Sign in

An Efficient Recovery and Survival Scheme against Malware Attacks.

Xianjun SunChuang LinYixin JiangWeidong LiuXiaowen Chu
Published in: ICC (2010)
Keyphrases
  • detect malicious
  • chosen plaintext
  • countermeasures
  • watermarking method
  • hash functions
  • authentication scheme
  • digital image watermarking
  • attack scenarios