H Function based Tamper-proofing Software Watermarking Scheme
نویسندگان
چکیده
A novel constant tamper-proofing software watermark technique based on H encryption function is presented. First we split the watermark into smaller pieces before encoding them using CLOC scheme. With the watermark pieces, a many-to-one function (H function) as the decoding function is constructed in order to avoid the pattern-matching or reverse engineering attack. The results of the function are encoded into constants as the parameters of opaque predicates or appended to the condition branches of the program to make the pieces relevant. The feature of interaction among the pieces improves the tamper-proofing ability because there being one piece destroyed, the program will not work correctly. The simulation shows that the performance of the proposed scheme is good and can resist many kinds of attacks.
منابع مشابه
Towards a Telltale Watermarking Technique for Tamper-Proofing - Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on
In this paper we present a novel fragile watermarking scheme for the tamper-proofing of multimedia signals. Unlike previously proposed techniques, the novel approach provides spatial and frequency domain information on how the signal is modified. We call such a technique a telltale tamper-proofing method. Our design embeds a fragile watermark in the discrete wavelet domain of the signal by quan...
متن کاملEvaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks
For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper-proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been...
متن کاملA Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against...
متن کاملPermutation-Based Semi-Fragile Watermark Scheme
Tamper proofing is a crucial problem in the watermarking application. Aiming at the credibility of multimedia, we present a semi-fragile watermark based on the image permutation. Watermarking detection is performed without resorting to the host image and it is only controlled by secrete keys, thus the whole scheme does not have certain security gaps. The simulation experiments show that it can ...
متن کاملWatermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection
We identify three types of attack on the intellectual property contained in software, and three corresponding technical defenses. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense agains...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JSW
دوره 6 شماره
صفحات -
تاریخ انتشار 2011