Login / Signup
Steganography for Executables and Code Transformation Signatures.
Bertrand Anckaert
Bjorn De Sutter
Dominique Chanet
Koen De Bosschere
Published in:
ICISC (2004)
Keyphrases
</>
source code
reed solomon codes
binary codes
static analysis
software systems
linear transformation
signature verification
open source
information hiding
database
neural network
transformation rules
digital signature
spread spectrum
hidden information
signature recognition