Two Control Computation Transformation Methods for Obfuscating Java Soft Software