Keyphrases
- countermeasures
- multi agent
- security mechanisms
- watermarking scheme
- malicious attacks
- security protocols
- chosen plaintext
- security flaws
- malicious users
- cryptographic protocols
- image watermarking
- computer security
- asymptotically optimal
- traffic analysis
- watermarking technique
- digital image watermarking
- detect malicious
- social networks
- database