Security and Communication Networks / 2017 / Article / Alg 1

Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Algorithm 1

Generating .
Output: the threshold of watermark matching
  if    then
  return  100
  if  embed   or will change Fea  then
  return  100
  while  there is attack method has not been tested  do
   AD = attacked TESTD

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.