Keyphrases
- security protocols
- cryptographic protocols
- security flaws
- malicious attacks
- countermeasures
- traffic analysis
- watermarking scheme
- communication protocol
- malicious users
- database
- security mechanisms
- security threats
- chosen plaintext
- data corruption
- terrorist attacks
- communication protocols
- image watermarking
- multi party
- watermarking algorithm
- signal processing