Keyphrases
- countermeasures
- malicious attacks
- watermarking scheme
- security mechanisms
- chosen plaintext
- security threats
- malicious users
- digital watermarking
- data sets
- image watermarking
- detect malicious
- secure routing
- seeded region growing
- attack detection
- denial of service attacks
- java card
- computer security
- watermarking algorithm
- operating system
- signal processing
- information systems
- neural network