Keyphrases
- countermeasures
- traffic analysis
- malicious attacks
- java card
- risk management
- security mechanisms
- malicious users
- computer security
- security threats
- terrorist attacks
- secure routing
- social networks
- redundancy reduction
- digital image watermarking
- attack detection
- digital watermarking
- watermarking algorithm
- watermarking scheme
- information content
- digital images