期刊文献+

基于混沌优化的分存软件水印方案

Sharing software watermarking scheme based on chaotic optimization
下载PDF
导出
摘要 针对软件水印鲁棒性差、水印分存算法执行效率低的问题,提出了一种基于混沌优化的分存软件水印方案。该方案通过引入混沌系统,将水印信息矩阵分割、混沌置乱,形成分存水印;水印嵌入时,将分存水印一一编码为DPPCT拓扑图,并将hash处理后的水印信息分别填充于各个DPPCT的info域;水印嵌入后,利用混沌加密,保护全部代码,防止逆向工程等手段对软件水印的破坏。理论分析和实验表明,该方案可有效地抵抗各种语义保持变换攻击,减少程序负载,提高水印的鲁棒性及执行效率。 In order to solve the poor robustness of software watermarking and the low execution efficiency of watermarking sharing algorithm, this paper proposed a sharing software watermarking scheme based on chaotic optimization. The scheme took advantage of chaos system, matrix partition and chaotic scrambling the watermarking information to form sharing watermarking. When watermarking was embedded, using DPPCT topology graph encode the sharing watermarking, then putting the hash value of the watermarking information into the info field of each DPPCT. After the watermarking embedded, using chaotic encryption to protect all code and prevent reverse engineering and other methods to attack the software watermarking. Theoretical analysis and experimental results show that the scheme can effectively resist various semantics preserving transformation attacks, decrease the program load and improve robustness and execution efficiency of the watermarking.
作者 李斌 周清雷
出处 《计算机应用研究》 CSCD 北大核心 2013年第11期3418-3420,3429,共4页 Application Research of Computers
基金 国家"863"计划基金资助项目(2009AA012201)
关键词 软件水印 混沌理论 水印分存 DPPCT拓扑图 鲁棒性 software watermarking chaos theory sharing watermarking DPPCT topology graph robustness
  • 相关文献

参考文献11

二级参考文献42

  • 1白雪梅,凌捷.基于动态图的防篡改软件水印实现方案[J].网络安全技术与应用,2005(7):10-13. 被引量:6
  • 2刘镔,张永强,刘粉林.一种新的数字化混沌扰动方案[J].计算机科学,2005,32(4):71-74. 被引量:14
  • 3白雪梅,凌捷.基于中国剩余定理的动态水印方案[J].计算机工程,2006,32(16):155-157. 被引量:5
  • 4芦斌,罗向阳,刘粉林.一种基于混沌的软件水印算法框架及实现[J].软件学报,2007,18(2):351-360. 被引量:15
  • 5Collberg C, Thomborson C.Software watermarking : Models and dynamic embeddings[C]//ACM SIGPLAN-SIGACT Symposium on Principles of Programming Language, Tucson, 1999: 311-324.
  • 6Collberg C, Thomborson C, Townsend G.Dynamic graph-based software watermarking, Technical Report TR04-08[R].Department of Computer Science,University of Arizona(USA),2004.
  • 7Thomborson C,Nagra J,Somaraju R,et al.Tamper-proofing software watermarks[C]//Montague P, Steketee C.Proc of the 2rid Australasian Information Security Workshop,2004: 27-36.
  • 8COLLBERG Christian,NAGRA Jasvir.Surreptitious software obfuscation,watermarking,and tamperproofing for software protection[M].[S.l.] :Addison-Wesley,2009.
  • 9COLLBERG C,THOMBORSON C,TOWNSEND G.Dynamic graph-based software watermarking[J].Uni.of Arizona TR04-08,2004;.
  • 10VENKATESAN R,VAZARINA V,SINHA S.A graph theoretic approach to software watermarking[C] //Lecture Notes in Computer Science,[S.l.] :[s.n.] ,2001:157-168.

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部