Analysis of watermarking techniques for graph coloring problem
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
A Graph Theoretic Approach to Software Watermarking
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Dynamic path-based software watermarking
Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation
Filtering illegal Android application based on feature information
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Design of a mobile inspector for detecting illegal Android applications using fingerprinting
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Hi-index | 0.00 |
Software watermarking is widely used to protect intellectual property owners of software from piracy. However, existing proposed schemes have shortcomings such that the watermarks can be defeated by semantics-preserving code transformations such as code optimizations, code obfuscations; Moreover, the marks consist of complicated codes, so it can be difficult to combine them with existing program codes. In order to solve these problems, we present a novel software watermarking scheme based on steganography and the Chinese remainder theorem. The watermark is embedded into a program in the form of steganography using a calling convention, so our scheme neither depends on program codes nor increases program size. It also provides an error-correction based on the Chinese remainder theorem in the event that the parts of the watermark are compromised by a wide array of attacks.