Evading android anti-malware by hiding malicious application inside images.
Shikha BadhaniSunil Kumar MuttooPublished in: Int. J. Syst. Assur. Eng. Manag. (2018)
Keyphrases
- image database
- image data
- input image
- image analysis
- image features
- ground truth
- rigid body
- three dimensional
- image classification
- image retrieval
- region of interest
- computer vision
- multiple images
- object recognition
- detect malicious
- malware detection
- pixel values
- mobile applications
- image collections
- feature points
- spatial information
- single image
- image processing
- test images
- image matching
- segmentation method
- edge detection
- image registration
- multiresolution
- malicious code