Recognition in software watermarking

The piracy of software has long been a concern for owners and developers of software. In order to prevent software from piracy and unauthorized modification, many techniques to protect software have been developed. Software watermarking is such a technique for protecting software by embedding secret information into the software to identify its copyright owner. As a relatively new scientific area, the key concepts in software watermarking are informal; some are even confusing. There is a need to formalize these fundamental terms to facilitate the research in this field. In this paper, we formally define some concepts for software watermark recognition and use them to develop some software watermarking recognition algorithms for the QP software watermarking algorithm. We also design a prototype model of software watermark embedding and recognition system based on the concepts and algorithms established in this paper.

[1]  Clark Thomborson,et al.  A PROVABLE SCHEME FOR HOMOMORPHIC OBFUSCATIONS IN SOFTWARE SECURITY , 2005 .

[2]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of watermarking , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[3]  Josef Pieprzyk,et al.  Fingerprints for Copyright Software Protection , 1999, ISW.

[4]  Jean-Jacques Quisquater,et al.  Robust Object Watermarking: Application to Code , 1999, Information Hiding.

[5]  Clark Thomborson,et al.  Software Watermarking: Protective Terminology , 2001 .

[6]  Gang Qu,et al.  Analysis of watermarking techniques for graph coloring problem , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).

[7]  Gael Hachez,et al.  A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards , 2003 .

[8]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[9]  Derrick Grover,et al.  The Protection of Computer Software: Its Technology and Application , 1992 .

[10]  Christian S. Collberg,et al.  Detecting Software Theft via Whole Program Path Birthmarks , 2004, ISC.

[11]  William Zhu,et al.  Algorithms to Watermark Software Through Register Allocation , 2005, DRMTICS.

[12]  William Zhu,et al.  Extraction in software watermarking , 2006, MM&Sec '06.

[13]  Peter J. Haas,et al.  A system for watermarking relational databases , 2003, SIGMOD '03.

[14]  Edward J. Delp,et al.  Further progress in watermark evaluation testbed (WET) , 2005, IS&T/SPIE Electronic Imaging.

[15]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .

[16]  William Zhu,et al.  On the QP Algorithm in Software Watermarking , 2005, ISI.

[17]  Christian S. Collberg,et al.  On the Limits of Software Watermarking , 1998 .

[18]  Edward J. Delp,et al.  Natural language watermarking , 2005, IS&T/SPIE Electronic Imaging.

[19]  Clark Thomborson,et al.  Tamper-proofing software watermarks , 2004 .

[20]  Fei-Yue Wang,et al.  Applications of Homomorphic Functions to Software Obfuscation , 2006, WISI.

[21]  Christian S. Collberg,et al.  Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks , 2003, ICISC.

[22]  Jasvir Nagra,et al.  Threading Software Watermarks , 2004, Information Hiding.

[23]  Jens Palsberg,et al.  Experience with software watermarking , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[24]  Katsuro Inoue,et al.  A practical method for watermarking Java programs , 2000, Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000.

[25]  Radu Sion,et al.  Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.

[26]  Fei-Yue Wang,et al.  A Survey of Software Watermarking , 2005, ISI.

[27]  Ramarathnam Venkatesan,et al.  A Graph Theoretic Approach to Software Watermarking , 2001, Information Hiding.

[28]  Krishnaswamy Palsberg,et al.  A Functional Taxonomy for Software Watermarking , 2002 .

[29]  Radu Sion,et al.  Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.

[30]  Fei-Yue Wang,et al.  Obfuscate arrays by homomorphic functions , 2006, 2006 IEEE International Conference on Granular Computing.

[31]  Radu Sion,et al.  Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.

[32]  Christian S. Collberg,et al.  Software watermarking: models and dynamic embeddings , 1999, POPL '99.

[33]  Radu Sion,et al.  wmdb.*: rights protection for numeric relational data , 2004, Proceedings. 20th International Conference on Data Engineering.

[34]  Christian S. Collberg,et al.  Software watermarking via opaque predicates: Implementation, analysis, and attacks , 2006, Electron. Commer. Res..

[35]  Hongxia Jin,et al.  Self-validating Branch-Based Software Watermarking , 2005, Information Hiding.

[36]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[37]  Clark Thomborson,et al.  Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.

[38]  Pierre Moulin,et al.  Game-theoretic analysis of watermark detection , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[39]  Josef Pieprzyk,et al.  Copyright Protection of Object-Oriented Software , 2001, ICISC.

[40]  Fei-Yue Wang,et al.  Covering Based Granular Computing for Conflict Analysis , 2006, ISI.

[41]  Peter J. Haas,et al.  Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.

[42]  Miodrag Potkonjak,et al.  Hiding Signatures in Graph Coloring Solutions , 1999, Information Hiding.