期刊文献+

基于中国剩余定理的动态水印方案 被引量:5

A Dynamic Watermarking Scheme Based on Chinese Remaindering Theorem
下载PDF
导出
摘要 针对动态图水印性能指标之间的制约关系,提出了从分解水印图变为分解水印数据以提高隐藏信息量的设计思想,分析了称为抽象水印的方案,并结合动态图水印的明显优势,给出了一种基于中国剩余定理的动态水印方案。通过分析提高了动态水印性能的策略,指出软件水印技术的进一步发展方向。 In terms of the restrictions between the performance criteria of dynamic gragh-based watermarks, this paper presents a devising method to improve the quantity of hidden data by which is splitting a watermarking number instead of splitting a watermarking gragh; It analyzes a so-called abstract watermarking scheme, meanwhile combining with the evident advantages of dynamic gragh-based watermarks, and gives a novel dynamic watermarking scheme based on Chinese remaindering theorem, points out the further developing directions of software watermarking techniques through analyzing the strategies to improve the performance of dynamic gragh-based watermarks.
作者 白雪梅 凌捷
出处 《计算机工程》 CAS CSCD 北大核心 2006年第16期155-157,197,共4页 Computer Engineering
基金 广州市科技计划基金资助项目(041G015 052Z104001)
关键词 中国剩余定理 抽象水印 动态图水印 Chinese remaindering theorem Abstract watermarking Dynamic gragh-based watermarking
  • 相关文献

参考文献6

  • 1Collberg C, Thomborson C. Software Watermarking: Models and Dynamic Embeddings[C]. Proceedings of the 26th Annual SIGPLAN-AIGACT Symposium on Principles of Programming languages. Association for Computing Machinery Press, 1999:311-324.
  • 2Collberg C, Thomborson C, Townsend G M. Dynamic Graph-based Software Watermarking[R]. TR04-08, Department of Computer Science, University of Arizon & Auckland, 2004.
  • 3林聪吉.Chinese Remaindering with Errors[R].南开技术学院电子工程系,2002-01-23.
  • 4Cousot P, Cousot R. An Abstract Interpretation-based Framework for Software Watermarking[C]. Conference Record of the 31st ACMSIGACT-SIGMOD-SIGART Symposiumon Principles of Programming Languages. New York: ACM Press, 2004: 173-185.
  • 5Thomborson C, Nagra J, Somaraju R, et al. Tamper-proofing Software Watermarks[C]. Proc. of the 2nd Information Security Workshop,Australasian, 2004: 27-36.
  • 6白雪梅,凌捷.基于动态图的防篡改软件水印实现方案[J].网络安全技术与应用,2005(7):10-13. 被引量:6

共引文献5

同被引文献32

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部