. "In such schemes, a party other than the owner may counterfeit a watermark by ???subtracting off??? a second watermark from the publicly available data and claim the result to be his or her original." . . .