Login / Signup

Detection of Trojan HW by using hidden information on the system.

Osnat KerenIlya LevinVladimir Sinelnikov
Published in: IOLTS (2011)
Keyphrases
  • hidden information
  • information hiding
  • computational complexity
  • image analysis