Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Figure 8

Pictures attacked by JC (a), GF (b), and WGN (c).
(a)
(b)
(c)