Login / Signup
An Efficient Recovery and Survival Scheme against Malware Attacks.
Xianjun Sun
Chuang Lin
Yixin Jiang
Weidong Liu
Xiaowen Chu
Published in:
ICC (2010)
Keyphrases
</>
detect malicious
chosen plaintext
countermeasures
watermarking method
hash functions
authentication scheme
digital image watermarking
attack scenarios