A performance analysis of the authentication method proposed by J. Fridrich and M. Goljan is carried out. This method has the particular feature that both the embedder and the detector generate the watermark from a perceptual digest of the image. Hence, in order to accurately analyze the performance, the digest errors caused by the watermark embedding, the addition of a complementary signal and the scaling attacks are also taken into account.