Keyphrases
- countermeasures
- short range
- mobile phone
- ubiquitous computing
- malicious attacks
- long range
- malicious users
- security threats
- watermarking scheme
- watermarking algorithm
- lightweight
- security risks
- wifi
- chosen plaintext
- digital image watermarking
- traffic analysis
- image watermarking
- security mechanisms
- data sets
- network security
- web applications
- data mining