(1) |
Develop criteria for evaluating robust watermarking schemes |
(2) |
Disclose these criteria, and call for schemes that meet them |
(3) |
Evaluate schemes on the basis of the criteria and identify those that meet them |
(4) |
Call for attacks on the identified schemes |
(5) |
Evaluate the effectiveness of the attacks |