Keyphrases
- countermeasures
- traffic analysis
- malicious attacks
- watermarking scheme
- malicious users
- security mechanisms
- security threats
- real time
- multi agent
- differential power analysis
- watermarking method
- computer security
- watermarking technique
- watermarking algorithm
- java card
- denial of service attacks
- signal processing
- neural network
- digital image watermarking
- database