Table 3 Allocation of sub-band for payload.

From: Convolutional neural network and wavelet composite against geometric attacks a watermarking approach

Payload

Selected sub-band

Purpose

Watermark 1 (Gray image)

LH1

Authentication

Watermark 2 (text)

HL2

Personal data

Watermark 3 (Gray image)

LL3

Tampering control & integrity check