期刊文献+

一种新的方程式软件水印算法 被引量:1

New software watermarking algorithm based on equation
在线阅读 下载PDF
导出
摘要 针对方程式重排序算法易于受到随机重排序技术攻击的问题,提出了基于中国剩余定理的软件水印算法,并通过引入水印认证中心达到水印的认证。该算法运用中国剩余定理将水印进行分解,将分解得到的序列与方程式系数序列做相关运算,使得水印与方程式的系数相关联。对得到的序列与所选取的除数序列及倍数作进一步处理生成密钥,该密钥仅属版权所有者且处于保密状态。验证版权时,版权所有者对密钥解密并进行相关运算,提取出正确的水印。该算法的水印提取完全实现了盲检测,且无须向程序中添加任何代码。实验结果表明,该算法鲁棒性较良好,程序代码的长度及运行速度也不受影响,其性能优于方程式重排序等算法。 For the matter that equation re-sorting algorithm were easily attacked by the random re-sequencing technology, this paper proposed the software watermark algorithm based on Chinese remainder theorem, and introduced the watermark authentication center. The algorithm decomposed the watermark by the Chinese remainder theorem, and made related operations between the decomposed sequence and the equation coefficients sequence, made the watermark associated with the coefficient of the equation. The sequence obtained, the selected divisor sequence and the multiple were further processed to generate a key, which was only belonged to the copyright ow-ner and kept in secret condition. When checking the copyright, the copyright owner could extract the correct watermark only by key decryption and relative operations, and the watermark extraction achieved blind detection completely, without adding any code into the program. The experiment results show that the algorithm is robust, as well as the code length and speed of program will not be affected, and its performance is better than the equation re-sorting algorithm.
出处 《计算机应用研究》 CSCD 北大核心 2011年第12期4642-4644,共3页 Application Research of Computers
基金 广西可信软件重点实验室基金项目
关键词 软件水印 方程式 中国剩余定理 水印认证中心 software watermarking equation Chinese remainder theorem watermark authentication center
  • 相关文献

参考文献5

二级参考文献24

  • 1胡珊.向PE文件中插入可执行代码的研究[J].鞍山科技大学学报,2005,28(2):119-122. 被引量:5
  • 2吴振强,冯绍东,马建峰.PE文件的信息隐藏方案与实现[J].计算机工程与应用,2005,41(27):148-150. 被引量:18
  • 3ZHU W, CLARK T, WANG FEI-YUE. A survey of software watermarking [ C]// Proceedings of the IEEE International Conference on Intelligence and Security Informatics. Berlin: Springer-Verlag, 2005:454-458.
  • 4AKITO M, HAJIMU I, KEN-ICHI M, et al. A practical method for watermarking Java programs [ C] // Proceedings of the 24th Computer Software and Applications Conference. Washington, DC: IEEE Press, 2000:191 - 197.
  • 5PERVEZ Z, Noor-ul-Qayyum MAHMOOD Y, AHMAD H F. Semblance based disseminated software watermarking algorithm [C]// Proceedings of the 23rd International Symposium on Computer and Information Sciences, ISCIS 2008, Piscataway: IEEE Press, 2008: 1-4.
  • 6SHIRALI-SHAHREZA M, SHIRALI-SHAHREZA S. Software watermarking by equation reordering [ C]//ICTFA'08: Proceedings of the 3rd IEEE International Conference on Information & Communication Technologies: from Theory to Applications. Washington, DC: IEEE Press, 2008:7-11.
  • 7COLLBERG C, TOWNSEND G. Sandmark system code [ EB/OL]. [2009 - 02 - 25]. http://cgi. cs. arizona. edu/- sandmark/download. html.
  • 8COLLBERG C. Hacking sandmark [R]. USA: University of Arizona, 2003.
  • 9MYLES G. Software watermarking [ EB/OL]. [ 2009 - 06 - 01]. http://sandmark. cs. arizona. edu/ginger_pubs_talks/applied_math_f03. pdf.
  • 10ZHU W, THOMBORSON C, WANG Fei-yue. A survey of software watermarking[ C ]//Proc of IEEE International Conference on Intelligence and Security Informatics. Germany: Springer-Verag, 2005: 454-458.

共引文献9

同被引文献7

  • 1SHIRALI-SHAHREZA M, SHIRALI-SHAHREZA S. Software watermarking by equation reordering [ C ]//Proc of the 3rd Intemationai Conference on Information and Communication Technologies : from Theory to Applications. 2008 : 1 - 4.
  • 2HAMILTON J,DANICIC S. A survey of static software watermarking [C]//Proc of World Congress on Internet Security. 2011 : 100-107.
  • 3COLLBERG C, TH0MB0RS0N C. Software watermarking models and dynamic embeddings [ C ] //Proc of the 26th ACM SIGPLAN-SI-GACT Symposium on Principles of Programming Language. New York:ACM,1999;311-324.
  • 4ZHU Jian-qi, LIU Yan-heng, YIN Ke-xin. A novel planar IPPCT tree structure and characteristics analysis [ J ]. Journal of Software, 2010,5(3) :344-351.
  • 5MYLES G,COLLBERG C. Software watermarking via opaque predicates :implementation,analysis,and attacks [ J ]. Electronic Commerce Research, 2006,6(2) :155-171.
  • 6COLLBERG C, THOMBORSON C, TOWNSEND G M. Dynamic graph-based software watermarking, TR04- 08 [ R ]. 2004.
  • 7蒋华,沙宗鲁,轩爱成.基于方程式逆序数的软件水印算法[J].计算机应用研究,2010,27(2):748-750. 被引量:3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部