抄録
A comparison of obfuscation methods for watermarking system with disclosed detector is qualitatively done. Essential numbers needed in the detector software are encrypted by decoding keys are obtained from results of the software execution on the way. Based on evaluating the decoding time, we can make the watermark detector having sufficient computational amount.