Keyphrases
- countermeasures
- traffic analysis
- watermarking scheme
- malicious users
- watermarking algorithm
- malicious attacks
- security threats
- chosen plaintext
- attack detection
- terrorist attacks
- security protocols
- security risks
- denial of service attacks
- cryptographic protocols
- social networks
- security vulnerabilities
- real time
- digital image watermarking
- database