Chroni et al., 2011 - Google Patents
Efficient encoding of watermark numbers as reducible permutation graphsChroni et al., 2011
View PDF- Document ID
- 2594247114964415093
- Author
- Chroni M
- Nikolopoulos S
- Publication year
- Publication venue
- arXiv preprint arXiv:1110.1194
External Links
Snippet
In a software watermarking environment, several graph theoretic watermark methods use numbers as watermark values, where some of these methods encode the watermark numbers as graph structures. In this paper we extended the class of error correcting graphs …
- 238000000034 method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Cui et al. | A robust FSM watermarking scheme for IP protection of sequential circuit design | |
| Collberg et al. | Dynamic path-based software watermarking | |
| CN104335219B (en) | Use variable-dependent coding to protect accessible systems | |
| Collberg et al. | Dynamic graph-based software fingerprinting | |
| El-Khalil et al. | Hydan: Hiding information in program binaries | |
| Chroni et al. | An efficient graph codec system for software watermarking | |
| Collberg et al. | More on graph theoretic software watermarks: Implementation, analysis, and attacks | |
| Collberg et al. | Error-correcting graphs for software watermarking | |
| Collberg et al. | Dynamic graph-based software watermarking | |
| US8141162B2 (en) | Method and system for hiding information in the instruction processing pipeline | |
| Collberg et al. | Graph theoretic software watermarks: Implementation, analysis, and attacks | |
| Yang et al. | Srcmarker: Dual-channel source code watermarking via scalable code transformations | |
| Kim et al. | Romadroid: A robust and efficient technique for detecting android app clones using a tree structure and components of each app’s manifest file | |
| Huang et al. | Smart contract watermarking based on code obfuscation | |
| Chroni et al. | Efficient encoding of watermark numbers as reducible permutation graphs | |
| Chroni et al. | An embedding graph-based model for software watermarking | |
| Chroni et al. | Encoding watermark integers as self-inverting permutations | |
| Chionis et al. | A dynamic watermarking model for embedding reducible permutation graphs into software | |
| Hamilton et al. | An evaluation of the resilience of static java bytecode watermarks against distortive attacks | |
| Chionis et al. | Evaluating the WaterRpg software watermarking model on Java application programs | |
| Bento et al. | Full characterization of a class of graphs tailored for software watermarking | |
| Chroni et al. | Design and Evaluation of a Graph Codec System for Software Watermarking. | |
| CN109933962B (en) | Software watermarking method based on question guess | |
| Mpanti et al. | Graph-structured watermarking using bitonic sequences of self-inverting permutations | |
| US20040034602A1 (en) | Method and apparatus for watermarking binary computer code |