{"id":"https://openalex.org/W7117721848","doi":"https://doi.org/10.3390/cryptography10010004","title":"Unbreakable QR Code Watermarks: A High-Robustness Technique for Digital Image Security Using DWT, SVD, and Schur Factorization","display_name":"Unbreakable QR Code Watermarks: A High-Robustness Technique for Digital Image Security Using DWT, SVD, and Schur Factorization","publication_year":2025,"publication_date":"2025-12-30","ids":{"openalex":"https://openalex.org/W7117721848","doi":"https://doi.org/10.3390/cryptography10010004"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography10010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010004","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/cryptography10010004","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121606558","display_name":"Bashar Suhail Khassawneh","orcid":null},"institutions":[{"id":"https://openalex.org/I145380033","display_name":"Amman Arab University","ror":"https://ror.org/039xekb14","country_code":"JO","type":"education","lineage":["https://openalex.org/I145380033"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Bashar Suhail Khassawneh","raw_affiliation_strings":["Department of Computer Science, Faculty of Computer Science and Informatics, Amman Arab University, Amman 11953, Jordan"],"raw_orcid":"https://orcid.org/0009-0000-4647-0460","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computer Science and Informatics, Amman Arab University, Amman 11953, Jordan","institution_ids":["https://openalex.org/I145380033"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092815522","display_name":"Issa Al-Aiash","orcid":"https://orcid.org/0009-0003-9297-6704"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Issa AL-Aiash","raw_affiliation_strings":["Department of Information Technology, Faculty of Prince Al-Hussein bin Abdullah II for IT, The Hashemite University, Zarqa 13133, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Faculty of Prince Al-Hussein bin Abdullah II for IT, The Hashemite University, Zarqa 13133, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121638302","display_name":"Mahmoud AlJamal","orcid":null},"institutions":[{"id":"https://openalex.org/I97864281","display_name":"Irbid National University","ror":"https://ror.org/00xfxvy87","country_code":"JO","type":"education","lineage":["https://openalex.org/I97864281"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mahmoud AlJamal","raw_affiliation_strings":["Department of Cybersecurity, Science and Information Technology, Irbid National University, Irbid 21110, Jordan"],"raw_orcid":"https://orcid.org/0009-0007-5389-6778","affiliations":[{"raw_affiliation_string":"Department of Cybersecurity, Science and Information Technology, Irbid National University, Irbid 21110, Jordan","institution_ids":["https://openalex.org/I97864281"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121614664","display_name":"Omar Aljamal","orcid":null},"institutions":[{"id":"https://openalex.org/I31079310","display_name":"Al al-Bayt University","ror":"https://ror.org/028jh2126","country_code":"JO","type":"education","lineage":["https://openalex.org/I31079310"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Omar Aljamal","raw_affiliation_strings":["Department of Mathematics, Faculty of Sciences, Al al-Bayt University, Mafraq 130040, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Faculty of Sciences, Al al-Bayt University, Mafraq 130040, Jordan","institution_ids":["https://openalex.org/I31079310"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094140050","display_name":"Latifa Abdullah Almusfar","orcid":"https://orcid.org/0000-0002-3944-0447"},"institutions":[{"id":"https://openalex.org/I76571253","display_name":"Imam Abdulrahman Bin Faisal University","ror":"https://ror.org/038cy8j79","country_code":"SA","type":"education","lineage":["https://openalex.org/I76571253"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Latifa Abdullah Almusfar","raw_affiliation_strings":["Department of Management Information Systems, College of Business Administration, Imam Abdulrahman Bin Faisal University (IAU), Dammam 31451, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-3944-0447","affiliations":[{"raw_affiliation_string":"Department of Management Information Systems, College of Business Administration, Imam Abdulrahman Bin Faisal University (IAU), Dammam 31451, Saudi Arabia","institution_ids":["https://openalex.org/I76571253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121643699","display_name":"Bashair Faisal AlThani","orcid":null},"institutions":[{"id":"https://openalex.org/I76571253","display_name":"Imam Abdulrahman Bin Faisal University","ror":"https://ror.org/038cy8j79","country_code":"SA","type":"education","lineage":["https://openalex.org/I76571253"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Bashair Faisal AlThani","raw_affiliation_strings":["Department of Management Information Systems, College of Business Administration, Imam Abdulrahman Bin Faisal University (IAU), Dammam 31451, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-7643-1224","affiliations":[{"raw_affiliation_string":"Department of Management Information Systems, College of Business Administration, Imam Abdulrahman Bin Faisal University (IAU), Dammam 31451, Saudi Arabia","institution_ids":["https://openalex.org/I76571253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121648085","display_name":"Waad Aldossary","orcid":null},"institutions":[{"id":"https://openalex.org/I4210135077","display_name":"Al Yamamah University","ror":"https://ror.org/036b03a90","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210135077"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Waad Aldossary","raw_affiliation_strings":["Department of Marketing, College of Business, Al Yamamah University, Khobar 12674, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Marketing, College of Business, Al Yamamah University, Khobar 12674, Saudi Arabia","institution_ids":["https://openalex.org/I4210135077"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5121606558"],"corresponding_institution_ids":["https://openalex.org/I145380033"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.62270119,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"1","first_page":"4","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9550999999046326,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9550999999046326,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.016899999231100082,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.002899999963119626,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7444999814033508},{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.63919997215271},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.6290000081062317},{"id":"https://openalex.org/keywords/matrix-decomposition","display_name":"Matrix decomposition","score":0.5482000112533569},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5080999732017517},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.4993000030517578},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.45829999446868896},{"id":"https://openalex.org/keywords/qr-decomposition","display_name":"QR decomposition","score":0.4417000114917755},{"id":"https://openalex.org/keywords/factorization","display_name":"Factorization","score":0.42399999499320984},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4187000095844269}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7444999814033508},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.63919997215271},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.6290000081062317},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5715000033378601},{"id":"https://openalex.org/C42355184","wikidata":"https://www.wikidata.org/wiki/Q1361088","display_name":"Matrix decomposition","level":3,"score":0.5482000112533569},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5080999732017517},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.4993000030517578},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.45829999446868896},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4578000009059906},{"id":"https://openalex.org/C188060507","wikidata":"https://www.wikidata.org/wiki/Q653242","display_name":"QR decomposition","level":3,"score":0.4417000114917755},{"id":"https://openalex.org/C187834632","wikidata":"https://www.wikidata.org/wiki/Q188804","display_name":"Factorization","level":2,"score":0.42399999499320984},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4187000095844269},{"id":"https://openalex.org/C127449775","wikidata":"https://www.wikidata.org/wiki/Q3785871","display_name":"Histogram matching","level":4,"score":0.41620001196861267},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.40959998965263367},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.39910000562667847},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.397599995136261},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3790999948978424},{"id":"https://openalex.org/C46286280","wikidata":"https://www.wikidata.org/wiki/Q2414958","display_name":"Discrete wavelet transform","level":4,"score":0.3521000146865845},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.3515999913215637},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35120001435279846},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.3490000069141388},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.34610000252723694},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.3312999904155731},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.32600000500679016},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.301800012588501},{"id":"https://openalex.org/C35651441","wikidata":"https://www.wikidata.org/wiki/Q625303","display_name":"Independence (probability theory)","level":2,"score":0.2946999967098236},{"id":"https://openalex.org/C118930307","wikidata":"https://www.wikidata.org/wiki/Q600590","display_name":"Tuple","level":2,"score":0.29339998960494995},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.2921999990940094},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.2921000123023987},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.2892000079154968},{"id":"https://openalex.org/C109282560","wikidata":"https://www.wikidata.org/wiki/Q4166054","display_name":"Singular value","level":3,"score":0.2854999899864197},{"id":"https://openalex.org/C99383703","wikidata":"https://www.wikidata.org/wiki/Q1064218","display_name":"Schur decomposition","level":4,"score":0.2833999991416931},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.2768999934196472},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.272599995136261},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.26829999685287476},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.26330000162124634},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.2615000009536743}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography10010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010004","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bfcd63f6b5744b9b8c810eeb49739135","is_oa":false,"landing_page_url":"https://doaj.org/article/bfcd63f6b5744b9b8c810eeb49739135","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 10, Iss 1, p 4 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography10010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010004","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2027485027","https://openalex.org/W2105882490","https://openalex.org/W2112570083","https://openalex.org/W2157242065","https://openalex.org/W2293567455","https://openalex.org/W2518058967","https://openalex.org/W2559886833","https://openalex.org/W2563257315","https://openalex.org/W2573437058","https://openalex.org/W3001831163","https://openalex.org/W3002441164","https://openalex.org/W3006860488","https://openalex.org/W3096324038","https://openalex.org/W4226532957","https://openalex.org/W4301431110","https://openalex.org/W4384405841","https://openalex.org/W4391358996","https://openalex.org/W4391896599","https://openalex.org/W4392248718","https://openalex.org/W4394577774","https://openalex.org/W4394785231","https://openalex.org/W4413785573","https://openalex.org/W4416429095"],"related_works":[],"abstract_inverted_index":{"In":[0],"the":[1,5,53],"digital":[2,10,75,161],"era,":[3],"protecting":[4],"integrity":[6,146],"and":[7,19,62,97,134,147],"ownership":[8],"of":[9,85],"content":[11],"is":[12],"increasingly":[13],"crucial,":[14],"particularly":[15],"against":[16],"unauthorized":[17],"copying":[18],"tampering.":[20],"Traditional":[21],"watermarking":[22,49],"techniques":[23],"often":[24],"struggle":[25],"to":[26,34,66,136],"remain":[27],"robust":[28],"under":[29,138,149],"various":[30],"image":[31,87],"manipulations,":[32],"leading":[33],"a":[35,47,68,72,83,156],"need":[36],"for":[37,119,123,128,132,159],"more":[38],"resilient":[39],"methods.":[40],"To":[41],"address":[42],"this":[43],"challenge,":[44],"we":[45],"propose":[46],"novel":[48],"technique":[50],"that":[51,103],"integrates":[52],"Discrete":[54],"Wavelet":[55],"Transform":[56],"(DWT),":[57],"Singular":[58],"Value":[59],"Decomposition":[60],"(SVD),":[61],"Schur":[63],"matrix":[64],"factorization":[65],"embed":[67],"QR":[69],"code":[70],"as":[71,117],"watermark":[73,142],"into":[74],"images.":[76],"Our":[77],"method":[78,155],"was":[79],"rigorously":[80],"tested":[81,151],"across":[82],"range":[84],"common":[86],"attacks,":[88],"including":[89],"histogram":[90,120],"equalization,":[91,121],"salt-and-pepper":[92,124],"noise,":[93],"ripple":[94,129],"distortions,":[95],"smoothing,":[96,133],"extensive":[98],"cropping.":[99,140],"The":[100,141],"results":[101],"demonstrate":[102],"our":[104,154],"approach":[105],"significantly":[106],"outperforms":[107],"existing":[108],"methods,":[109],"achieving":[110],"high":[111],"normalized":[112],"correlation":[113],"(NC)":[114],"values":[115],"such":[116],"0.9949":[118],"0.9846":[122],"noise":[125],"(2%),":[126],"0.96063":[127],"distortion,":[130],"0.9670":[131],"up":[135],"0.9995":[137],"50%":[139],"consistently":[143],"maintained":[144],"its":[145],"scannability":[148],"all":[150],"conditions,":[152],"making":[153],"reliable":[157],"solution":[158],"enhancing":[160],"copyright":[162],"protection.":[163]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-12-31T00:00:00"}
