From: Digital image watermarking: its formal model, fundamental properties and possible attacks
Model in use | Objectives | Inputs & outputs | Component functions | Underlying theory | Limitations |
---|---|---|---|---|---|
Proposed | To provide a means for the systematic development, and thus to develop a unified and more realistic theory, of digital image watermarking | Image-data (with different properties, e.g., original, watermarked, etc, see Figure 2) | Key generation | Digital image and signal processing | May not be suitable for studying steganography schemes |
 |  | Watermark | Watermark generation | Cryptography |  |
 |  | Message | Watermark embedding |  |  |
 |  | Key (for each function) | Watermark detection |  |  |
 |  |  | Watermark extraction |  |  |