期刊文献+

一种基于栈分配的软件水印算法 被引量:2

Software Watermarking Algorithm Based on Stack Allocation
下载PDF
导出
摘要 文章通过对堆栈平衡原理的分析,并在借鉴多媒体扩频水印思想的基础上,提出了基于栈分配的软件水印方案。该方案通过对栈大小的修改来嵌入水印信息,嵌入后又采用了栈访问混淆技术使得软件水印信息与程序代码产生紧密的依赖关系。分析表明,水印信息与程序代码之间的这种紧密依赖关系使得该方案能够有效抵抗多种攻击如添加攻击、去除攻击、变形攻击等,具有很高的鲁棒和隐蔽性。 Software watermarking algorithm based on stack allocation is proposed in this paper by analyzing the stack balance principle and draw on the ideas of multi-media spreaD-spectrum watermark.This scheme embeds watermark information by modifying the size of the stack,and then applies the stack access confusion technology to make software watermark information and the program code produce a close dependency.An analysis shows that the tight dependency between the watermark information and the program code makes the algorithm effectively resist various attacks such as additive attack,subtractive attack,and distortive attack etc.Meanwhile the algorithm has a higher robustness and invisibility.
作者 张海超 陈丹
出处 《计算机与数字工程》 2012年第8期71-73,86,共4页 Computer & Digital Engineering
关键词 堆栈平衡 扩频 软件水印 软件保护 混沌映射 鲁棒性 stack balance spread spectrum software watermark software protection chaos mapping robustness
  • 相关文献

参考文献14

  • 1C. COId.BERG, C. THOMBORSON. Software watermarking models and dynamic embeddings[C]. In 26th ACM SIGPLAN SIGACT Symposium on Principles of Programming Languages 1999:311-324.
  • 2杨建龙,王建民,李德毅.软件水印技术及其新进展[J].计算机工程,2007,33(17):168-170. 被引量:14
  • 3S. JAMAL H. ZAIDI, HONGXIA WANG. On the analysis of software watermarking[C]. 2010 2nd International Conference on Software Technology and Engineering, 2010,1:26-30.
  • 4JAMES HAMILTON, SEBASTIAN DANICIC. A survey of static software watermarking[C]. 2011 World Congress on In- ternet Security (World CIS), 2011 : 100-107.
  • 5INGEMAR J. COX, JOE KILIAN, FRANK THOMSON I.EIGHTON, TALAL SHAMOON. A secure, robust water- mark for multimedia[C]. In Proceedings of the First Interna tional Workshop on Information Hiding, 1996 : 1174,185-206.
  • 6STERN J, HACHEZ G, KOENUE F. Robust object water marking: application to code[C]//Proceedings of the 3rd Inter national Workshop on Information Hiding. Springe Verlag 2000: 1768,368-378.
  • 7JIEQING AI, XINGMING SUN, YUNHAO LIU, INGE MAR J. COX, GUANG SUN, YI LUO. A stern-based collu sion secure software watermarking algorithm and its implemen- tation[C]. In Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering. IEEE Computer Society,2007 : 813 -818.
  • 8D. CURRAN, N. J. HURLEY, M. O. CINNEII)E. Securing java through software watermarking[C]. In Proceedings of the 2nd international conference on Principles and practice of pro gramming in Java, 2003 : 311-324.
  • 9张立和,杨义先,钮心忻,牛少彰.软件水印综述[J].软件学报,2003,14(2):268-277. 被引量:89
  • 10吴建军,高济.基于指令统计分布的软件水印方案[J].浙江大学学报(工学版),2005,39(2):225-228. 被引量:8

二级参考文献27

  • 1COLLBERG C, THOMBORSON C. Software watermarking: Models and dynamic embeddings [A]. Proceedings of 26th Annual SIGPLAN-SIGACT Symon Principles of Programming Languages [C]. New York: ACM, 1999: 311-324.
  • 2MONDEN A, LIDA H, MATSUMOTO K I, et al. A practical method for watermarking Java programs [A]. Proceedings of 24th Computer Software and Applications Conference [C]. Los Alamitos: IEEE-CS, 2000: 191-197.
  • 3ARBOIT G. A method for watermarking Java programs via opaque predicates [A]. Proceedings of Fifth International Conference on Electronic Commerce Research [C]. Los Alamitos: IEEE-CS,2002: 124-131.
  • 4COX J I, KILIAN J, LEIGHTON T, et al. A secure, robust watermark for multimedia [A]. Proceedings of First International Information Hiding Workshop [C]. Berlin: Springer-Verlag, 1996: 185-206.
  • 5STERN J P, HACHEZ G, KOEUNE F, et al. Robust object watermarking: Application to code [A]. Proceedings of Third International Information Hiding Workshop [C]. Berlin: Springer-Verlag, 1999: 368-378.
  • 6RAMKUMAR M, AKANSU N A. Image watermarks and counterfeit attacks: Some problems and solutions [A]. Proceedings of Content Security and Data Hiding in Digital Media [C]. Los Alamitos: IEEE-CS,1999: 161-169.
  • 7LINDHOLM T,YELLIN F. The Java virtual machine specification [EB/OL]. http: //java.sun.com/docs/books/vmspec/index.html. 1999.
  • 8Collberg C,Thomborson C.Software Watermarking:Models and Dynamic Embeddings[C]//Proc.of POPL'99.New York:ACM Press,1999:311-324.
  • 9Stern J P,Hachez G,Koeune F,et al.Robust Object Watermarking:Application to Code[C]//Proc.of IH'99.New York:ACM Press,1999:368-378.
  • 10Palsberg J,Krishnaswamy S,Kwon M,et al.Experience with Software Watermarking[C]//Proc.of ACSAC'00.New York:ACM Press,2000:308-316.

共引文献95

同被引文献41

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部