{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:52:02Z","timestamp":1772045522567,"version":"3.50.1"},"reference-count":43,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:00:00Z","timestamp":1705017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council Discovery Project","doi-asserted-by":"publisher","award":["DP210101864"],"award-info":[{"award-number":["DP210101864"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity verification are today\u2019s new challenging issues. To address these issues, digital image watermarking techniques have been proposed by several researchers. Image watermarking can be conducted through several transformations, such as discrete wavelet transform (DWT), singular value decomposition (SVD), orthogonal matrix Q and upper triangular matrix R (QR) decomposition, and non-subsampled contourlet transform (NSCT). However, a single transformation cannot simultaneously satisfy all the design requirements of image watermarking, which makes a platform to design a hybrid invisible image watermarking technique in this work. The proposed work combines four-level (4L) DWT and two-level (2L) SVD. The Arnold map initially encrypts the watermark image, and 2L SVD is applied to it to extract the s components of the watermark image. A 4L DWT is applied to the host image to extract the LL sub-band, and then 2L SVD is applied to extract s components that are embedded into the host image to generate the watermarked image. The dynamic-sized watermark maintains a balanced visual impact and non-blind watermarking preserves the quality and integrity of the host image. We have evaluated the performance after applying several intentional and unintentional attacks and found high imperceptibility and improved robustness with enhanced security to the system than existing state-of-the-art methods.<\/jats:p>","DOI":"10.3390\/a17010032","type":"journal-article","created":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T07:47:16Z","timestamp":1705045636000},"page":"32","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition for Enhanced Imperceptibility and Robustness"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1206-3669","authenticated-orcid":false,"given":"Mahbuba","family":"Begum","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Mawlana Bhashani Science and Technology University, Tangail 1902, Bangladesh"},{"name":"Department of Computer Science and Engineering, Jahangirnagar University, Dhaka 1342, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8595-5361","authenticated-orcid":false,"given":"Sumaita Binte","family":"Shorif","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Jahangirnagar University, Dhaka 1342, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7184-2809","authenticated-orcid":false,"given":"Mohammad Shorif","family":"Uddin","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Jahangirnagar University, Dhaka 1342, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1676-4422","authenticated-orcid":false,"given":"Jannatul","family":"Ferdush","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Jashore University of Science and Technology, Jashore 7408, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3114-8978","authenticated-orcid":false,"given":"Tony","family":"Jan","sequence":"additional","affiliation":[{"name":"Centre for Artificial Intelligence Research and Optimisation (AIRO), Torrens University, Australia"}]},{"given":"Alistair","family":"Barros","sequence":"additional","affiliation":[{"name":"School of Information Systems, Queensland University of Technology, Brisbane, QLD 4000, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2822-0657","authenticated-orcid":false,"given":"Md","family":"Whaiduzzaman","sequence":"additional","affiliation":[{"name":"Centre for Artificial Intelligence Research and Optimisation (AIRO), Torrens University, Australia"},{"name":"School of Information Systems, Queensland University of Technology, Brisbane, QLD 4000, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., and Kalker, T. (2007). Digital Watermarking and Steganography, Morgan Kaufmann.","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"ref_2","first-page":"911","article-title":"A secure and robust block based DWT-SVD image watermarking approach","volume":"38","author":"Singh","year":"2017","journal-title":"J. Inf. Optim. Sci."},{"key":"ref_3","first-page":"5856","article-title":"A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition","volume":"34","author":"Begum","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_4","first-page":"337","article-title":"An introduction to robust transform based image watermarking techniques","volume":"282","author":"Zhao","year":"2010","journal-title":"Intell. Multimed. Anal. Secur. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/S1665-6423(14)71612-8","article-title":"Robust image watermarking theories and techniques: A review","volume":"12","author":"Tao","year":"2014","journal-title":"J. Appl. Res. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/TITB.2006.875655","article-title":"Multiple image watermarking applied to health information management","volume":"10","author":"Giakoumaki","year":"2006","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1985","DOI":"10.1016\/j.sigpro.2011.12.021","article-title":"A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition","volume":"92","author":"Lei","year":"2012","journal-title":"Signal Process."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2368","DOI":"10.1109\/TASL.2013.2277929","article-title":"Robust SVD-based audio watermarking scheme with differential evolution optimization","volume":"21","author":"Lei","year":"2013","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2897","DOI":"10.1007\/s11071-014-1634-4","article-title":"Optimal image watermarking scheme based on chaotic map and quaternion wavelet transform","volume":"78","author":"Lei","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Megalingam, R.K., Nair, M.M., Srikumar, R., Balasubramanian, V.K., and Sarma, V.S.V. (2010, January 9\u201310). Performance comparison of novel, robust spatial domain digital image watermarking with the conventional frequency domain watermarking techniques. Proceedings of the 2010 International Conference on Signal Acquisition and Processing, Bangalore, India.","DOI":"10.1109\/ICSAP.2010.79"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Rasti, P., Anbarjafari, G., and Demirel, H. (2017, January 15\u201318). Colour image watermarking based on wavelet and QR decomposition. Proceedings of the 2017 25th Signal Processing and Communications Applications Conference (SIU), Antalya, Turkey.","DOI":"10.1109\/SIU.2017.7960259"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/978-3-319-63639-9_20","article-title":"SVD-DCT based medical image watermarking in NSCT domain","volume":"33","author":"Singh","year":"2018","journal-title":"Quantum Comput. Environ. Intell. Large Scale Real Appl."},{"key":"ref_13","first-page":"144","article-title":"Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform","volume":"44","author":"Najafi","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zhou, X., Zhang, H., and Wang, C. (2018). A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry, 10.","DOI":"10.3390\/sym10030077"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"80849","DOI":"10.1109\/ACCESS.2019.2915596","article-title":"An optimized image watermarking method based on HD and SVD in DWT domain","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Dhar, P.K., Hazra, P., and Shimamura, T. (2020). Blind color image watermarking using fan Beam transform and QR decomposition. Symmetry, 12.","DOI":"10.3390\/sym12030486"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/s42979-021-00608-6","article-title":"Implementation of secured and robust DFT-based image watermark through hybridization with decomposition algorithm","volume":"2","author":"Begum","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"113714","DOI":"10.1109\/ACCESS.2021.3104985","article-title":"Blind and robust watermarking scheme in hybrid domain for copyright protection of medical images","volume":"9","author":"Alzahrani","year":"2021","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Srivastava, R., Tomar, R., Gupta, M., Yadav, A.K., and Park, J. (2021). Image watermarking approach using a hybrid domain based on performance parameter analysis. Information, 12.","DOI":"10.3390\/info12080310"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s11277-021-08895-1","article-title":"Fragile watermarking based on QR decomposition and Fourier transform","volume":"122","author":"Nejati","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"27593","DOI":"10.1007\/s11042-021-11064-y","article-title":"Hybrid, blind and robust image watermarking: RDWT\u2013NSCT based secure approach for telemedicine applications","volume":"80","author":"Thanki","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s42979-021-00478-y","article-title":"An efficient watermarking approach based on LL and HH edges of DWT\u2013SVD","volume":"2","author":"Yasmeen","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"e223","DOI":"10.1002\/spy2.223","article-title":"Blind watermarking algorithm combining NSCT, DWT, SVD, and HVS","volume":"5","author":"Zeng","year":"2022","journal-title":"Secur. Priv."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3089","DOI":"10.1109\/TIP.2006.877507","article-title":"The nonsubsampled contourlet transform: Theory, design, and applications","volume":"15","author":"Zhou","year":"2006","journal-title":"IEEE Trans. Image Process."},{"key":"ref_25","unstructured":"Discrete Wavelet Transform (2023, April 01). Wikipedia. Available online: https:\/\/en.wikipedia.org\/wiki\/Discrete_wavelet_transform."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Begum, M., and Uddin, M.S. (2020). Digital image watermarking techniques: A review. Information, 11.","DOI":"10.3390\/info11020110"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1080\/07468342.1996.11973744","article-title":"A singularly valuable decomposition: The SVD of a matrix","volume":"27","author":"Kalman","year":"1996","journal-title":"Coll. Math. J."},{"key":"ref_28","unstructured":"Ford, W. (2014). Numerical Linear Algebra with Applications: Using MATLAB, Academic Press."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Pratt, W.K. (2013). Introduction to Digital Image Processing, CRC Press.","DOI":"10.1201\/b15731"},{"key":"ref_30","unstructured":"Netravali, A. (2013). Digital Pictures: Representation and Compression, Springer Science & Business Media."},{"key":"ref_31","first-page":"629","article-title":"A reliable enhanced watermarking based on NSCT and SVD","volume":"5","author":"Chen","year":"2013","journal-title":"Adv. Inf. Sci. Serv. Sci."},{"key":"ref_32","unstructured":"(2023, May 14). Database. Available online: http:\/\/sipi.usc.edu\/database\/."},{"key":"ref_33","unstructured":"(2023, June 17). Image Databases\u2014Imageprocessingplace.com. Available online: https:\/\/imageprocessingplace.com\/root_files_V3\/image_databases.htm."},{"key":"ref_34","unstructured":"(2023, June 17). Chest X-ray Images (Pneumonia)\u2014kaggle.com. Available online: https:\/\/www.kaggle.com\/paultimothymooney\/chest-xray-pneumonia."},{"key":"ref_35","unstructured":"(2023, June 17). ECG Heartbeat Categorization Dataset\u2014kaggle.com. Available online: https:\/\/www.kaggle.com\/shayanfazeli\/heartbeat\/."},{"key":"ref_36","unstructured":"Srinivasan, S. (2023, May 14). Fish Species Image Data. Kaggle, Year of Dataset Publication. Available online: https:\/\/www.kaggle.com\/sripaadsrinivasan\/fish-species-image-data\/."},{"key":"ref_37","unstructured":"Aalborg University Brackish Dataset (2023, May 14). Kaggle, 2023. Available online: https:\/\/www.kaggle.com\/aalborguniversity\/brackish-dataset\/."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"4682","DOI":"10.1109\/JIOT.2020.2969326","article-title":"A Survey on Access Control in the Age of Internet of Things","volume":"7","author":"Qiu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"131","DOI":"10.23919\/JCC.2020.11.012","article-title":"Robust image watermarking based on generative adversarial network","volume":"17","author":"Hao","year":"2020","journal-title":"China Commun."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Lin, X., and Li, C.T. (2016, January 4\u20136). Refining PRNU-based detection of image forgeries. Proceedings of the 2016 Digital Media Industry & Academic Forum (DMIAF), Santorini, Greece.","DOI":"10.1109\/DMIAF.2016.7574937"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Bertini, F., Sharma, R., and Montesi, D. (2022). Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?. J. Imaging, 8.","DOI":"10.3390\/jimaging8050132"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"119362","DOI":"10.1016\/j.ins.2023.119362","article-title":"A Dual-Embedded Tamper Detection Framework Based on Block Truncation Coding for Intelligent Multimedia Systems","volume":"649","author":"Li","year":"2023","journal-title":"Inf. Sci."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.001.2200035","article-title":"Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication","volume":"61","author":"Li","year":"2023","journal-title":"IEEE Commun. Mag."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/17\/1\/32\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:45:24Z","timestamp":1760103924000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/17\/1\/32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,12]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["a17010032"],"URL":"https:\/\/doi.org\/10.3390\/a17010032","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,12]]}}}