![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Malware Detection Based on Image Conversion
Due to different malware and their variants appear every year, it is difficult to identify the virus. In traditional malware analysis methods, both static analysis methods and dynamic analysis methods may be l...
-
Chapter and Conference Paper
A Progressive Secret Image Sharing Scheme Based on GEMD Data Hiding
With the development of the Internet, people spread digital information through the Internet. However, the Internet is a public channel. Avoiding digital information be tampered with to keep the security of da...
-
Chapter and Conference Paper
Study on Security Enhancing of Generalized Exploiting Modification Directions in Data Hiding
In 2017, Liu et al. proposed the high capacity GEMD scheme which increases the capacity of GEMD by divides n adjacent pixels into multiple groups. The dividing modes among the image are the same in their sche...
-
Chapter and Conference Paper
On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment
Recently, Chiou et al. proposed a secure authentication scheme which not only ensures message confidentiality and patient anonymity but also provides real telemedicine system implementation. However, in this p...