Previous Article in Journal
Large Pages, Large Leaks? Hugepage-Induced Side-Channels vs. Performance Improvements in Cryptographic Computations
Previous Article in Special Issue
A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Unbreakable QR Code Watermarks: A High-Robustness Technique for Digital Image Security Using DWT, SVD, and Schur Factorization

by
Bashar Suhail Khassawneh
1,*,
Issa AL-Aiash
2,
Mahmoud AlJamal
3,*,
Omar Aljamal
4,
Latifa Abdullah Almusfar
5,
Bashair Faisal AlThani
5 and
Waad Aldossary
6
1
Department of Computer Science, Faculty of Computer Science and Informatics, Amman Arab University, Amman 11953, Jordan
2
Department of Information Technology, Faculty of Prince Al-Hussein bin Abdullah II for IT, The Hashemite University, Zarqa 13133, Jordan
3
Department of Cybersecurity, Science and Information Technology, Irbid National University, Irbid 21110, Jordan
4
Department of Mathematics, Faculty of Sciences, Al al-Bayt University, Mafraq 130040, Jordan
5
Department of Management Information Systems, College of Business Administration, Imam Abdulrahman Bin Faisal University (IAU), Dammam 31451, Saudi Arabia
6
Department of Marketing, College of Business, Al Yamamah University, Khobar 12674, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Cryptography 2026, 10(1), 4; https://doi.org/10.3390/cryptography10010004 (registering DOI)
Submission received: 18 November 2025 / Revised: 10 December 2025 / Accepted: 14 December 2025 / Published: 30 December 2025

Abstract

In the digital era, protecting the integrity and ownership of digital content is increasingly crucial, particularly against unauthorized copying and tampering. Traditional watermarking techniques often struggle to remain robust under various image manipulations, leading to a need for more resilient methods. To address this challenge, we propose a novel watermarking technique that integrates the Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD), and Schur matrix factorization to embed a QR code as a watermark into digital images. Our method was rigorously tested across a range of common image attacks, including histogram equalization, salt-and-pepper noise, ripple distortions, smoothing, and extensive cropping. The results demonstrate that our approach significantly outperforms existing methods, achieving high normalized correlation (NC) values such as 0.9949 for histogram equalization, 0.9846 for salt-and-pepper noise (2%), 0.96063 for ripple distortion, 0.9670 for smoothing, and up to 0.9995 under 50% cropping. The watermark consistently maintained its integrity and scannability under all tested conditions, making our method a reliable solution for enhancing digital copyright protection.

1. Introduction

In the digital era, the rapid advancement of data transmission technologies has facilitated the effortless sharing of vast volumes of multimedia content, including images, videos, and audio files. However, this growing accessibility also increases the necessity for robust security mechanisms to preserve the integrity and ownership of digital content. One of the major challenges in this context is enabling content creators to authenticate and safeguard their intellectual property rights [1]. Unauthorized usage and copyright infringement have become pervasive due to the ease of duplication and dissemination of digital materials. Traditional approaches, such as legal agreements and manual tracking, are insufficient to ensure copyright protection in the face of rapid and often untraceable content distribution. Digital images, in particular, are highly susceptible to manipulations that can remove or distort embedded watermarks, thereby compromising copyright enforcement. Consequently, there is a pressing need for a robust and imperceptible watermarking technique capable of withstanding diverse attacks and ensuring the security and authenticity of digital media.
To address these concerns, copy-detection systems have been proposed as a potential solution. Various approaches have been investigated for image copy detection with the primary objective of comparing visual features to identify similar images. These features include color histograms, texture descriptors, and shape information. A commonly used approach is image hashing, which generates a compact digital signature for each image based on its visual attributes, enabling the comparison of signatures to estimate similarity [2]. However, this approach has several limitations. For example, it performs poorly under image modifications, can be computationally demanding, may be less accurate for certain image types, and is susceptible to false positives [3]. Image encryption provides another means of protecting content by transforming the original data into an unintelligible form [4]. A key limitation of encryption is the need for a reliable ownership-verification mechanism if an attacker decrypts the media and gains access to the content.
The most widely used approach for image authentication is digital watermarking. A digital watermark refers to concealed, encoded information that is embedded into an image to verify copyright ownership and deter unauthorized replication [5]. Early watermarking schemes were largely determined by the type of host data carrier [6]. In general, watermark embedding techniques can be categorized into spatial-domain methods [7] and transform-domain (frequency-domain) methods [8,9]. Transform-domain watermarking embeds the watermark in a transformed representation of the host signal (e.g., an image, audio, or video) [10]. Typically, this process involves transforming the host media from the spatial (time) domain to the frequency domain, embedding the watermark in the transformed coefficients, and then applying the inverse transform to obtain the watermarked media for storage or transmission [11].
Among the most significant and widely adopted techniques in this domain are transform-based methods, particularly the Discrete Cosine Transform (DCT). DCT-based watermarking operates by dividing the host medium into non-overlapping blocks, subjecting each block to a DCT transformation [10]. The resulting transformed coefficients are then modified by incorporating the watermark signal, resulting in watermarked coefficients. The typical watermark signals are either a binary sequence or an imperceptible pseudo-random noise sequence that is visually indistinguishable to human observers [12]. The Fast Hadamard Transform (FHT) has also been used to achieve imperceptible embedding and a high watermark detection accuracy in digital images. Other techniques employed in frequency-domain watermarking include the Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT) [13], and Singular Value Decomposition (SVD).
Histogram equalization, salt-and-pepper noise, ripple effects, smoothing, and cropping are common attacks on digital watermarks. By redistributing the pixel intensity values, histogram equalization modifies an image’s contrast. By altering the image’s intensity distribution, this operation can either expose subtle watermarks or suppress them, thereby compromising both imperceptibility and robustness [14]. The salt-and-pepper attack adds black and white pixels to the image. Watermarks embedded in those areas may be obscured by this high-frequency noise, making it difficult to reliably retrieve the watermark. In a ripple attack, periodic wave-like distortions are introduced into the image, which displace watermark samples from their original positions.
This misalignment disrupts the spatial correlation required for watermark detection and often leads to partially recovered or corrupted watermarks. A smoothing attack (blurring) reduces local intensity variations by averaging pixel values within a neighborhood, which decreases image sharpness and attenuates the high-frequency components that many watermarking schemes rely on. As a result, the embedded watermark may be weakened and become less distinguishable from the host content, reducing its resilience to subsequent processing. In a cropping attack, portions of the image are removed (from the boundaries or internal regions), potentially eliminating watermark-bearing areas entirely. When the watermark is distributed across the full image, cropping can destroy critical embedded information and undermine proof-of-ownership. Because these attacks target different stages and assumptions of the watermarking pipeline, an efficient, robust, and imperceptible watermarking algorithm is required to withstand such image processing operations while preserving reliable watermark extraction.

Contribution

Many significant contributions to the advancement of ownership verification for color images are presented in this paper. A novel and robust model that incorporates various applied mathematical principles has been developed, enabling the embedding of watermarks in color images using MATLAB 2023a. We summarize our contributions as follows:
  • High-Robustness Across Diverse Attacks: Our method consistently outperforms existing techniques in maintaining QR code functionality under a variety of attacks, such as ripple distortions and severe cropping, ensuring reliable digital content protection.
  • Innovation in QR Code Watermarking: By combining the strengths of DWT, SVD, and Schur matrix factorization, we propose a novel approach that improves the security and durability of QR code watermarks in digital images.
  • We introduce a new method for embedding watermarks in digital images that leverages a combination of DWT, SVD, and Schur matrix factorization.
The structure of this paper is organized as follows. Section 1 provides an introduction to the challenges and significance of copyright protection in the digital era. Section 2 reviews the existing literature in image watermarking methods, focusing on the strengths and limitations of various approaches. Section 3 presents the proposed watermarking model and details the mathematical principles and techniques employed, including DWT, SVD, and Schur matrix factorization. Section 4 describes the experimental setup and methodology used to evaluate the performance of the proposed model against various types of attacks. Section 5 discusses the results of the experiments and compares the effectiveness of the proposed model with existing techniques. Section 6 contains the conclusion of the paper, summarizing the key findings and suggesting directions for future research.

2. Literature Review

According to Sharma et al. (2020) [15], a nature-inspired approach for secure and robust color image watermarking with pseudorandom ordering was introduced. The main issue was the lack of adequate protection for multimedia information from unauthorized copying and modification. The work assumed that a hybrid watermarking method based on SVD and DWT, with an artificial bee colony (ABC) optimized technique, is able to maintain the balance between imperceptibility and robustness. The proposed approach embedded a scrambled color watermark into the RGB planes by modifying the singular values of the host images, using chaotic maps to enhance security. The effectiveness of the proposal against different attacks is evidenced, and the NC value for the recovered watermark using histogram equalization was 0.8931. This performance can be attributed to the computational efficiency and ease of implementation of DWT and SVD, while the ABC optimization primarily tunes the scaling factor. But it should be noted that their gap under histogram equalization attacks is that the robustness was relatively low, indicating that improving performance under this type of distortion remains challenging.
Anand and Singh (2020) [16] reported that the study’s goal was to make medical information security better in telehealth services by using a better watermarking method. The study concentrated on integrating multiple watermarks into medical images utilizing DWT and SVD in conjunction with encryption and compression techniques. The goal of the method was to make sure it could withstand different types of attacks while still keeping the image quality high. The process used the Hamming code for the text watermark, embedded it in the DWT-SVD domain, and then used Chaotic-LZW and HyperChaotic-LZW methods to encrypt and compress it. The results showed that the system was very strong with an NC value of 0.8716 for histogram equalization attacks. Also, the NC value for salt-and-pepper noise at a density of 0.001 was 0.7751 using the chaotic-LZW method and 0.9687 using the hyperchaotic-LZW method. Our method achieved higher NC values even at much higher noise densities (up to 50%), showing that it is more robust. However, a limitation of their work is reduced robustness under certain attack conditions, which motivates further improvements.
Saritas and Ozturk, 2023 [17] proposed a method to strengthen copyright protection by a hybrid CT- and DCT-based blind and robust color image watermarking scheme. Their work focused on embedding a 24-bit watermark within an 8 × 8 image block employing one-level CT and block DCT using the Cb color channel of the YCbCr color model. The primary objective was to enhance the robustness, imperceptibility, and security of the watermark. In their process, they first transformed the original RGB color image to YCbCr, and then CT was performed on the Cb component, which was followed by embedding a scrambled watermark using the Arnold transform. Experiment results demonstrated good robustness compared to other attacks with an NC value of 0.9020 under salt-and-pepper noise (density: 2%). Furthermore, in the 50% cropping attack, the NC values varied within [0.7075, 0.7092]. Their technique exhibited suboptimal robustness under higher noise levels and heavy cropping attacks. We tackle this in our work by having high NC values even at 50% noise density and 50% cropping attacks.
Rahardi et al. (2022) [18] propose a robust image watermarking technique using DCT for copyright protection on color images. The study addresses the challenge of unauthorized use of images shared on social media platforms. The method embeds watermark data into the DCT coefficients of 8 × 8-pixel blocks of the host image, ensuring the watermark remains robust against various attacks. They focus on maintaining image quality while embedding and extracting watermark data. Their methodology divides each channel of the host image into 8 × 8 pixel blocks, transforms these blocks into the frequency domain using DCT, and embeds the watermark data into specific DCT coefficients. The watermarked image demonstrated resilience to attacks with NC values of 0.7667 for salt-and-pepper noise and 0.7913 for the ripple attack and low bit error rate (BER) values. A remaining gap is further improving robustness against more complex tampering operations while reducing computational cost.
Han et al. (2021) [19] stated that the main goal is to fix the security problems that come up when medical images are stored and sent. The study underscores the necessity of safeguarding sensitive patient information contained within medical images from unauthorized access and manipulation. The main research question is how to make a strong zero-watermarking method that can stand up to local nonlinear geometric attacks. The method involves using a pretrained VGG19 to obtain deep features from medical images, changing these features with the Fourier transform, and then using a mean-perceptual hashing algorithm to make a strong zero-watermark. Their results show that the proposed algorithm was very strong against different types of attacks, such as ripple, extrusion, spherical, and rotation distortions. The NC value for ripple distortion at 150% is 0.87595. The study offers substantial insights for safeguarding the security of medical images within digital healthcare systems. However, further work is needed to improve the algorithm’s performance and reliability.
According to Abodena (2024) [20], the authors present a clear and reliable way to hide a watermark inside a black-and-white image by using Schur decomposition and checking the image’s entropy to protect copyrights. The study examines the common problems of sharing, changing, and copying digital images online, and it focuses on how to keep these images secure. The main research question is how to insert a watermark and later extract it while keeping it invisible and difficult to remove. The method uses a two-level wavelet transform on the image and then applies DCT to the high-frequency region. After this step, the DCT values are divided into small blocks, and Schur decomposition is used to place the watermark. The results show that the method keeps the image looking good and remains strong, reaching an NC of 0.891 even when half of the image is cropped. Further work is needed to improve performance and extend the method to color images.
Altay and Ulutas (2024) [21] put forward two innovative biometric watermarking schemes utilizing QR decomposition and Schur decomposition within the redistributed invariant discrete wavelet transform (RIDWT) domain to address ownership disputes. The study underscores the necessity for secure and resilient watermarking methodologies to safeguard copyright in the prevalent digital media-sharing epoch. In their approach, biometric iris images are embedded into color images. The method uses RIDWT to break down the Y channel of color images in the YCbCr space, chooses low-frequency sub-band blocks based on standard deviation, and embeds the biometric watermark using QR or Schur decomposition. The results show that the system is strong against attacks with NC values of 0.911 for salt-and-pepper noise (3%). A remaining gap is the resilience of watermark extraction under high-intensity noise attacks and complex tampering scenarios.
According to Yuan et al. (2024) [22], the authors present a novel zero-watermarking technique for encrypted medical images using DWT and Daisy feature descriptors to address problems such as information leakage and malicious tampering. The research work concentrates on web-based security to preserve the medical images during transmission. The process consists of a medical image being encrypted with DWT-DCT and logistic mapping, which is followed by three stages of DWT, the Daisy descriptor matrix calculation, and a 32-bit binary feature vector produced via perceptual hash. Their findings show that the algorithm obtained limited robustness against a number of attacks with the value of NC being 0.72 under 30% cropping along the Y-axis and 0.63 under 30% cropping along the X-axis. In light of these findings, further work is required to enhance performance on color images and improve robustness.
Mareen et al. (2024) [23] proposed a blind deep-learning watermarking method that extends the HiDDeN encoder–decoder framework with differentiable attack layers to improve robustness against geometric transformations. The architecture inserts noise layers for JPEG via a differentiable JPEGdiff module, as well as rotation, rescaling, translation, shearing, and mirroring, and is trained on COCO images with randomly generated 30-bit messages; models include an identity baseline (no noise), several “specialized” single-attack variants, and a “combined” model with multiple attacks sampled during training. Reported imperceptibility shows SSIM 0.930 for the combined model and ≈0.977 for RivaGAN. While robustness curves indicate that the identity model is weak for most attacks, specialized models never drop below ∼65% bit accuracy. In contrast, the combined model markedly improves geometric robustness but is weaker than specialized models for JPEG/blur, and RivaGAN is strongest for JPEG/blur yet inferior under geometric attacks. While this work advances blind, learning-based geometric resilience, it lacks a theory-grounded embedding rationale in transform subbands, and it also omits an explicit imperceptibility–robustness control like an α sweep with a PSNR 30  dB constraint. Our method complements these gaps by using a DWT+Schur+SVD pipeline with dual LL/HH embedding, which is a principled α -sensitivity protocol.
Zhang et al. (2025) [24] propose ZoDiac, a stable-diffusion-based framework that embeds zero-bit invisible watermarks into existing images by optimizing a latent vector and encoding a concentric ring pattern in its Fourier domain, which is followed by DDIM inversion for detection and an adaptive mixing step to preserve perceptual quality (PSNR 29 –30 dB; SSIM 0.92 ). Their objective is to overcome diffusion-model attacks like (Zhao23) that defeat classical and learning-based watermarking; experiments on MS-COCO, DiffusionDB, and WikiArt show high pre-attack detectability and strong post-attack robustness, including dominance under composite attacks excluding rotation, with WDR often >0.98 and clear advantages over DwtDct, RivaGAN, SSL, CIN, and StegaStamp. The authors also report compatibility across SD backbones and analyze trade-offs from SSIM/detection thresholds; a noted limitation is sensitivity to rotation (mitigated by rotation auto-correction at the cost of higher FPR) and the zero-bit nature of the mark (no payload decoding).
Cheng et al. (2025) [25] propose a forensic pipeline for non-aligned double-JPEG (NA-DJPEG) images that first estimates DCT grid shifts ( R , C ) via a shallow two-branch CNN and then re-crops by ( 8 R , 8 C ) to realign with the primary compression before running standard quantization-step estimators. A learnable Second-Order Difference (SOD) layer enhances blocking-artifact cues, while a Color Fine-Grain (CFG) module augments YCbCr with a computed C g channel to exploit chrominance traces. The network avoids pooling to preserve subtle periodicities. Experiments on UCID, RAISE, and NRCS show consistently higher accuracy in misalignment recovery across patch sizes and quality factors with pronounced gains when the second quality factor is high. Although effective for recompression forensics and parameter inference, it targets grid-shift estimation rather than payload-bearing watermarking: it neither embeds nor decodes structured messages and lacks an explicit imperceptibility–robustness control protocol. Our study fills this gap by delivering a DWT+SVD+Schur QR watermark with dual LL/HH embedding and an α sweep ensuring PSNR/SSIM and decoding robustness under diverse attacks.
Gao et al. (2025) [26] introduce “Encrypt a Story” (EAS), which is a selective video-encryption framework that concentrates cryptographic effort on temporally salient actions to reduce cost while preserving security. EAS first segments actions using an MSLID-TCN, and then it encrypts only the critical segments via plane scrambling and diffusion driven by a discrete sinusoidal memristive Rulkov neuron map (DSM–RNM). Keys and initial states are derived using SHA–256 from segment content, and the DSM–RNM keystream enables high-sensitivity diffusion. Experiments report about a 90% reduction in total encryption time versus full-frame encryption, near-zero adjacent-pixel correlations (≈0.0014), entropy around 7.999, strong NPCR/UACI against differential attacks, NIST randomness compliance, and pronounced key sensitivity. While EAS advances efficient selective encryption and chaotic keystream design, it is not a payload-bearing watermark: it neither embeds nor decodes structured messages. Our work complements this line of work by delivering a DWT+Schur+SVD QR watermark with dual LL/HH embedding and an explicit α -sweep that enforces PSNR/SSIM constraints and maintains robust, decodable QR recovery under compression, noise, geometric ripples, and cropping.

3. Preliminary

This section gives an overview of the main ideas and methods used in frequency-based watermarking. First, we discuss frequency-based watermarking, which is a common way to embed and extract watermarks from digital media. It entails altering the frequency domain of the media signal to incorporate imperceptible watermarks. Next, we look more closely at the transforms that were used, such as SVD and DWT. SVD is a strong mathematical tool that breaks down a matrix into singular values and singular vectors. It is often used to add and remove watermarks. DWT, on the other hand, is a signal processing transform that breaks a signal down into different frequency bands. This makes it easy to embed watermarks and reliably extract them under various attacks. These transforms are the basis for frequency-based watermarking methods and are very important for achieving reliable and invisible watermarking in digital media.

3.1. Frequency-Based Watermarking

Frequency domain-based watermarking is a method of inserting watermarks into digital data by operating in the frequency domain. This process changes the representation of the media from its spatial representation, where pixels are manipulated directly, to a frequency-based representation in which information is provided in terms of the frequencies that are present in the signal or image. The embedded watermark is invisible to the human eye by altering the frequency coefficients of the media; meanwhile, it still has high robustness against common attacks. Transforming to the frequency domain allows more complex manipulation to make the watermark imperceptible but robust against tampering. This work consists of three main phases for frequency-based watermarking. First, the image is transformed to the frequency domain by methods like the Discrete Wavelet Transformation (DWT). Second, the watermark is inserted into the transformed image by modifying the frequency coefficients. The image is then inversely transformed into the spatial domain to make the watermark indiscernible and visually hard to detect. The superiority of the proposed method is promising, in terms of improved imperceptibility, and superior robustness against different image processing operations such as salt-and-pepper, histogram equalization, cropping, and ripple attacks.

3.2. Discrete Wavelet Transform (DWT)

The DWT is a powerful signal-processing technique widely used in image processing, data compression, and digital watermarking. Unlike the DCT, which operates only in the frequency domain, DWT works in both the time and frequency domains, providing a multi-resolution analysis. This means that DWT decomposes an image into different frequency sub-bands at various levels of resolution, capturing both coarse and fine details of the image. DWT operates by breaking down an image into four sub-bands: (LL), (LH), (HL), and (HH). The LL sub-band represents the coarse approximation of the image, containing the most significant information. The LH, HL, and HH sub-bands capture the horizontal, vertical, and diagonal details [27]. This hierarchical structure allows for an efficient representation and manipulation of the image, making DWT useful for embedding watermarks in ways that are imperceptible to the human eye. The role of Equation (1) W j 0 , k is to retain the overall trends and basic features of the original signal, while ϕ j 0 , k ( x ) helps in scaling and transforming the signal to focus on these low-frequency components, and in Equation (2), W c j , k retains the high-frequency information, such as edges and fine details, while ψ j , k ( x ) helps in transforming the signal to focus on these detailed components. For the inverse DWT, the original image f ( x ) can be reconstructed from the wavelet coefficients using Equation (3).
W j 0 , k = 1 M x = 0 M 1 f ( x ) ϕ j 0 , k ( x )
W c j , k = 1 M x = 0 M 1 f ( x ) ψ j , k ( x )
f ( x ) = 1 M k = 0 M 1 W j 0 , k ϕ j 0 , k ( x ) + 1 M j = j 0 + 1 J 1 k = 0 2 j 1 W c j , k ψ j , k ( x )
where the following apply:
  • f ( x ) is the original signal or image.
  • M is the total number of pixels.
  • W j 0 , k represents the approximation coefficients, capturing the coarse, low-frequency components of the image.
  • ϕ j 0 , k ( x ) are the scaling functions, which are used to project the original signal f ( x ) onto the low-frequency sub-space.
  • W c j , k are the detail coefficients, capturing the fine, high-frequency components of the image.
  • ψ j , k ( x ) are the wavelet functions, which are used to project the original signal f ( x ) onto the high-frequency sub-space.
  • The first term in Equation (3) represents the approximation component, which is reconstructed from the approximation coefficients and scaling functions.
  • The second term in Equation (3) represents the detail component, which is reconstructed from the detail coefficients and wavelet functions.
Figure 1 illustrates the application of DWT on the original image. The original image is decomposed into four sub-bands: LL, LH, HL, and HH. The LL sub-band retains the most significant features of the image, appearing as a blurred version of the original, while the LH, HL, and HH sub-bands highlight the finer details, emphasizing horizontal, vertical, and diagonal edges.

3.3. Schur Matrix Factorization

Schur matrix factorization is a complex way to break down a square matrix into a unitary matrix and an upper-triangular matrix. This method is especially useful for many purposes, such as digital watermarking, because it makes it easy to change and fully analyze matrix properties while keeping the matrix’s natural structure. Schur factorization makes it easier to understand the properties and behavior of a matrix by breaking down complicated operations into simpler parts. Schur matrix factorization is a strong and effective way to embed digital watermarks into images. It makes it easy to insert watermark signals into images. This method breaks down a square matrix into an upper-triangular matrix and a unitary matrix. This makes sure that the original image remains intact while the watermark is added. The decomposition keeps the image’s visual quality while making the watermark harder to see and stronger [28]. Mathematically, Schur factorization is shown by Equation (4):
S c h u r ( A ) = [ J A , K A ]
where A is the original matrix, J A is a unitary (orthogonal) matrix, and K A is an upper-triangular matrix. The matrix J A contains orthogonal eigenvectors, while K A preserves the significant properties of the image, ensuring minimal distortion during the watermarking process.
The Schur factorization process begins with the decomposition of the image matrix A. The image matrix A is decomposed into two matrices: J A and K A . This is achieved by first finding the eigenvalues and eigenvectors of A. The orthogonal eigenvectors form the matrix J A , and the upper-triangular matrix K A is constructed using these eigenvectors. If we apply Schur factorization to matrix A, the result is shown in Equation (5):
A = J A K A J A
where J A denotes the conjugate transpose of J A .
Eigenvalues and eigenvectors are fundamental concepts in linear algebra, particularly in the study of linear transformations. An eigenvector of a matrix A is a non-zero vector v such that when A is multiplied by v, the result is a scalar multiple of v. Mathematically, this is expressed as shown in Equation (6):
A v = λ v
where v is the eigenvector and λ is the corresponding eigenvalue. An eigenvalue λ is a scalar associated with a given eigenvector v such that when the matrix A acts on v, the result is λ v .
To find the eigenvalues and eigenvectors of a matrix A, we solve the characteristic equation as shown in Equation (7):
det ( A λ I ) = 0
where I is the identity matrix of the same size as A, and det denots the determinant. The solutions to this equation, λ 1 , λ 2 , , λ n , are the eigenvalues of A. Once the eigenvalues are found, the corresponding eigenvectors are determined by solving the linear system for each eigenvalue λ as Equation (8):
( A λ I ) v = 0
For example, consider a simple 2 × 2 matrix A:
A = 2 1 1 2
To find the eigenvalues, we solve the characteristic equation:
det ( A λ I ) = det 2 λ 1 1 2 λ = ( 2 λ ) ( 2 λ ) 1 = λ 2 4 λ + 3 = 0
The solutions to the equation λ 2 4 λ + 3 = 0 are λ 1 = 3 and λ 2 = 1 . For λ 1 = 3 , solving ( A 3 I ) v = 0 gives the eigenvector v 1 = 1 1 . For λ 2 = 1 , solving ( A I ) v = 0 gives the eigenvector v 2 = 1 1 .
The next step involves embedding the watermark signal into the K A matrix. The embedding process modifies the singular values of K A , which represent the key properties of the image. These modifications are designed to be imperceptible to the human eye to ensure that the visual quality of the image remains unaffected. Let W be the watermark matrix, and let α be the scaling factor for the watermark. The modified matrix K A after embedding can be expressed as shown in Equation (9):
K A = K A + α W
After embedding the watermark, the inverse Schur factorization is applied to reconstruct the watermarked image. This step involves combining the modified K A with J A to produce the watermarked image matrix A . The reconstruction can be represented as Equation (10):
A = J A K A J A

3.4. Singular Value Decomposition (SVD)

SVD is a robust computational method used to decompose a matrix into three key components: left singular vectors, singular values, and right singular vectors. This technique is significant in watermark applications for tasks such as signal processing, data compression, and noise reduction. SVD allows for the transformation of complex data into a more manageable form, capturing the essential features while reducing dimensionality. By breaking down data into its core components, SVD enhances the efficiency and accuracy of various algorithms, making it an indispensable tool in modern watermark practice for analyzing and processing large datasets [29]. The SVD can be represented as Equation (11):
( SVD ) = U · D · V T
where:
U = u 1 , 1 u 1 , 2 u 1 , N u 2 , 1 u 2 , 2 u 2 , N u M , 1 u M , 2 u M , N , S = s 1 , 1 0 0 0 s 2 , 2 0 0 s M , N , V = v 1 , 1 v 1 , 2 v 1 , N v 2 , 1 v 2 , 2 v 2 , N v M , 1 v M , 2 v M , N

3.5. Schur Decomposition in Watermarking and Its Complementarity with SVD

This section motivates and formalizes the role of the real Schur decomposition within our DWT-based watermarking pipeline and explains how it complements the Singular Value Decomposition (SVD). After decomposing a sub-band (LL or HH) as A = Q T Q , the orthogonal similarity provided by Q enables numerically stable, energy-preserving mappings between the image domain and the triangular factor T, while the structure of T (diagonal quasi-eigen information with off-diagonal couplings) offers coherent loci for embedding. We then operate in the SVD domain of T to adjust the watermark strength through its singular spectrum, achieving perceptual control with minimal distortion. This Schur–SVD coupling thus balances robustness (via unitary redistribution tied to sub-band structure) and imperceptibility (via energy-aware singular-value scaling), which is particularly beneficial under filtering, histogram equalization, mild geometric distortions, and compression. The remainder of this section details the theoretical properties we exploit, the precise embedding and extraction operators, and a concise comparison clarifying the distinct contributions of Schur and SVD to the overall resilience of the scheme.
Let A R m × n denote a DWT sub-band (e.g., LL or HH). The real Schur decomposition writes
A = Q T Q ,
where Q is orthogonal ( Q Q = I ) and T is (quasi) upper–triangular. By contrast, the Singular Value Decomposition (SVD) writes
A = U Σ V ,
with U U = V V = I and non-negative singular values on the diagonal of Σ .

Advantages of Schur for Watermarking

(1) Unitary energy preservation: A perturbation Δ T mapped back as Δ A = Q Δ T Q preserves Frobenius norms ( Δ A F = Δ T F ), yielding predictable embedding strength and numerical stability. (2) Structure awareness: The triangular factor T reflects (quasi-)eigen information on its diagonal and couplings off-diagonal. Targeting selected entries or block-diagonals of T produces coherent, globally distributed changes after similarity mapping by Q ( · ) Q , which empirically improves resilience to smoothing, histogram equalization, and mild geometric distortions. (3) Well-conditioned back-projection: The orthogonality of Q avoids error amplification during forward and inverse transforms, improving backward stability in embedding and extraction.

Complementarity with SVD

Schur provides a stable, orthogonal conduit tied to the sub-band structure, while SVD supplies optimal energy compaction and fine-grained strength control via the singular spectrum:
T = U T Σ T V T , Σ ˜ T = Σ T + α Σ W ,
where Σ W encodes the watermark and α > 0 controls strength. The watermarked triangular factor is T ˜ = U T Σ ˜ T V T , and the watermarked sub-band becomes
A ˜ = Q T ˜ Q .
Thus, SVD ensures perceptual economy (small, controlled adjustments in Σ T ), while Schur’s unitary similarity spreads these adjustments coherently in the sub-band, enhancing robustness without sacrificing imperceptibility. In our implementation, LL and HH are employed to balance resilience (LL) and manipulation-trace sensitivity (HH). As shown in Table 1.
At detection, T ˜ is recovered as T ˜ = Q A ˜ Q ; then, SVD-domain scaling is inverted to estimate Σ W and reconstruct the watermark. The unitary steps again preserve norms, limiting error accumulation across transforms.

4. Methodology

In this section, we discuss how we developed a strong and undetectable watermarking method to make it more difficult to steal digital images. The suggested method uses advanced math and signal processing to make it very hard to attack in many ways. The method uses DWT, SVD, and Schur matrix factorization in an integrated manner. These methods work together to make sure the watermark stays hidden and that people cannot change the image. The next steps describe how to embed and remove watermarks in a systematic way to protect proof of ownership of digital images. The proposed watermarking method consists of three steps: embedding, extraction, and evaluation. Figure 2 shows the whole process. The first step in embedding is to use a two-level DWT on the original image. This creates four sub-bands: LL, LH, HL, and HH. After that, Schur factorization and SVD are used to put the watermark’s information into the image’s sub-bands. The inverse process reconstructs the image with the watermark. In the extraction phase, the watermarked image goes through DWT, Schur factorization, and SVD in a manner similar to the first phase. It uses stored keys to correctly recover the embedded watermark. We use evaluation metrics like the Peak Signal-to-Noise Ratio (PSNR), the Structural Similarity Index (SSIM), and the NC to validate the method works.

4.1. Watermark Embedding Schema

The watermark embedding process ensures that the watermark is imperceptible yet resilient against various attacks. This comprehensive process involves several advanced techniques including DWT, Schur matrix factorization, and SVD. Figure 3 presents our watermark embedding scheme in detail.
The first step in the watermark embedding scheme is to use a two-level DWT on the original image. This breaks the picture up into four sub-bands: LL, LH, HL, and HH. DWT gives you a multi-resolution image representation, which makes it easy to work with different frequency components. It captures both big and small details, which makes it easy to add a strong watermark. DWT helps hide the watermark in a way that people cannot see it by focusing on different frequency bands. It also keeps the quality of the image overall. The LL sub-band keeps the most important parts of the image, while the LH, HL, and HH sub-bands capture smaller details. This makes them perfect for adding watermarks that cannot be seen.
In the second step, the Schur matrix factorization is carried out on the LL and HH frequency sub-bands and yields matrices [ J L , K L ] for the LL band and [ J H , K H ] for the HH band. Schur factorization reduces operations on a matrix by factoring it into an orthogonal matrix and an upper triangular matrix. This provides an easier way of handling the matrix characteristics for manipulations and analyses. Using Schur matrix factorization in digital watermarking is of huge benefit as it efficiently processes big matrices while the visual quality of the image is not compromised. This factorization can help to maintain the structure of the image during watermark embedding with minimal distortion while maintaining good robustness.
In the third step, SVD is used on both the K L and K H matrices to break them down into their singular values and the matrices that go with them. When you apply SVD to the watermark image, you obtain matrices U, D, and V. D has the watermark’s unique values. SVD is a strong way to break down a matrix into its most basic parts, capturing the most important parts of the image and the watermark. By changing the singular values, the embedded watermark can withstand different types of image processing attacks, making sure that the watermark embedding is strong and not noticeable, as shown in Equations (16) and (17).
svd ( K L ) = [ U L , D L , V L ]
svd ( K H ) = [ U H , D H , V H ]
In the fourth step, the singular values of the watermark matrix D are then embedded into the singular-value matrices D L and D H obtained from the Schur factorization by modifying D L and D H with the watermark singular values scaled by a factor ( α ). The new matrices are denoted as D L m and D H m . Embedding singular values ensures that the watermark is integrated into the image’s core components, making it less likely to be removed or altered by common image processing operations. This method enhances the robustness and imperceptibility of the watermark, as represented in Equations (18) and (19).
D L m = D α + D L
D H m = D α + D H
The fifth step consists of applying inverse SVD to the transformed D L m and D H m to recover the watermarked matrices K L m and K H m . The inverse SVD operation reconstructs the watermarked matrices, thereby integrating the watermark into the image. This ensures the watermark remains invisible and robust without degrading the quality or integrity of the image. The inverse SVD operation must be performed to properly embed the watermark without introducing any artifacts or distortions in the image, as shown in Equations (20) and (21).
K L m = U L D L m V L
K H m = U H D H m V H
The sixth step applies an inverse Schur factorization to K L m and K H m in order to extract the initialized L L and H H frequencies. Taking the inverse of the Schur factorization guarantees that the adjustments made during watermark embedding are correctly captured in the output image. This operation preserves the structural regularities already inherent in the image while embedding watermarks that are resilient to a host of attacks. It is important to achieve the following reconstruction through the inverse Schur factorization, as shown in Equations (22) and (23):
L L m = J L K L m J L T
H H m = J H K H m J H T
The inverse DWT is applied to combine the modified L L m , LH, HL, and H H m sub-bands to reconstruct the watermarked image. The inverse DWT process reassembles the image from its frequency components, ensuring that the watermark is integrated into the final image. This step guarantees that the watermark is imperceptible to the human eye while providing robust protection against various image processing operations. The inverse DWT process ensures that the watermark remains embedded within the image’s core components, maintaining the image quality and the watermark’s robustness. By following these steps, the proposed watermark embedding scheme achieves a balance between imperceptibility and robustness, ensuring that the watermark remains hidden while providing strong protection against unauthorized use and tampering. Algorithm 1 illustrates the utilized embedding approach in detail.
We have chosen the values of α L and α H : a model-based rationale and protocol. Let W denote the QR watermark with SVD ( W ) = U W D W V W , and let K { K L , K H } represent the Schur triangular factor extracted from the DWT sub-bands ( L L or H H ), where SVD ( K ) = U K D K V K . The embedding process modifies the singular values of K as D K = D K + α · D W using additive SVD-domain modulation; then, it reconstructs the watermarked sub-band via K = U K D K V K . This formulation balances imperceptibility and robustness through the scalar α , controlling watermark energy in each sub-band. To empirically determine optimal values, we evaluated multiple α settings over the range [ 0.01 , 0.20 ] (Figures 6 and 7). Results revealed a stable trade-off region around α L = 0.12 and α H = 0.10 , which preserved high imperceptibility (PSNR > 38  dB, SSIM > 0.99 ) and robustness (NC > 0.94 ) across attacks. Schur decomposition was specifically integrated to enhance numerical stability, enable triangular sparsity-aware factorization, and improve energy compaction over high-frequency DWT sub-bands, thereby strengthening the resilience of the embedded watermark against geometric distortions.
D K ( emb ) = D K + α D W , α { α L , α H } ,
and reconstructing K ( emb ) = U K D K ( emb ) V K (cf. Algorithm 1). The induced perturbation is
Δ K = K ( emb ) K = U K ( α D W ) V K ,
so by unitary invariance of spectral/Frobenius norms,
Δ K 2 = α D W 2 , Δ K F = α D W F .
Therefore, (i) imperceptibility degrades at most linearly with α in the sub-band domain; after inverse Schur/DWT, the per-pixel MSE is bounded by a constant times α 2 D W F 2 (energy preservation of unitary maps), which explains the observed monotone drop of PSNR/SSIM as α increases (Section 4.3). (ii) Robustness improves with α because extraction (Algorithm 2) uses ( D K ( att ) D K ) / α ; the watermark SNR scales as α 2 , while common attacks add approximately α -independent perturbations to K, yielding the empirical NC lift vs. α . We therefore sweep α [ 0.01 , 0.20 ] and select ( α L , α H ) by maximizing a composite utility U ( α ) (Section 4.3), trading off PSNR/SSIM (imperceptibility) against NC (robustness). In our experiments, a high-fidelity setting ( α L = 0.08 , α H = 0.06 ) is used for the per-image tables to showcase invisibility (PSNR 38 39.5  dB; SSIM 0.99 ), while the balanced setting ( α L = 0.12 , α H = 0.10 ) attains mean NC 0.94 on representative attacks with PSNR still > 36  dB (Section 4.3).
Algorithm 1 Embedding Watermark Schema Using DWT, Schur Factorization and SVD
  • Require: Cover image (original image), watermark image, alpha factor for embedding ( α L and α H )
  • Ensure: Watermarked image
  • Step 1: Apply DWT to the cover image
1:
Decompose the cover image using Discrete Wavelet Transform (DWT) to obtain four sub-bands: LL, LH, HL, and HH.
  • Step 2: Apply Schur factorization
2:
for each sub-band in {LL, HH} do
3:
    if sub-band is LL then
4:
         [ J L , K L ] = Schur ( LL )
5:
    else
6:
         [ J H , K H ] = Schur ( HH )
  • Step 3: Apply SVD to K L and K H
7:
for each K in { K L , K H } do
8:
    if K is K L  then
9:
         [ U L , D L , V L ] = SVD ( K L )
10:
    else
11:
         [ U H , D H , V H ] = SVD ( K H )
  • Step 4: Apply SVD to the watermark image
12:
Decompose the watermark image using SVD:
13:
[ U , D , V ] = SVD(watermark_image)
  • Step 5: Embed the singular values of the watermark
14:
for each D in { D L , D H } do
15:
    if D is D L  then
16:
         D L m = D · α L + D L
17:
    else
18:
         D H m = D · α H + D H
  • Step 6: Apply SVD inverse to get the watermarked K L and K H
19:
for each K in { K L , K H } do
20:
    if K is K L  then
21:
         K L m = U L · D L m · V L
22:
    else
23:
         K H m = U H · D H m · V H
  • Step 7: Inverse the Schur factorization to obtain the watermarked frequencies
24:
for each pair ( J , K ) in {( J L , K L m ), ( J H , K H m )} do
25:
    if J is J L and K is K L m  then
26:
         L L m = J L · K L m · J L
27:
    else
28:
         H H m = J H · K H m · J H
  • Step 8: Apply DWT inverse to get the watermarked image
29:
Combine the modified L L m , LH, HL, and H H m sub-bands using the inverse DWT to obtain the final watermarked image.
We chose a Schur in addition to DWT+SVD given a real matrix A (a DWT sub-band); the real Schur factorization A = J K J (orthogonal J, quasi-upper-triangular K) is a unitary similarity transform that preserves A 2 and A F . We embed in K and remap via J:
A ( emb ) = J K + Δ K J ,
with Δ K defined above. This offers three advantages: (1) Energy-preserving control: Because J is orthogonal, the image-domain perturbation norm equals that in the Schur domain, enabling the precise control of injected energy (hence PSNR/SSIM) through α . (2) Structured perturbations with predictable spectra: Operating on the triangular K allows low-rank, diagonally dominated updates; by Mirsky/Weyl inequalities, singular/eigen-spectra vary at most by Δ K 2 = α D W 2 , which bounds distortions and explains stable extraction. (3) Numerical stability and perceptual behavior: The Schur transform is backward stable; concentrating embedding in K (rather than directly in spatial or raw DWT coefficients) reduces ringing/aliasing when mapped back via J, especially in H H , while L L provides photometric stability. Empirically, this hybrid (DWT+Schur+SVD) yields higher NC at comparable PSNR than DWT+SVD alone under histogram equalization, smoothing, and heavy cropping.

Motivation for Embedding Watermarks Separately into the LL and HH Subbands

Let W ( · ) denote a two-level orthonormal DWT of an RGB image (applied per luminance or per channel). Each level yields four sub-bands: LL (approximation), LH (horizontal detail), HL (vertical detail), and HH (diagonal detail). We embed watermarks separately in LL and HH with strengths ( α L , α H ) to exploit complementary properties. Natural images have approximate 1 / f β spectra, so the LL band concentrates most energy with high signal-to-quantization ratios and exhibits stable behavior under mild photometric and geometric operations (illumination shifts, histogram equalization, small rescalings). Injecting a controlled perturbation into LL via our Schur+SVD mechanism is mapped back by orthogonal transforms, preserving Frobenius energy and maintaining imperceptibility for moderate α L , which in turn yields reliable extraction under global operations and compression-like effects. Conversely, HH resides in high spatial frequencies where local-contrast masking is strong; small structured changes are less visible in textured/edge-dense regions. Embedding in HH with a smaller α H leverages this masking while remaining sensitive to tampering that alters fine structures (such as sharpening, resampling, inpainting, local smoothing), thereby improving resilience and manipulation traceability when combined with the LL path.
The directional bands LH and HL are less suitable carriers. Their anisotropy makes them unstable under small rotations and sub-pixel resampling, which redistribute energy between LH and HL and weaken any band-specific payload. Linear smoothing/denoising suppresses LH/HL more strongly than LL and often less predictably than HH, reducing the payload SNR; direction-specific artifacts (such as motion blur along a dominant axis) further degrade one band disproportionately, complicating thresholding and reducing cross-dataset consistency. Empirically, these factors produce less predictable NC across attacks for the same visual budget. Selecting LL+HH therefore balances robustness (LL) with fine-detail responsiveness (HH) while keeping distortion low and control simple through two strengths ( α L , α H ) rather than four. Our sensitivity analysis in Section 5.1 shows that moderate ( α L , α H ) preserves PSNR  30  dB and maintains high NC under representative attacks, supporting this design choice.

4.2. Watermark Extraction

The watermark extraction processes are designed to accurately retrieve the embedded watermark from the watermarked image. This process leverages several advanced techniques, including DWT, Schur matrix factorization, and SVD. Figure 4 presents our watermark extraction scheme in detail.
The first step in the watermark extraction process is to use a two-level DWT on the watermarked image. This breaks the image down into four sub-bands: LLe (low–low), LHe (low–high), HLe (high–low), and HHe (high–high). DWT gives the image a multi-resolution representation, which makes it easy to work with different frequency components. This step is very important because it prepares the image for more processing by separating different frequency bands.
In the second step, we perform the Schur matrix factorization for the matrices in the LLe and HHe frequency sub-bands to obtain [ J L e , K L e ] for the LLe frequency and [ J H e , K H e ] for the HHe frequency. Schur factorization decomposes a matrix into an orthogonal matrix and an upper triangular matrix. This is important for preserving the structural features of the image and for isolating the necessary components required for watermark extraction.
In the third step, SVD is applied to both K L e and K H e matrices, decomposing them into their singular values and corresponding matrices. This step is represented by Equations (24) and (25).
svd ( K L e ) = [ U L e , D L e , V L e ]
svd ( K H e ) = [ U H e , D H e , V H e ]
In the fourth step, the watermark is taken out of the watermarked image using the singular values that were saved during the embedding process ( D L and D H ). To obtain the singular values of the extracted watermark, you subtract the singular values of the original image from the singular values of the watermarked image. This step makes sure that the watermark is retrieved correctly without changing the main parts of the image. These Equations (26) and (27) show this step.
D extracted watermark = D L e D L ( for low frequency )
D extracted watermark = D H e D H ( for high frequency )
The inverse SVD is then applied in the fifth step on the extracted singular values to recover the watermark. This process ensures that the embedded watermark is recovered faithfully and remains perceptually strong. The inverse SVD operation is very important to ensure that the watermark is retrieved accurately and without any visible artifacts or distortions. The recovered watermark is restored by the inverse SVD. This process guarantees that the watermark is correctly recovered and can be used for verification, etc. It is clear from the above description that after applying these procedures, when extracting the watermark from the watermarked image according to a proposed watermark extraction scheme, the watermark can be accurately and robustly extracted in its entirety while ensuring that neither the quality of the image nor the quality of the watermark is degraded. Algorithm 2 shows the used extraction method in detail.

4.3. Evaluation Metrics:

This section presents the evaluation metrics used to assess the performance of watermarking algorithms in terms of imperceptibility, relevance, and similarity. The following metrics are employed in this study: Peak Signal-to-Noise Ratio ( P S N R ) , Correlation Coefficient ( N C ) , and Structural Similarity Index ( S S I M ) [17].
  • Peak Signal-to-Noise Ratio ( P S N R ) : P S N R is a widely used metric to measure the quality of watermarked images by evaluating the visibility of the embedded watermark [30]. It is calculated using the following formula:
    P S N R = 10 log ( 255 2 M S E )
    where M S E represents the Mean Squared Error between the pixel values of the original cover image and the watermarked image. In this formula, I i j and W i j represent the pixel values of the cover and watermarked media of size x and y, respectively. For watermarking algorithms to be considered acceptable, they must provide a P S N R value greater than 30 dB.
  • Correlation Coefficient ( N C ) : The Correlation Coefficient (NC) measures the similarity between the extracted watermark and the original embedded watermark [31]. It provides a numeric indication of their relevance to each other. NC is calculated as follows:
    N C = i = 1 x j = 1 y ( W org i j × W rec i j ) i = 1 x j = 1 y ( W org i j × W org i j )
    where the following apply:
    N C : Correlation coefficient ; W org i j : weight associated with the original data at position ( i , j ) ; W rec i j : weight associated with the reconstructed data at position ( i , j ) ; x : number of rows in the matrices W org and W rec ; y : number of columns in the matrices W org and W rec .
  • Structural Similarity Index ( S S I M ) : The Structural Similarity Index ( S S I M ) is used to assess the similarity between the original and watermarked images. It provides a measure of the structural changes caused by the watermarking process [32]. The S S I M is calculated using the following equation:
    S S I M = f ( a ( m , n ) b ( m , n ) c ( m , n ) )
    In this equation, a ( m , n ) represents the luminosity function, b ( m , n ) represents the deformation amplitude delta between the maximum and minimum values, and c ( m , n ) represents the structure comparison function. The SSIM value ranges from 1 to −1 with a value closer to 1 indicating a higher similarity between the original and watermarked images.
Related work on information stability under color-space conversion supports our embedding strategy: the color-conversion steganography in [33] shows that carefully designed representation changes can preserve embedded information quality (PSNR/SSIM maintained under color transforms), which aligns with our transform-stable DWT–SVD–Schur pipeline with LL/HH control.

4.4. Embedding-Strength ( α ) Sensitivity Protocol

We evaluate the impact of the embedding strength α on both imperceptibility and robustness. For each DWT sub-band used for embedding (LL and HH), we sweep α [ 0.01 , 0.20 ] with a step size of 0.01 across the test images. For every α , we (i) generate the watermarked image and compute imperceptibility metrics on the clean output: Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity (SSIM); (ii) subject the watermarked image to standard distortions (histogram equalization, salt and pepper 5 % , smoothing, ripple, and 50 % cropping), extract the watermark, and compute the normalized correlation (NC) between extracted and original watermarks. QR scannability is also recorded (success/fail) on clean outputs.
To summarize the trade-off, we define a composite utility:
U ( α ) = 0.3 PSNR ^ ( α ) + 0.2 SSIM ^ ( α ) + 0.5 NC ^ ( α ) ,
where ( · ) ^ denotes min–max normalization to [ 0 , 1 ] over the sweep. The recommended setting α is chosen to maximize U ( α ) subject to the visibility constraint PSNR ( α ) 30  dB and 100 % QR scannability on clean images. Unless otherwise stated, results are averaged across images; for single-curve summaries per attack, we report dataset means, and for conservative summaries, we additionally consider the worst-case NC.
Algorithm 2 Extracting Watermark Schema Using DWT, Schur Factorization and SVD.
  • Require: Original image, watermarked image, alpha factors for extraction ( α L and α H )
  • Ensure: Extracted watermark image
  • Step 1: Apply DWT to both the original image and the watermarked image
1:
Decompose both the original and watermarked images using Discrete Wavelet Transform (DWT) to obtain four sub-bands each: LL, LH, HL, HH for the original image and LLe, LHe, HLe, HHe for the watermarked image.
  • Step 2: Apply Schur factorization
2:
for each sub-band in {LL, HH} for the original image and {LLe, HHe} for the watermarked image do
3:
    if sub-band is LL or LLe then
4:
         [ J L , K L ] = Schur ( LL )
5:
         [ J L e , K L e ] = Schur ( LLe )
6:
    else
7:
         [ J H , K H ] = Schur ( HH )
8:
         [ J H e , K H e ] = Schur ( HHe )
  • Step 3: Apply SVD to K L , K H , K L e , and K H e
9:
for each K in { K L , K H , K L e , K H e } do
10:
    if K is K L or K L e  then
11:
         [ U L , D L , V L ] = SVD ( K L )
12:
         [ U L e , D L e , V L e ] = SVD ( K L e )
13:
    else
14:
         [ U H , D H , V H ] = SVD ( K H )
15:
         [ U H e , D H e , V H e ] = SVD ( K H e )
  • Step 4: Derive the singular values of the extracted watermark image
16:
Compute the singular values of the extracted watermark image by subtracting the singular values of the original image from those of the watermarked image and dividing by the alpha factor:
e x t r a c t e d L = D L e D L α L
e x t r a c t e d H = D H e D H α H
  • Step 5: Reconstruct the extracted watermark image
17:
Perform the inverse SVD on the extracted singular values matrix using the matrices U and V saved during the watermark embedding process to reconstruct the watermark image:
w a t e r m a r k L = U L · e x t r a c t e d L · V L
w a t e r m a r k H = U H · e x t r a c t e d H · V H

5. Results and Discussion

In this section, we present the results of embedding the watermark and apply different attacks to evaluate how robust it is.
As it can be clearly seen from Figure 5, the watermark is completely invisible, achieving a similarity index of 100 % across all three layers of the R G B image, thus achieving the very first goal of watermarking, which is the imperceptibility of the embedded watermark. The Structural Similarity Index is 99.96 % , and both of the values used for comparison were calculated in Matlab. The table below demonstrates the values needed to compare the images with one another, determining how well the proposed method performs.
Table 2 shows the resilience of the proposed watermarking method under a variety of common image attacks for the Lena image. The results demonstrate that the watermark, embedded in the form of a QR code, retains its scannability and integrity despite these manipulations. This is an important aspect, as it highlights the practical utility of the proposed method in real-world applications where digital images might undergo various forms of distortion. The NC values for the HH and LL sub-band under histogram equalization are 0.9873 and 0.8729, indicating that the watermark’s integrity is maintained despite changes in image contrast. The high NC value in the HH sub-band suggests that the watermark remains robust against such contrast adjustments. Notably, the QR code embedded as a watermark remains fully scannable, demonstrating the method’s effectiveness in preserving watermark recoverability even after contrast manipulation.
The method shows a small drop in performance as the noise level increases under salt-and-pepper noise. The NC values for the HH sub-band stay pretty high, at 0.9698 for 2% noise and 0.9066 for 5% noise. The LL sub-band, on the other hand, shows a bigger drop, but the QR code watermark can still be scanned even when there is a lot of noise, showing that the technique can handle high-frequency noise well. The ripple attack, which usually causes spatial distortions, gives an NC value of 0.9874 for the HH sub-band and 0.7411 for the LL sub-band. Despite these changes, the QR code can still be scanned, showing how strong the watermarking method is against geometric changes that make other methods less effective. The proposed method, which uses a mix of DWT, SVD, and Schur matrix factorization, performs well under cropping and smoothing attacks. The smoothing attack, which makes image details less clear, does not have a big effect on the NC values, which are 0.9787 for HH and 0.8469 for LL. The QR code can still be scanned. The method’s ability to put the watermark in the frequency domain using DWT, along with the strong nature of SVD and the structural preservation offered by Schur matrix factorization, makes it robust. The NC values remain high across both sub-bands even when a lot of the image was cut out. After cropping the top 50%, the NC values are 0.9335 for HH and 0.9787 for LL. The results clearly show that the proposed watermark scheme works because it keeps high NC values and a scannable QR code even after substantial changes, supporting proof of ownership by verifying that the digital image is authentic and belongs to the right person.
Table 3 illustrates the robustness of the proposed watermarking technique when applied to a different image, confirming its effectiveness across various types of attacks. The NC values for the HH and LL sub-bands following histogram equalization are 0.9879 and 0.9385, which are consistent with the outcomes observed in the first table. This consistency underscores the ability of the proposed method to preserve the watermark’s integrity even when the image undergoes significant contrast changes. Notably, the QR code remains scannable, reinforcing the method’s capability to maintain watermark functionality across diverse image types and contrast scenarios, ensuring reliable content protection. Under salt-and-pepper noise, the method demonstrates a slight decrease in performance as noise intensity increases. The NC value for the HH sub-band drops from 0.97148 at 2% noise to 0.90419 at 5% noise with a more significant reduction observed in the LL sub-band. The QR code remains fully scannable, mirroring the results from the first table. This robustness across different images confirms the method’s resilience against high-frequency noise, indicating that the watermarking approach is effective and adaptable to various image characteristics. Under the ripple attack, the QR code’s scannability is preserved, with NC values of 0.98054 for HH and 0.7854 for LL, demonstrating the technique’s robustness against geometric distortions that challenge conventional watermarking methods.
The method’s performance under smoothing and cropping attacks further enhances its versatility. In the case of the smoothing attack, the NC values are 0.9735 for HH and 0.623 for LL, with the QR code remaining scannable in the HH sub-band but not in the LL sub-band, indicating that image content can influence the method’s effectiveness. In cropping attacks, the method exhibits consistent strength, maintaining high NC values across both sub-bands, and ensuring that the QR code remains scannable even after substantial portions of the image are removed. These results, compared with those from the first table, reaffirm the method’s reliability and demonstrate that the combination of DWT, SVD, and Schur matrix factorization provides a robust watermarking solution capable of withstanding various image manipulations across different contexts.
Table 4 shows that the proposed watermarking method remains strong when used on a new image. This shows that the method is consistent and works well in a variety of situations. The NC value for the HH and LL sub-bands are 0.9949 and 0.9846, which are a little higher than in the previous table. This shows that the watermark’s integrity is very well preserved. Even when the image contrast is changed a lot, the QR code is still fully scannable. This shows that the method works to keep the watermark intact and functional. When exposed to salt-and-pepper noise at 2% and 5%, the method still works well, but the NC values go down a little as the noise level goes up. The HH sub-band goes down to 0.9812 at 5% noise, and the LL sub-band goes down to 0.9540. However, the QR code is still fully scannable, which shows that the method works well even with high-frequency noise.
The ripple and smoothing attacks still test the robustness of the method with NC values of 0.9747 for the HH sub-band and 0.8685 for the LL sub-band in the case of the ripple attack. Although the LL sub-band experiences a more significant drop, the QR code remains scannable, demonstrating the method’s stability against geometric distortions that typically challenge watermarking techniques. For the smoothing attack, NC values of 0.9750 for HH and 0.9530 for LL are observed, indicating that the watermark remains detectable and operational even after blurring. The continued ability to scan the QR code in these scenarios further supports the effectiveness of combining DWT, SVD, and Schur matrix factorization to improve the watermark’s resilience against a range of image distortions.
The method also works well against cropping attacks. The NC values stay high in both sub-bands, and the QR code can still be scanned even after a large part of the image is cut out. The NC values are 0.9567 for HH and 0.8984 for LL after cropping the top 50% of the image. After cropping the left 50%, the values are 0.96507 for HH and 0.9902 for LL. These results show that the suggested method does a good job of protecting the watermark. This means that even when an image is changed a lot, the QR code still works for verification and authentication. The watermarking method’s consistent performance across different images and attack types shows that it is reliable and adaptable, making it useful for protecting digital content in a variety of situations.
Table 5 continues to show that the proposed watermarking method is strong and works well even on a different image. The results show that the method keeps the watermark intact even when it is attacked in different ways, and the QR code can still be scanned at all times. When histogram equalization is used, the NC values are 0.9440 for the HH sub-band and 0.9861 for the LL sub-band. The NC value for the HH sub-band is a little lower than in previous tables, but the QR code remains scannable, which shows that the method can keep the watermark functional even when the contrast is changed significantly. The method still works well when there is 2% or 5% salt-and-pepper noise with NC values for the HH sub-band of 0.9711 and 0.9579. The LL sub-band drops a little, but the QR code is still fully scannable, showing that the method can handle high-frequency noise. The ripple attack, which messes up spatial properties, gives HH a value of 0.96063 and LL a value of 0.8847. The LL sub-band is less robust, but the QR code can still be scanned, showing that the method is strong against geometric distortions that can be hard for traditional watermarking methods. Our method also works well against smoothing and cropping attacks. The smoothing attack gives NC values of 0.9670 for HH and 0.9621 for LL, which means that blurring does not have much of an effect on the watermark. In these cases, the QR code is always able to scan, which shows how well the method preserves the watermark even when the image is distorted in different ways.

5.1. Sensitivity Results for α and Discussion

To validate and justify the choice of the embedding strengths α L and α H , a parametric sensitivity analysis was conducted over α { 0.01 , 0.05 , 0.10 , 0.15 , 0.20 } for LL and HH sub-bands. Figure 6 reports the dataset-average imperceptibility behavior: as α increases, SSIM decreases gradually from 0.990 at α = 0.01 to 0.938 at α = 0.20 , while the corresponding average PSNR drops from ≈41.2 dB to ≈33.0 dB. Nevertheless, even at α = 0.20 , the PSNR remains above the commonly accepted visibility threshold of 30 dB. Figure 7 shows that robustness improves with α , especially under geometric and smoothing attacks. For instance, the normalized correlation (NC) after histogram equalization increases from 0.885 ( α = 0.01 ) to 0.978 ( α = 0.20 ). Beyond α 0.15 , robustness gain begins to saturate. Figure 8 plots the utility score defined in Equation (31), combining imperceptibility and robustness. A broad plateau appears over α [ 0.10 , 0.15 ] , indicating that multiple α choices achieve near-optimal trade-offs.
In the four benchmark example images (Table 2, Table 3, Table 4 and Table 5), a high-fidelity operating point, ( α L = 0.08 , α H = 0.06 ) , was chosen to maximize invisibility in the visual results. This yields the strong imperceptibility reported: PSNR 47 –48 dB and SSIM 0.990 on the clean watermarked images while achieving excellent preservation of watermark structure (NC close to 1.0 under most attacks). Table 6 summarizes recommended operating points. For robustness-critical applications such as cropping and ripple distortions, ( α L = 0.12 , α H = 0.10 ) provides stronger resilience with mean NC 0.94 (dataset average) while still ensuring strong perceptual transparency. All recommended operating points preserve 100% QR scannability prior to attack.
In summary, α controls a predictable imperceptibility–robustness trade-off. The LL sub-band tolerates a slightly larger α than HH due to its lower sensitivity to high-frequency distortions. The adopted operating point ( α L = 0.08 ,   α H = 0.06 ) achieves the high-quality results reported in Table 2, Table 3, Table 4 and Table 5, whereas ( α L = 0.12 ,   α H = 0.10 ) is recommended when robustness must be prioritized.

6. Comparison with Related Work

The comparative analysis of watermarking techniques presented in Table 7 underscores the advancements and distinction of our proposed methodology relative to existing approaches. Sharma et al. (2020) [15] introduced a technique utilizing DWT, SVD, and ABC to embed a scrambled color watermark into the RGB channels of the host image, aiming to enhance multimedia protection against unauthorized copying. Their method exhibits diminished robustness under histogram equalization, with an NC value of 0.8931, revealing a vulnerability that our work effectively overcomes. Moreover, their PSNR of 42.78 dB remains noticeably lower than the invisibility achieved by our approach. Our method demonstrates superior robustness across this scenario, achieving an NC value of 0.9949 under histogram equalization and preserving perceptual quality with PSNR ≈ 43 dB and SSIM ≥ 0.99. Anand and Singh (2020) [16] extended watermarking to medical images with a multi-watermark approach leveraging DWT, SVD, and Chaotic-LZW techniques. While their work makes significant strides in enhancing security for telehealth services, the NC value of 0.8716 under histogram equalization and 0.7751 under salt-and-pepper noise indicates room for improvement. Their PSNR (41.32 dB) also reflects lower imperceptibility compared to our implementation. Our method consistently maintains NC ≥ 0.95 under most distortions and yields among the highest perceptual quality scores in Table 7.
Saritas and Ozturk (2023) [17] and Rahardi et al. (2022) [18] contribute to the watermarking field by focusing on robustness in high-noise environments and preventing unauthorized image use on social media. However, both methods encounter limitations under stronger attacks. For instance, Saritas and Ozturk’s method, which uses CT and DCT in the YCbCr color space, obtains an NC value of 0.9020 for salt-and-pepper noise, but under 50% cropping, performance drops sharply (NC ≈ 0.707–0.709). Rahardi et al. also demonstrate resilience to common attacks, reporting NC values of 0.7667 for salt-and-pepper noise and 0.7913 for ripple. These NC values remain significantly lower than ours, which reach up to 0.9995 under similar cropping conditions while retaining QR code scannability at 100%. The works of Altay and Ulutas (2024) [21] and Yuan et al. (2024) [22] further illustrate the evolving landscape of watermarking techniques. Altay and Ulutas embed biometric data using QR and Schur decomposition within the RIDWT domain, achieving an NC value of 0.911 under salt-and-pepper noise and a PSNR of 41.56 dB. Yuan et al., focusing on medical image security using DWT–DCT and perceptual hashing, show moderate robustness with NC values as low as 0.72 under 30% cropping and a relatively low PSNR of 35.42 dB. Although both methods contribute specialty-driven improvements, they fall short when compared with our comprehensive robustness across diverse distortions (NC = 0.9846 for 2% salt-and-pepper, NC = 0.9670 for smoothing) and our consistently superior invisibility (PSNR ≈ 43 dB and SSIM ≥ 0.99).

7. Conclusions

In this study, we presented a resilient watermarking method that integrates DWT, SVD, and Schur matrix factorization to safeguard digital images. Our method showed strong resistance to a wide range of attacks, including histogram equalization, salt-and-pepper noise, ripple distortions, smoothing, and cropping. It consistently kept the QR code’s integrity and scannability across multiple images. This strong performance sets a new standard for digital copyright protection, going beyond what is currently available. In the future, we will work on making the technique more efficient for real-time applications like video streaming and interactive media, and we will also extend it to video watermarking and other types of multimedia content. We also plan to look into how machine learning can be used to improve the watermark embedding and extraction processes. This will make the method even more resistant to sophisticated attacks and make it a comprehensive tool for managing digital rights in an increasingly digital world.

Author Contributions

Conceptualization, M.A. and B.S.K.; Methodology, M.A. and B.S.K.; Software, M.A.; Validation, I.A.-A. and O.A.; Formal Analysis, B.S.K.; Investigation, L.A.A. and B.F.A.; Resources, W.A.; Data Curation, I.A.-A. and O.A.; Writing—Original Draft Preparation, M.A.; Writing—Review and Editing, B.S.K. and M.A.; Visualization, M.A.; Supervision, B.S.K.; Project Administration, M.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Mwanje, M.D.; Kaiwartya, O.; Aljaidi, M.; Cao, Y.; Kumar, S.; Jha, D.N.; Naser, A.; Lloret, J. Cyber security analysis of connected vehicles. IET Intell. Transp. Syst. 2024, 18, 1175–1195. [Google Scholar] [CrossRef]
  2. Zhou, Z.; Wang, Y.; Wu, Q.M.J.; Yang, C.-N.; Sun, X. Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 2016, 12, 48–63. [Google Scholar] [CrossRef]
  3. Liu, Z.; Liu, T.; Gibbon, D.C.; Shahraray, B. Effective and scalable video copy detection. In Proceedings of the International Conference on Multimedia Information Retrieval, Philadelphia, PA, USA, 29–31 March 2010; pp. 119–128. [Google Scholar]
  4. Qiu, Y.; Ying, Q.; Lin, X.; Zhang, Y.; Qian, Z. Reversible data hiding in encrypted images with dual data embedding. IEEE Access 2020, 8, 23209–23220. [Google Scholar] [CrossRef]
  5. Gomathisankaran, M.; Tyagi, A.; Namuduri, K. HORNS: A homomorphic encryption scheme for cloud computing using residue number system. In Proceedings of the 2011 45th Annual Conference on Information Sciences and Systems, Baltimore, MD, USA, 23–25 March 2011; pp. 1–5. [Google Scholar]
  6. Su, Q.; Wang, G.; Jia, S.; Zhang, X.; Liu, Q.; Liu, X. Embedding color image watermark in color image based on two-level DCT. Signal Image Video Process. 2015, 9, 991–1007. [Google Scholar] [CrossRef]
  7. Su, Q.; Chen, B. Robust color image watermarking technique in the spatial domain. Soft Comput. 2018, 22, 91–106. [Google Scholar] [CrossRef]
  8. Abraham, J.; Paul, V. An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ.—Comput. Inf. Sci. 2019, 31, 125–133. [Google Scholar] [CrossRef]
  9. Roy, S.; Pal, A.K. A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU—Int. J. Electron. Commun. 2017, 72, 149–161. [Google Scholar] [CrossRef]
  10. Parah, S.A.; Sheikh, J.A.; Loan, N.A.; Bhat, G.M. Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit. Signal Process. 2016, 53, 11–24. [Google Scholar] [CrossRef]
  11. Singh, R.; Ashok, A. An optimized robust watermarking technique using CKGSA in frequency domain. J. Inf. Secur. Appl. 2021, 58, 102734. [Google Scholar] [CrossRef]
  12. Moosazadeh, M.; Ekbatanifard, G. A new DCT-based robust image watermarking method using teaching-learning-based optimization. J. Inf. Secur. Appl. 2019, 47, 28–38. [Google Scholar] [CrossRef]
  13. Abdallah, E.E.; Hamza, A.B.; Bhattacharya, P. A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition. In Proceedings of the 18th International Conference on Pattern Recognition (ICPR’06), Hong Kong, China, 20–24 August 2006; Volume 3, pp. 673–676. [Google Scholar]
  14. Al-Aiash, I.; Alquran, R.; AlJamal, M.; Alsarhan, A.; Al-Fraihat, D.; Aljaidi, M. Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing. Multimed. Tools Appl. 2024, 84, 1–36. [Google Scholar] [CrossRef]
  15. Sharma, S.; Sharma, H.; Sharma, J.B.; Poonia, R.C. A secure and robust color image watermarking using nature-inspired intelligence. Neural Comput. Appl. 2021, 35, 1–19. [Google Scholar] [CrossRef]
  16. Anand, A.; Singh, A.K. An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 2020, 152, 72–80. [Google Scholar] [CrossRef]
  17. Saritas, O.F.; Ozturk, S. A blind CT and DCT based robust color image watermarking method. Multimed. Tools Appl. 2023, 82, 15475–15491. [Google Scholar] [CrossRef]
  18. Rahardi, M.; Abdulloh, F.F.; Putra, W.S. A blind robust image watermarking on selected DCT coefficients for copyright protection. Int. J. Adv. Comput. Sci. Appl. 2022, 13, 1–8. [Google Scholar] [CrossRef]
  19. Han, B.; Du, J.; Jia, Y.; Zhu, H. Zero-watermarking algorithm for medical image based on VGG19 deep convolution neural network. J. Healthc. Eng. 2021, 2021, 1–13. [Google Scholar] [CrossRef]
  20. Abodena, O. A robust blind grayscale image watermarking technique based on Schur decomposition and entropy analysis. Univ. Gharyan J. 2024, 28, 471–493. [Google Scholar]
  21. Altay, S.Y.; Ulutas, G. Biometric watermarking schemes based on QR decomposition and Schur decomposition in the RIDWT domain. Signal Image Video Process. 2024, 18, 2783–2798. [Google Scholar] [CrossRef]
  22. Yuan, Y.; Li, J.; Liu, J.; Bhatti, U.A.; Liu, Z.; Chen, Y.-W. Robust zero-watermarking algorithm based on discrete wavelet transform and DAISY descriptors for encrypted medical image. CAAI Trans. Intell. Technol. 2024, 9, 40–53. [Google Scholar] [CrossRef]
  23. Mareen, H.; Antchougov, L.; Van Wallendael, G.; Lambert, P. Blind deep-learning-based image watermarking robust against geometric transformations. In Proceedings of the 2024 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 6–8 January 2024; pp. 1–2. [Google Scholar]
  24. Zhang, L.; Liu, X.; Martin, A.V.; Bearfield, C.X.; Brun, Y.; Guan, H. Attack-resilient image watermarking using stable diffusion. Adv. Neural Inf. Process. Syst. 2025, 37, 38480–38507. [Google Scholar]
  25. Cheng, X.; Wang, H.; Luo, X.; Guan, Q.; Ma, B.; Wang, J. Re-cropping framework: A grid recovery method for quantization step estimation in non-aligned recompressed images. IEEE Trans. Circuits Syst. Video Technol. 2025, early access. [Google Scholar] [CrossRef]
  26. Gao, S.; Zhang, Z.; Li, Q.; Ding, S.; Iu, H.H.-C.; Cao, Y.; Xu, X.; Wang, C.; Mou, J. Encrypt a story: A video segment encryption method based on the discrete sinusoidal memristive Rulkov neuron. IEEE Trans. Dependable Secure Comput. 2025, 22, 8011–8024. [Google Scholar] [CrossRef]
  27. Yahya, Z.; Hassan, M.; Younis, S.; Shafique, M. Probabilistic analysis of targeted attacks using transform-domain adversarial examples. IEEE Access 2020, 8, 33855–33869. [Google Scholar] [CrossRef]
  28. Tiwari, A.; Srivastava, V.K. Image watermarking techniques based on Schur decomposition and various image invariant moments: A review. Multimed. Tools Appl. 2024, 83, 16447–16483. [Google Scholar] [CrossRef]
  29. Balasamy, K.; Suganyadevi, S. A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed. Tools Appl. 2021, 80, 7167–7186. [Google Scholar]
  30. Abdullah, R.M. Hide digital images in encrypted image files after two stages. J. Electr. Syst. 2024, 20, 960–970. [Google Scholar] [CrossRef]
  31. Magdy, M.; Ghali, N.I.; Ghoniemy, S.; Hosny, K.M. Multiple zero-watermarking of medical images for internet of medical things. IEEE Access 2022, 10, 38821–38831. [Google Scholar] [CrossRef]
  32. Utomo, D.W.; Sari, C.A.; Isinkaye, F.O. Quality improvement for invisible watermarking using singular value decomposition and discrete cosine transform. MATRIK J. Manaj. Tek. Inform. Rekayasa Komput. 2024, 23, 509–518. [Google Scholar] [CrossRef]
  33. Li, Q.; Ma, B.; Wang, X.; Wang, C.; Gao, S. Image steganography in color conversion. IEEE Trans. Circuits Syst. II Express Briefs 2023, 71, 106–110. [Google Scholar] [CrossRef]
Figure 1. DWT sub-bands of the original image.
Figure 1. DWT sub-bands of the original image.
Cryptography 10 00004 g001
Figure 2. Detailed process flow of watermark embedding, extraction, and evaluation methodology.
Figure 2. Detailed process flow of watermark embedding, extraction, and evaluation methodology.
Cryptography 10 00004 g002
Figure 3. Watermark embedding scheme.
Figure 3. Watermark embedding scheme.
Cryptography 10 00004 g003
Figure 4. Watermark extraction scheme.
Figure 4. Watermark extraction scheme.
Cryptography 10 00004 g004
Figure 5. Original image and watermarked image.
Figure 5. Original image and watermarked image.
Cryptography 10 00004 g005
Figure 6. Imperceptibility vs. α (dataset average). True PSNRs: { 41.2 , 38.7 , 36.1 , 34.2 , 33.0 } dB.
Figure 6. Imperceptibility vs. α (dataset average). True PSNRs: { 41.2 , 38.7 , 36.1 , 34.2 , 33.0 } dB.
Cryptography 10 00004 g006
Figure 7. Robustness vs. α (dataset average).
Figure 7. Robustness vs. α (dataset average).
Cryptography 10 00004 g007
Figure 8. Composite utility per Equation (31).
Figure 8. Composite utility per Equation (31).
Cryptography 10 00004 g008
Table 1. Schur vs. SVD in transform-domain watermarking (the proposed method exploits both).
Table 1. Schur vs. SVD in transform-domain watermarking (the proposed method exploits both).
AspectSchur Decomposition ( A = Q T Q )SVD ( A = U Σ V )
Energy behaviorUnitary similarity preserves · F ; stable back-projection via Q ( · ) Q Singular values concentrate energy; minimal-distortion control via Σ
Structural viewTriangular T encodes (quasi-)eigen structure and couplings Σ gives global energy spectrum; U , V give orthonormal bases
Embedding handleModify selected diagonal blocks/off-diagonals of TModify Σ (and optionally U , V ) with fine strength control
Robustness leverCoherent redistribution by Q aids survival under filtering/equalizationEnergy-aware embedding resists noise/compression at fixed α
Numerical traitsQR-based; orthogonal Q yields backward stabilityBidiagonalization+QR; backward stable, optimal low-rank properties
Role in our methodProvides stable conduit and structure alignmentProvides perceptual optimality and tunable strength
Table 2. Results of Lena Image Against Variety Types of Cyber Attacks.
Table 2. Results of Lena Image Against Variety Types of Cyber Attacks.
Imperceptibility (Original vs. Watermarked): PSNR = 47.91 dB, SSIM = 0.9954
Attack TypeWatermarked ImageWatermarked Image After AttackExtracted Watermark from HHExtracted Watermark from LLNC for HHNC for LL
Histogram EqualizationCryptography 10 00004 i001Cryptography 10 00004 i002Cryptography 10 00004 i003Cryptography 10 00004 i0040.98730.8729
Salt and Pepper 2%Cryptography 10 00004 i005Cryptography 10 00004 i006Cryptography 10 00004 i007Cryptography 10 00004 i0080.96980.8943
Salt and Pepper 5%Cryptography 10 00004 i009Cryptography 10 00004 i010Cryptography 10 00004 i011Cryptography 10 00004 i0120.90660.7469
Ripple AttackCryptography 10 00004 i013Cryptography 10 00004 i014Cryptography 10 00004 i015Cryptography 10 00004 i0160.98740.7411
Smoothing AttackCryptography 10 00004 i017Cryptography 10 00004 i018Cryptography 10 00004 i019Cryptography 10 00004 i0200.97870.8469
Cropping Top 50%Cryptography 10 00004 i021Cryptography 10 00004 i022Cryptography 10 00004 i023Cryptography 10 00004 i0240.93350.9787
Cropping the Left 50%Cryptography 10 00004 i025Cryptography 10 00004 i026Cryptography 10 00004 i027Cryptography 10 00004 i0280.942820.9904
Cropping the Right 50%Cryptography 10 00004 i029Cryptography 10 00004 i030Cryptography 10 00004 i031Cryptography 10 00004 i0320.96220.9771
Table 3. Results of monkey image against variety types of cyber attacks.
Table 3. Results of monkey image against variety types of cyber attacks.
Imperceptibility (Original vs. Watermarked): PSNR = 47.12 dB, SSIM = 0.9987
Attack TypeWatermarked ImageWatermarked Image After AttackExtracted Watermark from HHExtracted Watermark from LLNC for HHNC for LL
Histogram EqualizationCryptography 10 00004 i033Cryptography 10 00004 i034Cryptography 10 00004 i035Cryptography 10 00004 i0360.98790.9385
Salt and Pepper 2%Cryptography 10 00004 i037Cryptography 10 00004 i038Cryptography 10 00004 i039Cryptography 10 00004 i0400.971480.88557
Salt and Pepper 5%Cryptography 10 00004 i041Cryptography 10 00004 i042Cryptography 10 00004 i043Cryptography 10 00004 i0440.904190.7569
Ripple AttackCryptography 10 00004 i045Cryptography 10 00004 i046Cryptography 10 00004 i047Cryptography 10 00004 i0480.980540.7854
Smoothing AttackCryptography 10 00004 i049Cryptography 10 00004 i050Cryptography 10 00004 i051Cryptography 10 00004 i0520.97350.623
Cropping Top 50%Cryptography 10 00004 i053Cryptography 10 00004 i054Cryptography 10 00004 i055Cryptography 10 00004 i0560.94350.9768
Cropping the Left 50%Cryptography 10 00004 i057Cryptography 10 00004 i058Cryptography 10 00004 i059Cryptography 10 00004 i0600.94270.9538
Cropping the Right 50%Cryptography 10 00004 i061Cryptography 10 00004 i062Cryptography 10 00004 i063Cryptography 10 00004 i0640.96630.9752
Table 4. Results of peppers image against a variety of types of cyber attacks.
Table 4. Results of peppers image against a variety of types of cyber attacks.
Imperceptibility (Original vs. Watermarked): PSNR = 47.45 dB, SSIM = 0.9904
Attack TypeWatermarked ImageWatermarked Image After AttackExtracted Watermark from HHExtracted Watermark from LLNC for HHNC for LL
Histogram EqualizationCryptography 10 00004 i065Cryptography 10 00004 i066Cryptography 10 00004 i067Cryptography 10 00004 i0680.99490.9846
Salt and Pepper 2%Cryptography 10 00004 i069Cryptography 10 00004 i070Cryptography 10 00004 i071Cryptography 10 00004 i0720.98480.9621
Salt and Pepper 5%Cryptography 10 00004 i073Cryptography 10 00004 i074Cryptography 10 00004 i075Cryptography 10 00004 i0760.98120.9540
Ripple AttackCryptography 10 00004 i077Cryptography 10 00004 i078Cryptography 10 00004 i079Cryptography 10 00004 i0800.97470.8685
Smoothing AttackCryptography 10 00004 i081Cryptography 10 00004 i082Cryptography 10 00004 i083Cryptography 10 00004 i0840.97500.9530
Cropping Top 50%Cryptography 10 00004 i085Cryptography 10 00004 i086Cryptography 10 00004 i087Cryptography 10 00004 i0880.95670.8984
Cropping the Left 50%Cryptography 10 00004 i089Cryptography 10 00004 i090Cryptography 10 00004 i091Cryptography 10 00004 i0920.965070.9902
Cropping the Right 50%Cryptography 10 00004 i093Cryptography 10 00004 i094Cryptography 10 00004 i095Cryptography 10 00004 i0960.95480.9871
Table 5. Results of car and house images against a variety of types of cyber attacks.
Table 5. Results of car and house images against a variety of types of cyber attacks.
Imperceptibility (Original vs. Watermarked): PSNR = 47.37 dB, SSIM = 0.9920
Attack TypeWatermarked ImageWatermarked Image After AttackExtracted Watermark from HHExtracted Watermark from LLNC for HHNC for LL
Histogram EqualizationCryptography 10 00004 i097Cryptography 10 00004 i098Cryptography 10 00004 i099Cryptography 10 00004 i1000.94400.9861
Salt and Pepper 2%Cryptography 10 00004 i101Cryptography 10 00004 i102Cryptography 10 00004 i103Cryptography 10 00004 i1040.97110.9614
Salt and Pepper 5%Cryptography 10 00004 i105Cryptography 10 00004 i106Cryptography 10 00004 i107Cryptography 10 00004 i1080.95790.9450
Ripple AttackCryptography 10 00004 i109Cryptography 10 00004 i110Cryptography 10 00004 i111Cryptography 10 00004 i1120.960630.8847
Smoothing AttackCryptography 10 00004 i113Cryptography 10 00004 i114Cryptography 10 00004 i115Cryptography 10 00004 i1160.96700.9621
Cropping Top 50%Cryptography 10 00004 i117Cryptography 10 00004 i118Cryptography 10 00004 i119Cryptography 10 00004 i1200.942790.9679
Cropping the Left 50%Cryptography 10 00004 i121Cryptography 10 00004 i122Cryptography 10 00004 i123Cryptography 10 00004 i1240.95330.9995
Cropping the Right 50%Cryptography 10 00004 i125Cryptography 10 00004 i126Cryptography 10 00004 i127Cryptography 10 00004 i1280.93460.9728
Table 6. Recommended α by sub-band and application scenario.
Table 6. Recommended α by sub-band and application scenario.
Scenario α L α H Notes
Clean (highest imperceptibility)0.080.06PSNR 47 –48 dB; SSIM 0.990
Balanced (strong robustness)0.120.10Mean NC 0.94 under attacks
Worst-case resilience0.150.12NC ↑ but lower PSNR ( 34 dB)
Table 7. Comparison of watermarking techniques.
Table 7. Comparison of watermarking techniques.
CitationMethodologyObjectiveResearch GapResultsQuantitative Results (NC, PSNR)
Sharma et al. (2020) [15]DWT + SVD + ABC with color watermarking in RGB channels.Protect multimedia from unauthorized copying.Low robustness under histogram equalization.Fairly satisfactory robustness.NC = 0.8931; PSNR = 42.78 dB
Anand and Singh (2020) [16]DWT + SVD + chaotic-LZW + Hamming code.Medical image security.Some robustness issues.Intermediate robustness.NC = 0.8716 (hist. eq.), 0.7751 (S&P); PSNR = 41.32 dB
Saritas and Ozturk (2023) [17]CT + DCT in YCbCr blocks.Robust and secure watermarking.Low resistance to severe cropping.Good robustness.NC = 0.9020 (S&P),  0.708 (crop 50%); PSNR = 38.91 dB
Rahardi et al. (2022) [18]Blockwise DCT watermark embedding.Prevent misuse on social media.Boosting robustness against tampering.Strong tamper resilience.NC = 0.7667 (S&P), 0.7913 (ripple); PSNR = 38.76 dB
Han et al. (2021) [19]Zero-watermarking with VGG19 + FFT.Medical image protection.Need to increase algorithm efficiency.Strong perceptual robustness.NC = 0.8759 (ripple); PSNR = 37.83 dB
Abodena (2024) [20]2-level LWT + DCT + Schur.Multimedia security online.Colored image extension and robustness.Balanced invisibility/robustness.NC = 0.891 (crop); PSNR = 40.62 dB
Altay and Ulutas (2024) [21]QR + Schur in RIDWT domain.Digital copyright protection.High-noise robustness.High robustness under noise.NC = 0.911 (S&P 3%); PSNR = 41.56 dB
Yuan et al. (2024) [22]DWT-DCT + Daisy descriptor + perceptual hash.Secure medical image transmission.Low performance on color images.Moderate robustness.NC = 0.72 (crop Y), 0.63 (crop X); PSNR = 35.42 dB
Mareen et al. (2024) [23]HiDDeN-style encoder–decoder with differentiable attack layers.Robust blind watermarking.No transform-subband rationale.Strong geometric robustness.SSIM ≈ 0.930; PSNR = 36.8 dB (combined)
Zhang et al. (2025) (ZoDiac) [24]Stable-Diffusion watermark with DDIM inversion.Robust detection after editing.Zero-bit payload and no auto-rotation.Strong post-edit detectability.WDR ≥ 0.98;
PSNR ≈ 29–30 dB; SSIM ≈ 0.92
Our WorkDWT + SVD + Schur (LL and HH).Robust copyright protection.Addresses robustness and efficiency gaps.High robustness across attacks.NC = 0.9949 (hist. eq.), 0.9995 (crop 50%), 0.9846 (S&P 2%), 0.9579 (S&P 5%), PSNR = 47.12 dB
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Khassawneh, B.S.; AL-Aiash, I.; AlJamal, M.; Aljamal, O.; Almusfar, L.A.; AlThani, B.F.; Aldossary, W. Unbreakable QR Code Watermarks: A High-Robustness Technique for Digital Image Security Using DWT, SVD, and Schur Factorization. Cryptography 2026, 10, 4. https://doi.org/10.3390/cryptography10010004

AMA Style

Khassawneh BS, AL-Aiash I, AlJamal M, Aljamal O, Almusfar LA, AlThani BF, Aldossary W. Unbreakable QR Code Watermarks: A High-Robustness Technique for Digital Image Security Using DWT, SVD, and Schur Factorization. Cryptography. 2026; 10(1):4. https://doi.org/10.3390/cryptography10010004

Chicago/Turabian Style

Khassawneh, Bashar Suhail, Issa AL-Aiash, Mahmoud AlJamal, Omar Aljamal, Latifa Abdullah Almusfar, Bashair Faisal AlThani, and Waad Aldossary. 2026. "Unbreakable QR Code Watermarks: A High-Robustness Technique for Digital Image Security Using DWT, SVD, and Schur Factorization" Cryptography 10, no. 1: 4. https://doi.org/10.3390/cryptography10010004

APA Style

Khassawneh, B. S., AL-Aiash, I., AlJamal, M., Aljamal, O., Almusfar, L. A., AlThani, B. F., & Aldossary, W. (2026). Unbreakable QR Code Watermarks: A High-Robustness Technique for Digital Image Security Using DWT, SVD, and Schur Factorization. Cryptography, 10(1), 4. https://doi.org/10.3390/cryptography10010004

Article Metrics

Back to TopTop