2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO) 2015
DOI: 10.1109/eesco.2015.7253960
|View full text |Cite
|
Sign up to set email alerts
|

Scanning tool for the detection of images embedded with malicious programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…The concept of machine learning was introduced into the architecture of the research (Shoniwa and George, 2015). After the steganalysis has been performed to determine if the embedded files contain malicious software, machine learning was then applied to determine what exact form of malware was embedded in the image.…”
Section: Steganalysismentioning
confidence: 99%
“…The concept of machine learning was introduced into the architecture of the research (Shoniwa and George, 2015). After the steganalysis has been performed to determine if the embedded files contain malicious software, machine learning was then applied to determine what exact form of malware was embedded in the image.…”
Section: Steganalysismentioning
confidence: 99%