In the second definition, the false positive possibility is that randomly chosen images and preconditioned a settled watermark.
In addition, another attack is the so-called Oracle attacks in this category  and which is able be applied to produce a non-watermarked image while a device of a watermark detector is attainable. They present the structure of unidirectional watermark and demonstrate that watermarks requisite for being non-invertible in applications of copyright protection.
An example of one commercial application created for that purpose is Digimarc Corporation's ImageBridge Solution.
Two common compression schemes: lossy compression, such as VQ compression, and JPEG compression for image processing have lately been considered to have approximately the same impact on noise removal as denoising.
Moreover, while these perturbations are varied from each other, also they are probable to be specific varied from the statistics method of the watermark generation systems.
Users will always choose a device that can play and record illegal copies. Most current watermarking approaches are robust against these attacks owing to the application of particular synchronization procedures. This feature makes the watermark more robust in comparison with spatial methods against various distortions.
Then, the applied templates are eliminated easily by the malicious attack and the applied various geometric transformations are unable to be recognized during the template detection process.
In the impact of the attacks is discussed from the information-theoretic point of view and it is concluded that the attack of additive white Gaussian noise can be optimal asymptotically with respect to removing the watermark when the intensity of the noise is big in comparison to the energy of the watermark.
Also the process of the successful watermark detection relies on the precise detection of the template because the detection error tolerance is unacceptable for the inaccuracy of the detected position.