A strategy of software protection based on multi-watermarking embedding
暂无分享,去创建一个
By introducing the current research status in software protection, the paper propose a multi-watermarking embedding algorithm to protect the whole software. The watermark information is separated at first and encrypted with the hyper-chaotic sequence, then each of the watermark is embedded into the core location of the program by the mapping fuction. Between the watermarks the effective tamper-proofing is established, if the tampering occurred, the watermark should sense and terminate the program immediately to protect the program. The experiments indicate its robustness is stronger.
[1] Gregg M. Townsend,et al. Dynamic Graph-Based Software Watermarking , 2004 .
[2] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[3] Genevieve Arboit,et al. A Method for Watermarking Java Programs via Opaque Predicates , 2002 .
[4] Katsuro Inoue,et al. A practical method for watermarking Java programs , 2000, Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000.