Researchers in the fields of information security and computer image processing are deeply concerned about digital watermarking technology as piracy of digital products like images, audio, video, and files, which are becoming increasingly serious due to the Internet's rapid development and the media resources' digitalization. By detecting the watermark information embedded in the digital media to identify the media copyright, the copyright of the digital media can be effectively protected. In fact, digital watermarking has important application value in covert communication, bill anti-counterfeiting, digital signature, fingerprint identification, logo implicit authentication, and so on. In this paper, an algorithm-and algorithm-combination-based dual digital watermarking design technique is proposed. Based on a careful examination of the algorithms and algorithms one at a time, this creative proposal combines the two algorithms to achieve efficient embedding and extraction of digital watermarks and to take advantage of the double watermark's security benefits to encrypt the transmission of digital maps, thereby enhancing the security of image transmission. Then, the scheme is tested to prove its feasibility. At the same time, in order to verify the advantages of the scheme, a variety of attack experiments are carried out on the scheme, and the experimental data in the same environment are compared with other dual digital watermarking schemes. Finally, the superiority and robustness of the scheme are obtained, and it is applied and popularized in the military. The emphasis of this paper is to realize the information security of armored mechanized troops. During the battle, armored mechanized units use the positioning system equipped by armored vehicles to snap the geographical environment of the battlefield instantly, and upload the image to the rear combat command center in time through the network, military network, and people's network. In this long-distance transmission process, in order to ensure the security and timeliness of the transmitted images, it is necessary to use encryption technology to protect and verify the military images.