Research Article
A Cloud-User Protocol Based on Ciphertext Watermarking Technology
| Input: SW(Set of exist watermark of U with same | | Fea), , L(Capacity of File) | | Output: A new watermark | | | | while flag do | | randomly generate a sequence t shorter than . for | | All item in SW do | | if sumthen | | break | | end | | end | | | | end | | return |
|