Skip to main content

Table 3 Components of a key-based watermarking model

From: Digital image watermarking: its formal model, fundamental properties and possible attacks

Components

 

Inputs

Outputs

Key generation, K e y(·)

 

Image data, i

Generation key, g

  

Message, m

Embedding key, e

  

Other image data, (j:j≠i)

Detection key, d

   

Extraction key, x

Watermark encoding

Generation, G(·)

Generation key, g

Watermark, w

  

Image data, i

 
  

Message, m

 
  

Other image data, (j:j≠i)

 
 

Embedding, E(·)

Embedding-key, e

Watermarked image-data, Ä«

  

Image-data, i

 
  

Watermark, w

 

Watermark decoding

Detection, D(·)

Detection-key, d

Estimated image data, Ä© Estimated watermark, w ~

  

Watermarked image data, Ä«

 
  

Image data, i

or, failure, ⊥

  

Watermark, w

 
 

Extraction, X(·)

Extraction key, x

Estimated message, m ~ Estimated other image data, j ~

  

Watermarked image data, w Ì„

 
  

Image data, i

or, failure, ⊥

  

Estimated watermark, w ~