Security and Communication Networks / 2017 / Article / Alg 1

Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Algorithm 1

Generating .
Input:
Output: the threshold of watermark matching
  if    then
  return  100
  end
  if  embed   or will change Fea  then
  return  100
  end
  
  
  while  there is attack method has not been tested  do
   AD = attacked TESTD
  
  end

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.