Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A functional taxonomy for software watermarking
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
Robust Object Watermarking: Application to Code
IH '99 Proceedings of the Third International Workshop on Information Hiding
Extraction in software watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Tamper-proofing basis path by using oblivious hashing on Java
ACM SIGPLAN Notices
A semi-dynamic multiple watermarking schemefor java applications
Proceedings of the nineth ACM workshop on Digital rights management
Encoding watermark numbers as cographs using self-inverting permutations
Proceedings of the 12th International Conference on Computer Systems and Technologies
Dither modulation watermarking of dynamic memory traces
IH'05 Proceedings of the 7th international conference on Information Hiding
A survey of software watermarking
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
A novel watermarking method for Java programs
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
An important advantage of Java is its portability due to its use of bytecode. However the use of bytecode allows decompilation of Java programs to gain access to their source code. This makes it easier to pirate Java programs, infringing their copyright. This is a disadvantage of Java in comparison with programming languages that compile to native object code.Software watermarking is a relatively new approach to the problem of copyright protection that involves embedding ownership information in an executable program. Watermarking has been extensively researched in the context of multimedia and significant progress has been made toward the development of robust and secure techniques. In this paper we investigate a new software watermarking scheme. This is derived from signal detection theory which is used in multimedia watermarking.