期刊文献+

基于Petri网编码的动态图水印技术研究 被引量:3

Study on Dynamic-graph Watermarking Based on Petri Net Coding
下载PDF
导出
摘要 针对动态水印数据嵌入率低的问题,提出一种基于Petri网编码的动态图水印算法。首先,将水印信息进行数列转换,然后将其编码至Petri网的运行状态序列中,最后将生成该Petri网结构的代码嵌入至受保护软件的源代码中。利用Petri网中变迁的发生会产生不同标识的特点,应用同一个Petri网结构表达多个数值,使得该水印编码方案在具有较高的数据嵌入率的同时还具有一定的检错能力,能够成功抵抗包括添加结点、删除部分变迁、删除部分库所和删除部分弧等多种典型的攻击。最后通过实验验证了相关算法的可行性和有效性,并进行了扭曲攻击测试,结果表明基于Petri网编码的动态图软件水印技术具有很强的抗扭曲攻击能力以及鲁棒性。 Aiming at the problem of low data embedding rate of dynamic watermarking,this paper proposed a dynamic-graph watermarking algorithm based on Petri net coding.First,the watermark information is converted into a sequence,and then it is encoded into a running state sequence of Petri net.Finally,the code that generates the Petri net structure is embedded into the source code of the protected software.Since the Petri net transitions will produce different marks,the multiple values are expressed in the same Petri network structure,which means that the watermarking scheme has high data embedding rate and error detection ability,and can successfully resist multiple and typical attacks such as the insertion of nodes,the deletion of transitions,the deletion of places and the deletion of arcs.Finally,the feasibility and effectiveness of the algorithm were verified in the experiment,and the distortion attack test was carried out.The result shows that the dynamic map software watermark based on Petri net coding is robust,and it has a strong ability to resist distortion.
作者 苏庆 林昊 黄剑锋 何凡 林志毅 SU Qing;LIN Hao;HUANG Jian-feng;HE Fan;LIN Zhi-yi(School of Computers,Guangdong University of Technology,Guangzhou 510006,China)
出处 《计算机科学》 CSCD 北大核心 2019年第7期120-125,共6页 Computer Science
基金 国家自然科学基金(61572142) 广东省自然科学基金(2017A030310013,2018A030313389) 广州市科技计划(201604016041)资助
关键词 软件保护 软件水印 动态图水印 Petri网编码 数据嵌入率 Software protection Software watermarking Dynamic-graph watermarking Petri net coding Data embedding rate
  • 相关文献

参考文献2

二级参考文献15

  • 1LU Zheming LI Suzhi.Multipurpose Watermarking Algorithm for Secret Communication[J].Chinese Journal of Electronics,2006,15(1):79-84. 被引量:3
  • 2钮心忻,杨义先.信息隐写与隐写分析研究框架探讨[J].电子学报,2006,34(B12):2421-2424. 被引量:10
  • 3Collberg C, Thomborson C. Software watermarking: Models and dynamic embeddings[C]// Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York: ACM, 1999:311-324.
  • 4Collberg C, Thomborson C, Townsend G. Dynamic graph-based software watermarking[R]. Tucson, AZ, USA: University of Arizona, 2004: TR04-08.
  • 5Moskowitz S, Cooperman 1VL Method for stega-cipher protection of computer code: US, 5745569 [P]. 1998- 04-28[2011-04-15].
  • 6He Yong. Tamperproofing a Software Watermark by Encoding Constants [ D]. Auckland, New Zealand: University of Auckland, 2002.
  • 7Holmes K. Computer software protection: US, 5287407 [P]. 1994-02-15[2011-04-15].
  • 8Khiyal M, Khan A, Amjad S, et al. Evaluating effectiveness of tamper proofing on dynamic graph software watermarks [ J ]. International Journal of Computer Science and Information Security, 2009, 6 (3) : 57-63.
  • 9Collberg C, Jha S, Tomko D, et al. UWStego.. A general architecture for software watermarking [EB/ OL]. Madison, WI, USA: University of Wisconsin- Madison, 2001 [ 2011-04-15]. http://www. cs. wisc. edu/hbwang/watermark/TR.
  • 10Myles G. Software theft detection through program identification[D]. University of Arizona, Tucson AZ, 2006 : 56-68.

共引文献11

同被引文献24

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部