Robust Software Watermarking Scheme Using RC4 and HASH

In this paper, a novel software watermarking method using RC4 and Hash function is proposed. The method with good robust can be applied to protect and verify software copyright. The copyright information of ownership should be encrypted by RC4 stream cipher algorithm to ensure that the information is confidentiality, and prevent the information from forging. In order to avoid leaking the copyright information, the hash value is evaluated. Combining the PPCT and permutation encoding, even the code pointers have been attacked, this method will make use of the encrypted data or hash value to reconstruct the Dynamic diagram of the watermark information which was embedded in programs.

[1]  Jens Palsberg,et al.  Experience with software watermarking , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[2]  I. Goulden,et al.  Combinatorial Enumeration , 2004 .

[3]  Baohua Zhao,et al.  Study of One-way Hash Function to Digital Signature Technology , 2006, 2006 International Conference on Computational Intelligence and Security.

[4]  Marc Girault,et al.  Hash-Functions Using Modulo-N Operations , 1987, EUROCRYPT.

[5]  Christian S. Collberg,et al.  Software watermarking: models and dynamic embeddings , 1999, POPL '99.

[6]  M S Waterman,et al.  Identification of common molecular subsequences. , 1981, Journal of molecular biology.

[7]  Zhu Jianqi,et al.  A Novel Dynamic Graph Software Watermark Scheme , 2009, 2009 First International Workshop on Education Technology and Computer Science.

[8]  Yang Yang Design and Analysis of Multivariate Hash Function , 2011 .

[9]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[10]  Bruce Schneier One-way hash functions , 1991 .

[11]  Yao Yao,et al.  Enhancing RC4 algorithm for WLAN WEP protocol , 2010, 2010 Chinese Control and Decision Conference.

[12]  Jianqi Zhu,et al.  A Novel DGW Scheme Based on 2D_PPCT and Permutation , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[13]  Ulrich Wuermeling New EC data protection proposal , 1992 .

[14]  David Chaum,et al.  Advances in Cryptology — EUROCRYPT’ 87 , 2000, Lecture Notes in Computer Science.

[15]  Johannes A. Buchmann,et al.  Introduction to Cryptography , 2001 .

[16]  Ralph C. Merkle,et al.  One Way Hash Functions and DES , 1989, CRYPTO.