Software Watermarking Resilient to Debugging Attacks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software Watermarking Resilient to Debugging Attacks

— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based on replacing jump instructions or unconditional branch statements (UBS) by calls to a ngerprint branch function (FBF) that computes the correct target address of the UBS as a function of the gen...

متن کامل

A new Relational Watermarking Scheme Resilient to Additive Attacks

Strengthening the ownership rights on outsourced relational database is very important in today’s internet environment. Especially where sensitive, valuable content is to be outsourced. Let us take an example of university database, weather data, stock market data, power consumption consumer behaviour data, and medical and scientific data. The increasing use of databases in applications beyond ...

متن کامل

A Content Based Image Watermarking Scheme Resilient to Geometric Attacks

Multimedia security is an incredibly significant area of concern. The paper aims to discuss a robust image watermarking scheme, which can withstand geometric attacks. The source image is initially moment normalized in order to make it withstand geometric attacks. The moment normalized image is wavelet transformed. The first level wavelet transformed image is segmented into blocks if size 8x8. T...

متن کامل

Software watermarking in the frequency domain: Implementation, analysis, and attacks

In this paper we analyze the SHKQ software watermarking algorithm, originally due to Stern, Hachez, Koeune and Quisquater. The algorithm has been implemented within the SandMark framework, a system designed to allow effective study of software protection algorithms (such as code obfuscation, software watermarking, and code tamper-proofing) targeting Java bytecode. The SHKQ algorithm embeds a wa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Multimedia

سال: 2007

ISSN: 1796-2048

DOI: 10.4304/jmm.2.2.10-16