期刊文献+

基于改进的KPPCT编码的防篡改动态图水印方案 被引量:1

A Tamper-proofing Dynamic Graph Watermarking Scheme Based on Improved KPPCT Encoding
下载PDF
导出
摘要 针对动态图水印中的KPPCT编码的数据率低和鲁棒性差的问题,提出了一种改进的KPPCT(Improved Radix-k Planted Plane Cubic Tree,IKPPCT)编码方案.该方案利用二叉树左右分支的唯一性进行系数编码,扩大了水印值的表示范围;并且引入了防篡改的思想,用以验证水印结构是否被破坏,加强了保护的功能.理论分析和实验结果表明,该改进方案提高了数据率和鲁棒性,是一个较好的方案. This paper proposed a improved KPPCT (IKPPCT ,Improved Radix-k Planted Plane Cubic Tree) encoding scheme towards the problem of the lower data rate and the weak robustness of KPPCT encoding in dynamic graph watermarking .This scheme took advantage of uniqueness of binary tree's left-right branches to encode coefficient and expanded the range of watermarking value . And also it strengthened the ability to protect software by introducing the tamper-proofing to verify whether the watermarking structure was destroyed .Theoretical analysis and experimental results show that this scheme has high data rate and robustness ,and is a better scheme .
出处 《微电子学与计算机》 CSCD 北大核心 2013年第11期35-38,共4页 Microelectronics & Computer
基金 山西省科技攻关项目(20090322004)
关键词 动态图水印 IKPPCT编码 防篡改 数据率 鲁棒性 dynamic graph watermarking IKPPCT encoding scheme tamper-proofing data rate robustness
  • 相关文献

参考文献5

  • 1张立和,杨义先,钮心忻,牛少彰.软件水印综述[J].软件学报,2003,14(2):268-277. 被引量:89
  • 2Collberg C, Thomborson C. Software watermarking: models and dynamic embeddings[C]//Proc of ACM Sigplan Sigact symposium on Principle of Programming Language. Association for Computing Machiney Press, 1999 : 311-324.
  • 3Collberg C, Thomborson C, Townsend G M. Dynamic graph-based software watermarking[R]. Technical Re- port TR-04-08, Department of computer science Uni- versity of Arizon & Auckland, 2004.
  • 4刘建蓉,秦拯,彭程.改进的动态图水印技术编码方案[J].计算机应用研究,2011,28(2):720-723. 被引量:5
  • 5Palsberg J, Krishnaswami, Kown M, et al. Experience with software watermarking[C]//Proc of the 16th An- nual Computer Application Conference. Washington DC: IEEE Computer Society,2000: 308-316.

二级参考文献9

  • 1白雪梅,凌捷.基于动态图的防篡改软件水印实现方案[J].网络安全技术与应用,2005(7):10-13. 被引量:6
  • 2BSAIDC.Keyfindings-firstannualBSAandIDCglobalsoftwarepiracystudy[EB/OL].(2010-05-07)[2010-08-03].http://www.bsa.org/globalstudy.html.
  • 3COLLBERG C, THOMBORSON C. Software watermarking: models and dynamic embeddings[C]// Proc of Symposium on Principles of Programming Languages. New York:ACM, 1999:311-324.
  • 4VENKATESAN R, VAZIRANI V, SINHA S. A graph theoretic approach to software watermarking[C]//Proc of the 4th International Hiding Workshop. London UK:Springer-Verlag, 2001:157-168.
  • 5COLLBERG C, HUNTWORKS A, CARTER E, et al. More on graph theoretic software watermarks: implementation, analysis, and attacks[J].Information and Software Technology, 2009,51(1):56-67.
  • 6PALSBERG J, KRISHNASWAMI, KOWN M, et al. Experience with software watermarking[C]//Proc of the 16th Annual Computer Application Conference. Washington DC:IEEE Computer Society, 2000:308-316.
  • 7WANG Yong, YANG Yi-xian. A software watermark database scheme based on PPCT[C]//Proc of CIHW2004. 2004.
  • 8ZHU Jian-qi, LIU Yan-heng, YIN Ke-xin. A novel dynamic graph software watermark scheme[C]//Proc of the 1st International Workshop on Education Technology and Computer Science. Washington DC:IEEE Computer Society, 2009:775-780.
  • 9张立和,杨义先,钮心忻,牛少彰.软件水印综述[J].软件学报,2003,14(2):268-277. 被引量:89

共引文献92

同被引文献13

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部