期刊文献+

基于程序设计的软件水印关键技术研究 被引量:1

Research on Key Technology of Software Watermark Based on Programming
下载PDF
导出
摘要 应用程序设计技术实现软件水印,比较了两种当前主流的软件水印实现方式,研究了一种与软件开发过程同步的软件水印技术,从软件水印的嵌入和提取两个方面对这种新的软件水印技术进行描述和形式化证明,开发出一个同步嵌入软件水印的示例程序来演示软件开发商信息的嵌入和提取过程。结果表明采用程序设计实现的软件水印技术可以很好地完成软件版权信息的隐藏和提取工作,是一种用于版权保护工作的有效方法。 This paper studied software watermark implemented by programming. After comparing the two main ways to implement software watermark,a new kind of software watermark developed together with software itself was researched in this paper. The processes of embedding and extracting and the formal proof of the new software watermark were described. A demonstration of synchronous embedding software watermark showed how to embed and extract the declaration of the ownership. The result indicate that software watermark based on programming could well complete the mission of hiding and extracting the software copyright information and could be an effective method of copyright protection.
出处 《电脑知识与技术》 2009年第9X期7725-7727,共3页 Computer Knowledge and Technology
关键词 软件水印 程序设计 版权保护 同步嵌入 software watermark programming copyright protection synchronous embedding
  • 相关文献

参考文献4

二级参考文献27

  • 1W Bender,D Gruhl,N Morimoto. Techniques for data hiding[R].Technical Report,MIT Media Lab,1994
  • 2Stefan Katzenbeisser,Fabien A P Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking[M].Artech House Publishers, 2000
  • 3Microsoft Corporation. Microsoft Portable Executable and Common Object File Format Specification,Revision 6.0[EB/OL].1999-02
  • 4GigaMind Systems.PE Corrector Overview[CP/OL].http://www.gigamindsystems.com/pec/pec.php
  • 5徐孝楷.数据结构实用教程(C/C++描述)[M].清华大学出版社,1999-12..
  • 6Grig Software. Compare It V3.5.2[CP/OL].http://www.grigsoft.com/
  • 7Yinrong Huang. Vulnerabilities in Portable Executable(PE) File Format For Win32 Architecture[EB/OL].http://members.rogers.com/exurity/,2003 -04
  • 8Collberg C,Thomborson C.Software Watermarking:Models and Dynamic Embeddings[C]//Proc.of POPL'99.New York:ACM Press,1999:311-324.
  • 9Stern J P,Hachez G,Koeune F,et al.Robust Object Watermarking:Application to Code[C]//Proc.of IH'99.New York:ACM Press,1999:368-378.
  • 10Palsberg J,Krishnaswamy S,Kwon M,et al.Experience with Software Watermarking[C]//Proc.of ACSAC'00.New York:ACM Press,2000:308-316.

共引文献104

同被引文献6

  • 1吴振强,冯绍东,马建峰.PE文件的信息隐藏方案与实现[J].计算机工程与应用,2005,41(27):148-150. 被引量:18
  • 2王勇.软件水印的理论与技术[R]北京:北京邮电大学,2003.
  • 3杨义先;钮心忻.数字水印理论与技术[M]北京:高等教育出版社,2006340-347.
  • 4Collberg C,Thomborson C,Townsend G.M. Dynamic Graphbased Software Watermarking[R].New Zealand:University of Auckland,2004.
  • 5张力.Visual C++高级编程[M]北京:人民邮电出版社,2002.
  • 6张勇,赵东宁,李德毅.数字水印技术及进展[J].解放军理工大学学报(自然科学版),2003,4(3):1-5. 被引量:27

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部