期刊文献+

一种基于代码加密的防篡改软件水印方案 被引量:7

A tamper-proof software watermark using code-based encryption
下载PDF
导出
摘要 提出一种基于代码加密的防篡改软件水印方案,并对隐藏水印信息的PPCT结构进行改进.水印嵌入过程中,利用秘密分享方案,对代表版权信息的大数进行分割,以提高水印信息的隐蔽性.通过修改软件的源代码和目标代码实现水印的嵌入过程,根据特定的策略对部分目标代码进行加密,并提高加解密密钥与程序自身的关联聚合度,从而增强软件水印的鲁棒性以及防篡改能力. Utilizing a modified PPCT structure,a tamper-proof software watermark solution with code-based encryption was proposed.The general Chinese remainder theorem was exploited to split the watermark which was represented as a big number into pieces to enhance stealthiness.Changes to the source and object code were made to embed the watermark,and according to certain policies some parts of the object code was encrypted with an en/decryption key that was highly coupled with the object code to increase robustness and tamper-proof capability.
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2011年第7期599-606,共8页 JUSTC
基金 国家自然科学基金(61070176) 陕西省科技攻关项目(2011K06-07) 陕西省教育厅产业化示范项目(2010JC24,2010JC25) 西北大学研究生创新基金(09YZZ62,10YZZ16)资助
关键词 软件水印 动态图水印 广义中国剩余定理 代码加密 防篡改 software watermark dynamic graph general Chinese remainder theorem code encryption tamper-proof
  • 相关文献

参考文献12

  • 1Collberg C, Thomborson C. Software watermarking: Models and dynamic embeddings[C]// Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York: ACM, 1999:311-324.
  • 2Collberg C, Thomborson C, Townsend G. Dynamic graph-based software watermarking[R]. Tucson, AZ, USA: University of Arizona, 2004: TR04-08.
  • 3Moskowitz S, Cooperman 1VL Method for stega-cipher protection of computer code: US, 5745569 [P]. 1998- 04-28[2011-04-15].
  • 4He Yong. Tamperproofing a Software Watermark by Encoding Constants [ D]. Auckland, New Zealand: University of Auckland, 2002.
  • 5Holmes K. Computer software protection: US, 5287407 [P]. 1994-02-15[2011-04-15].
  • 6Khiyal M, Khan A, Amjad S, et al. Evaluating effectiveness of tamper proofing on dynamic graph software watermarks [ J ]. International Journal of Computer Science and Information Security, 2009, 6 (3) : 57-63.
  • 7Collberg C, Jha S, Tomko D, et al. UWStego.. A general architecture for software watermarking [EB/ OL]. Madison, WI, USA: University of Wisconsin- Madison, 2001 [ 2011-04-15]. http://www. cs. wisc. edu/hbwang/watermark/TR.
  • 8Myles G. Software theft detection through program identification[D]. University of Arizona, Tucson AZ, 2006 : 56-68.
  • 9张立和,杨义先,钮心忻,牛少彰.软件水印综述[J].软件学报,2003,14(2):268-277. 被引量:89
  • 10Collberg C, Jasvir N. Surreptitious Software Obfuscation, Watermarking, and Tamperproofing for Software Protection[ M ]. Addison-Wesley Professional, 2009: 526-528.

共引文献88

同被引文献65

  • 1虞泳.基于公钥加密算法和PPCT动态图编码的软件指纹方案[J].电脑与信息技术,2006,14(2):38-40. 被引量:2
  • 2芦斌,罗向阳,刘粉林.一种基于混沌的软件水印算法框架及实现[J].软件学报,2007,18(2):351-360. 被引量:15
  • 3刘方.变换域加密图像数字水印算法研究[D].山东:山东师范大学.
  • 4杨建龙,王建民,李德毅.软件水印技术及其新进展[J].计算机工程,2007,33(17):168-170. 被引量:14
  • 5YANG T, YANG L B, YANG C M. Breaking chaotic switching using generalized synchronization example [J]. IEEE Transac- tions on Circuits and Systems I, 1998, 45(10) : 1062-1068.
  • 6PEZESHK A, TUTWILER R L. Contour line recognition & extraction from scanned colour maps using dual quantization of the intensity image [C]// Proceedings of 2008 IEEE South- west Symposium on Image Analysis and Interpretation. [S.l.]: IEEE, 2008: 173-176.
  • 7MIAO Qi-guang, XU Peng-fei, LIU Tian-ge, et al. Linear fea- ture separation from topographic maps using energy density and shear transform [J]. IEEE Transaction on Image Pro- eessing, 2013, 22(4): 1548-1558.
  • 8XU Peng-fei, MIAO Qi-guang, CHENG Shi, et al. An edge detection algorithm based on the multi-direction Shear trans- form [J]. Journal of Visual Communication and Image Repre- sentation, 2012, 23: 827-833.
  • 9QI Xiao-jun, QI Ji. A robust content-based digital image wa- termarking scheme [J]. Signal Processing, 2007, 87(6) : 1264- 1280.
  • 10徐晓静,徐向阳,梁海华.基于PE文件资源结构的水印算法[J].计算机工程与设计,2007,28(23):5802-5804. 被引量:5

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部