Skip to main content

Table 4 Summary of the proposed model

From: Digital image watermarking: its formal model, fundamental properties and possible attacks

Model in use

Objectives

Inputs & outputs

Component functions

Underlying theory

Limitations

Proposed

To provide a means for the systematic development, and thus to develop a unified and more realistic theory, of digital image watermarking

Image-data (with different properties, e.g., original, watermarked, etc, see Figure 2)

Key generation

Digital image and signal processing

May not be suitable for studying steganography schemes

  

Watermark

Watermark generation

Cryptography

 
  

Message

Watermark embedding

  
  

Key (for each function)

Watermark detection

  
   

Watermark extraction

 Â