According to an asymmetric watermarking technology, which is particularly
resistant to projection attack, an original image is analyzed to obtain
its watermarking space. The watermarking space is then divided to obtain
two orthogonal subspaces g and h. An embedding key G, which is a matrix
and which columns form bases of subspace g, is selected and a matrix H,
H.sup.TG=0 is calculated. Columns of matrix H form bases of subspace h. A
detecting key D, which equals the sum D= G.sup.T=BH.sup.T, wherein B is a
matrix, is calculated, and a watermark w is obtained and embedded into
the original image .phi..sub.0 to obtain a watermarked image
.phi..sub.w=.phi..sub.0+Gw, wherein D.phi..sub.0=m.sub.0 is not a 0
vector.