A survey of software watermarking

  • Authors:
  • William Zhu;Clark Thomborson;Fei-Yue Wang

  • Affiliations:
  • Department of Computer Sciences, The University of Auckland, Auckland, New Zealand;Department of Computer Sciences, The University of Auckland, Auckland, New Zealand;Systems and Industrial Engineering Department, The University of Arizona, Tucson, AZ

  • Venue:
  • ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the Internet age, software is one of the core components for the operation of network and it penetrates almost all aspects of industry, commerce, and daily life. Since digital documents and objects can be duplicated and distributed easily and economically cheaply and software is also a type of digital objects, software security and piracy becomes a more and more important issue. In order to prevent software from piracy and unauthorized modification, various techniques have been developed. Among them is software watermarking which protects software through embedding some secret information into software as an identifier of the ownership of copyright for this software. This paper gives a brief overview of software watermarking. It describes the taxonomy, attack models, and algorithms of software watermarking.