ACM Transactions on Computer Systems (TOCS)
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A Secure, Robust Watermark for Multimedia
Proceedings of the First International Workshop on Information Hiding
Modulation and Information Hiding in Images
Proceedings of the First International Workshop on Information Hiding
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
Copyright Protection of Object-Oriented Software
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Steganography for executables and code transformation signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.00 |
The work studies the problem of copyright protection of software using cryptographic fingerprinting. The identity of software must be unique for each copy. There are two classes of identities: one is based on equivalent variants of the program and the other applies behaviour of the software as its identity. For these two types of identity, we introduce two different fingerprint schemes. The two schemes use digital signatures and can be easily combined and extended to be resilient against partial fingerprint destruction.