Keyphrases
- countermeasures
- watermarking scheme
- malicious attacks
- traffic analysis
- malicious users
- watermarking algorithm
- computer security
- security threats
- case study
- digital image watermarking
- denial of service attacks
- image watermarking
- data publishing
- security protocols
- security mechanisms
- multiresolution
- neural network
- data corruption
- security flaws
- differential power analysis
- chosen plaintext