banking system. (iii) Social Authentication. At present, fake accounts can be seen on social media which harms society. Various crimes, fake news, and rumors are spreading on an increasing scale through these fake profiles. So, to stop these unwanted profile activities special research focus is needed. (iv) Image Authentication with Cloud Outsourcing. is research will lead to the privacy-preserving image authentication system. Image authentication is a costly operation when we consider a big image database. So, image databases should be encrypted before sending it to the cloud. Blockchain technology can be integrated here for better security. It is a challenging issue to find out the original watermark from the encrypted cover image on the receiver side and an open problem for future researchers.

Conclusions and Future Directions
Images are an important part of multimedia data. Image authentication is a challenging task due to Internet traffic. Because of the interactive communication of multimedia data and wide-spread use of IoT technology, information can be duplicated easily. Along with image data security, it is essential to ensure the imperceptibility, robustness, and enhanced data embedding capacity. Hybrid digital image watermarking is a significant field for ensuring these issues. However, our investigation has found that the existing hybrid methods need to be improved to ensure these issues. Moreover, we have pointed out that the recent induction of the Internet of ings (IoT) and blockchain-based authentication provide better security. erefore, to get improved robustness and high image data security along with better imperceptibility and embedding capacity, future researchers must combine machine learning and artificial neural network algorithms in the hybrid transform domain.

Data Availability
ere are no data available. 10 Advances in Multimedia