Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Algorithm 1

Generating .
Input:
Output: the threshold of watermark matching
  if    then
  return  100
  end
  if  embed   or will change Fea  then
  return  100
  end
  
  
  while  there is attack method has not been tested  do
   AD = attacked TESTD
  
  end