Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Algorithm 3

Generating .
Input:
Output:
  n length of W;
  ;
  embedding positions random sequence
from[1,2,...step] of length
  for    to    do
  for    to  step  do
  if    then
   Break;
  end
  else
  if   is in embedding positions  then
  if    then
  
  end
  else
  
  end
  end
  else
   is equal to
  end
  end
  end
  end
  return