Research Article
A Cloud-User Protocol Based on Ciphertext Watermarking Technology
Input: | Output: the threshold of watermark matching | if then | return 100 | end | if embed or will change Fea then | return 100 | end | | | while there is attack method has not been tested do | AD = attacked TESTD | | end |
|