From: Digital image watermarking: its formal model, fundamental properties and possible attacks
Components | Inputs | Outputs | |
---|---|---|---|
Key generation, K e y(·) | Image data, i | Generation key, g | |
Message, m | Embedding key, e | ||
Other image data, (j:j≠i) | Detection key, d | ||
Extraction key, x | |||
Watermark encoding | Generation, G(·) | Generation key, g | Watermark, w |
Image data, i | |||
Message, m | |||
Other image data, (j:j≠i) | |||
Embedding, E(·) | Embedding-key, e | Watermarked image-data, ī | |
Image-data, i | |||
Watermark, w | |||
Watermark decoding | Detection, D(·) | Detection-key, d |
|
Watermarked image data, Ä« | |||
Image data, i | or, failure, ⊥ | ||
Watermark, w | |||
Extraction, X(·) | Extraction key, x |
| |
Watermarked image data, | |||
Image data, i | or, failure, ⊥ | ||
Estimated watermark, |