Login / Signup
Avoid Powerful Tampering by Malicious Host.
Fangyong Hou
Zhiying Wang
Zhen Liu
Yun Liu
Published in:
GCC (1) (2003)
Keyphrases
</>
detecting malicious
digital images
reverse engineering
malicious attacks
high level
detect malicious
authentication scheme
data sets
search engine
information systems
metadata
wavelet transform
watermarking scheme
error correction
malicious code