期刊文献+

基于动态图的防篡改软件水印实现方案 被引量:6

A Transaction Scheme of Tamper-proofing Software Watermarks based on Dynamic Gragh
原文传递
导出
摘要 本文提出了一种基于动态二叉树的水印基数编码方案,并对水印中的常量进行编码以达到水印防篡改的目的。同时,不仅形式化地定义了水印系统的常用算法,而且给出了该方案较为详细的实现步骤,最后进行了简单的性能分析。 In this paper a novel radix encoding scheme based on dynamic binary-tree is presented, and the constants existed in the watermark is encoded to tamper-proof the watermark itself. We not only define formally the common algorithms in the watermark system,but also introduce the steps of the scheme in detail,and finally analyze the performance briefly.
作者 白雪梅 凌捷
出处 《网络安全技术与应用》 2005年第7期10-13,共4页 Network Security Technology & Application
基金 广州市科技攻关项目"041G015"和"052Z104001"资助。
关键词 软件保护 软件水印 防篡改技术 动态图 软件版权保护 binary tree constant encoding tamper-proof
  • 相关文献

同被引文献25

  • 1BSAIDC.Keyfindings-firstannualBSAandIDCglobalsoftwarepiracystudy[EB/OL].(2010-05-07)[2010-08-03].http://www.bsa.org/globalstudy.html.
  • 2COLLBERG C, THOMBORSON C. Software watermarking: models and dynamic embeddings[C]// Proc of Symposium on Principles of Programming Languages. New York:ACM, 1999:311-324.
  • 3VENKATESAN R, VAZIRANI V, SINHA S. A graph theoretic approach to software watermarking[C]//Proc of the 4th International Hiding Workshop. London UK:Springer-Verlag, 2001:157-168.
  • 4COLLBERG C, HUNTWORKS A, CARTER E, et al. More on graph theoretic software watermarks: implementation, analysis, and attacks[J].Information and Software Technology, 2009,51(1):56-67.
  • 5PALSBERG J, KRISHNASWAMI, KOWN M, et al. Experience with software watermarking[C]//Proc of the 16th Annual Computer Application Conference. Washington DC:IEEE Computer Society, 2000:308-316.
  • 6WANG Yong, YANG Yi-xian. A software watermark database scheme based on PPCT[C]//Proc of CIHW2004. 2004.
  • 7ZHU Jian-qi, LIU Yan-heng, YIN Ke-xin. A novel dynamic graph software watermark scheme[C]//Proc of the 1st International Workshop on Education Technology and Computer Science. Washington DC:IEEE Computer Society, 2009:775-780.
  • 8柯召 孙琦.数论讲义[M].北京:高等教育出版社,1986.226-227.
  • 9Thomborson C, Nagra J, Somaraju R, et al. Tamper-proofing Software Watermarks[C]. Proc. of the 2nd Information Security Workshop,Australasian, 2004: 27-36.
  • 10Collberg C, Thomborson C. Software Watermarking: Models and Dynamic Embeddings[C]. Proceedings of the 26th Annual SIGPLAN-AIGACT Symposium on Principles of Programming languages. Association for Computing Machinery Press, 1999:311-324.

引证文献6

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部