| Article ID: | iaor201530330 |
| Volume: | 116 |
| Issue: | 2 |
| Start Page Number: | 183 |
| End Page Number: | 191 |
| Publication Date: | Feb 2016 |
| Journal: | Information Processing Letters |
| Authors: | Kuo Wen-Chung, Wang Chun-Cheng, Hou Hong-Ching |
| Keywords: | security |
The EMD (Exploiting Modification Direction) method by Zhang and Wang uses (




