Table 3 Allocation of sub-band for payload.
From: Convolutional neural network and wavelet composite against geometric attacks a watermarking approach
Payload | Selected sub-band | Purpose |
---|---|---|
Watermark 1 (Gray image) | LH1 | Authentication |
Watermark 2 (text) | HL2 | Personal data |
Watermark 3 (Gray image) | LL3 | Tampering control & integrity check |