期刊文献+

一种基于二次剩余的混合软件水印研究 被引量:1

A Research on Quadratic Residue-Based Mixed Software Watermark
下载PDF
导出
摘要 提出了采用常量编码防篡改的两种动态图混合水印结构方案,即采用基数循环链表分别与二叉树结构和PPCT结构相结合进行编码的方法,提高动态图水印的鲁棒性。水印信息的产生基于二次剩余理论和Rabin密码体制,该算法在多个水印与宿主程序之间建立功能性的依赖关系,对真实水印起到了防篡改的作用,增加了攻击者的攻击难度,从而可对该类水印进行有效的保护。 This paper puts forward a new scheme which adopts tamper-proofing combined watermark. It employs Radix-K linklist to integrate binary tree and PPCT respectively in order to improve the robustness. The watermark information is based on Quadratic Residue theory and Rabin cipher system. The functionality dependency relationship is built between multiple watermark and host program. The true watermarks are protected against tampering. It increases the attacking difficulty, the watermark can be efficiently protected.
作者 王刚
出处 《青岛大学学报(工程技术版)》 CAS 2007年第3期38-43,共6页 Journal of Qingdao University(Engineering & Technology Edition)
关键词 二次剩余 软件水印 常量编码 二叉树基数K编码 PPCT结构 Quadratic Residue software watermark constant encode binary tree-based radix K encode PPCT structure
  • 相关文献

参考文献8

  • 1柯召 孙琦.数论讲义[M].北京:高等教育出版社,1986.226-227.
  • 2白雪梅,凌捷.基于动态图的防篡改软件水印实现方案[J].网络安全技术与应用,2005(7):10-13. 被引量:6
  • 3Christian Collberg, Ginger Myles, Andrew Huntwork. Sandmark-a Tool for Software Protection Research [J]. IEEE Security and Privacy, 2003, 1(4) : 40-49.
  • 4Home B, Matheson L, Sheehan C, et al. Dynamic Self-checking Techniques for Improved Tamper Tesistance [C]// LNCS: Proc First ACM Workshop on Digital Rights Management (DRM 2001). New York: Springer Verlag, 2002: 141-159.
  • 5Venkatesan R, Vazirani V, Sinha S. A graph Theoretic Approach to Software Watermarking [C]// LNCS: Information Hiding Workshop. New York: Springe-Verlag, 2001: 157-168.
  • 6Bradford P Cuppy. Synopsis: Experiments in Software Watermarking [D]. USA: University of Evansville, 2002.
  • 7Ginger Myles, Christian Collberg. Software Watermarking Via Opaque Predicates: Implementation, Analysis, and Attacks [J]. Electronic Commerce Research, 2006, 6(2) : 155-171.
  • 8Wang Lei. A Constant Encoding Algorithm Which Tamper-Proofs the Ct-Watermark [EB/OL]. http://www. cs. auckland. ac. nz/-cthombor/students/lwang/lwangthesis.

共引文献25

同被引文献13

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部