Keyphrases
- block cipher
- countermeasures
- axis parallel
- traffic analysis
- security protocols
- digital watermarking
- detect malicious
- malicious attacks
- security threats
- watermarking algorithm
- security mechanisms
- watermarking scheme
- s box
- information security
- network traffic
- line segments
- lightweight
- attack detection
- d objects
- malicious users
- minimum bounding
- database