期刊文献+

基于PPCT和基数k的动态图混合编码方案 被引量:9

Dynamic graph hybrid encoding scheme based on PPCT and radix-k
下载PDF
导出
摘要 针对PPCT动态图编码效率低的特点,提出了一种将PPCT枚举编码和基数k枚举编码进行混合编码的动态图编码方案。在保证其抗攻击力的前提下,为了提高PPCT枚举编码的编码效率,把基数k枚举编码的循环链表指针编码系数的方法运用到PPCT枚举编码中。该编码方案具有PPCT枚举编码的抗攻击能力和基数k枚举编码的编码效率,克服了PPCT动态图编码效率低的缺点。 In this paper a new dynamic graph encoding scheme based on hybrid encoding between radix-k encoding enumeration and PPCT encoding enumeration is proposed for improving the low efficiency of PPCT dynamic graph encoding.In the premise of against a variety of attacks, the method that the pointer of circular linked list is used to encode the coefficients in radix-k encoding enumeration to PPCT encoding enumeration is applied, in order to improve the efficiency of PPCT.So this new scheme not only has the same capacity of against a variety of attacks as in PPCT, but also has the same efficiency of encoding as in radix-k encoding enumeration, and it overcomes the shortcoming of the low efficiency of PPCT dynamic graph encoding.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第25期109-111,共3页 Computer Engineering and Applications
基金 桂林电子科技大学博士科研基金(No.Z206116) 广西研究生教育创新计划资助项目(No.2009105950812M23)
关键词 软件水印 平面环路树(PPCT) 基数k编码 混合编码 software watermarking Planted Plane Cubic Tree radix-k encoding hybrid encoding
  • 相关文献

参考文献5

  • 1张立和,杨义先,钮心忻,牛少彰.软件水印综述[J].软件学报,2003,14(2):268-277. 被引量:89
  • 2Collberg C, Thomborson C.Software watermarking : Models and dynamic embeddings[C]//ACM SIGPLAN-SIGACT Symposium on Principles of Programming Language, Tucson, 1999: 311-324.
  • 3杨建龙,王建民,李德毅.软件水印技术及其新进展[J].计算机工程,2007,33(17):168-170. 被引量:14
  • 4Collberg C, Thomborson C, Townsend G.Dynamic graph-based software watermarking, Technical Report TR04-08[R].Department of Computer Science,University of Arizona(USA),2004.
  • 5Thomborson C,Nagra J,Somaraju R,et al.Tamper-proofing software watermarks[C]//Montague P, Steketee C.Proc of the 2rid Australasian Information Security Workshop,2004: 27-36.

二级参考文献20

  • 1Collberg C,Thomborson C.Software Watermarking:Models and Dynamic Embeddings[C]//Proc.of POPL'99.New York:ACM Press,1999:311-324.
  • 2Stern J P,Hachez G,Koeune F,et al.Robust Object Watermarking:Application to Code[C]//Proc.of IH'99.New York:ACM Press,1999:368-378.
  • 3Palsberg J,Krishnaswamy S,Kwon M,et al.Experience with Software Watermarking[C]//Proc.of ACSAC'00.New York:ACM Press,2000:308-316.
  • 4Venkatesan R,Vazirani V,Sinha S.A Graph Theoretic Approach to Software Watermarking[C]//Proc.of IH'01.New York:ACM Press,2001:157-168.
  • 5Collberg C,Kobourov S,Carter E,et al.Error-correcting Graphs for Software Watermarking[C]//Proc.of the 29th Workshop on Graphs Theoretic Concepts in Computer Science,Elspeet,The Netherlands.2003.
  • 6Collberg C,Thomborson C,Townsend G.Dynamic Graph-based Software Watermarking[R].Department of Computer Science,University of Arizona,Tech Rep:TR04-08,2004.
  • 7Collberg C,Huntwork A,Carter E,et al.Graph Theoretic Software Watermarks:Implementation,Analysis,and Attacks[C]//Proc.of IH'04,Toronto,Canada.2004.
  • 8Myles G,Collberg C.Software Watermarking Through Register Allocation:Implementation,Analysis,and Attacks[C]//Proc.of ICISC'03.Berlin:Springer-Verlag,2003:274-293.
  • 9Sahoo T R,Collberg C.Software Watermarking in the Frequency Domain:Implementation,Analysis,and Attacks[R].Department of Computer Science,University of Arizona,Tech Rep:TR04-07,2004.
  • 10Curran D,Hurley N J,Cinneide M O.Securing Java Through Software Watermarking[C]//Proc.of PPPJ'03.New York:ACM Press,2003:145-148.

共引文献92

同被引文献91

引证文献9

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部