Research Article
A Cloud-User Protocol Based on Ciphertext Watermarking Technology
Table 1
Watermark’s tolerance to GF.
| Scale | | 0.1 | 0.2 | 0.3 | 0.5 | 0.8 | 1 | 2 | 4 | 8 | 10 | BER |
| 2 | 0.11 | 0.11 | 0.11 | 0.11 | 0.11 | 0.11 | 0.11 | 0.11 | 0.11 | 0.11 | 4 | 0.11 | 0.11 | 0.11 | 0.11 | 0.01 | 0.01 | 0.32 | 0.46 | 0.48 | 0.48 | 8 | 0.12 | 0.12 | 0.12 | 0.12 | 0.01 | 0.01 | 0.28 | 0.46 | 0.48 | 0.48 | 10 | 0.12 | 0.12 | 0.12 | 0.12 | 0.01 | 0 | 0.28 | 0.46 | 0.48 | 0.48 |
|
|