Manufacturing cheap, resilient, and stealthy opaque constructs
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Analysis of watermarking techniques for graph coloring problem
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Protection of Computer Software: Its Technology and Application
Protection of Computer Software: Its Technology and Application
A functional taxonomy for software watermarking
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Copyright Protection of Object-Oriented Software
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Hiding Signatures in Graph Coloring Solutions
IH '99 Proceedings of the Third International Workshop on Information Hiding
Robust Object Watermarking: Application to Code
IH '99 Proceedings of the Third International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Experience with software watermarking
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
A system for watermarking relational databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Watermarking relational data: framework, algorithms and analysis
The VLDB Journal — The International Journal on Very Large Data Bases
Tamper-proofing software watermarks
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
wmdb.*: Rights Protection for Numeric Relational Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
Extraction in software watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. (Lecture Notes in Computer Science)
Information-theoretic analysis of watermarking
ICASSP '00 Proceedings of the Acoustics, Speech, and Signal Processing, 2000. on IEEE International Conference - Volume 06
IH'04 Proceedings of the 6th international conference on Information Hiding
Covering based granular computing for conflict analysis
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Self-validating branch-based software watermarking
IH'05 Proceedings of the 7th international conference on Information Hiding
A survey of software watermarking
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
On the QP algorithm in software watermarking
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Algorithms to watermark software through register allocation
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Applications of homomorphic functions to software obfuscation
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Information-theoretic analysis of information hiding
IEEE Transactions on Information Theory
Properties of the Second Type of Covering-Based Rough Sets
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
A semi-dynamic multiple watermarking schemefor java applications
Proceedings of the nineth ACM workshop on Digital rights management
Informed recognition in software watermarking
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
A novel watermarking method for software protection in the cloud
Software—Practice & Experience
Hi-index | 0.00 |
The piracy of software has long been a concern for owners and developers of software. In order to prevent software from piracy and unauthorized modification, many techniques to protect software have been developed. Software watermarking is such a technique for protecting software by embedding secret information into the software to identify its copyright owner. As a relatively new scientific area, the key concepts in software watermarking are informal; some are even confusing. There is a need to formalize these fundamental terms to facilitate the research in this field. In this paper, we formally define some concepts for software watermark recognition and use them to develop some software watermarking recognition algorithms for the QP software watermarking algorithm. We also design a prototype model of software watermark embedding and recognition system based on the concepts and algorithms established in this paper.