A strategy of software protection based on multi-watermarking embedding

By introducing the current research status in software protection, the paper propose a multi-watermarking embedding algorithm to protect the whole software. The watermark information is separated at first and encrypted with the hyper-chaotic sequence, then each of the watermark is embedded into the core location of the program by the mapping fuction. Between the watermarks the effective tamper-proofing is established, if the tampering occurred, the watermark should sense and terminate the program immediately to protect the program. The experiments indicate its robustness is stronger.

[1]  Gregg M. Townsend,et al.  Dynamic Graph-Based Software Watermarking , 2004 .

[2]  Christian S. Collberg,et al.  Software watermarking: models and dynamic embeddings , 1999, POPL '99.

[3]  Genevieve Arboit,et al.  A Method for Watermarking Java Programs via Opaque Predicates , 2002 .

[4]  Katsuro Inoue,et al.  A practical method for watermarking Java programs , 2000, Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000.