Research Article
A Cloud-User Protocol Based on Ciphertext Watermarking Technology
Input: | Output: | n length of W; | ; | embedding positions random sequence | from[1,2,...step] of length | for to do | for to step do | if then | Break; | end | else | if is in embedding positions then | if then | | end | else | | end | end | else | is equal to | | end | end | end | end | return |
|