[go: up one dir, main page]

Chroni et al., 2011 - Google Patents

Efficient encoding of watermark numbers as reducible permutation graphs

Chroni et al., 2011

View PDF
Document ID
2594247114964415093
Author
Chroni M
Nikolopoulos S
Publication year
Publication venue
arXiv preprint arXiv:1110.1194

External Links

Snippet

In a software watermarking environment, several graph theoretic watermark methods use numbers as watermark values, where some of these methods encode the watermark numbers as graph structures. In this paper we extended the class of error correcting graphs …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring

Similar Documents

Publication Publication Date Title
Cui et al. A robust FSM watermarking scheme for IP protection of sequential circuit design
Collberg et al. Dynamic path-based software watermarking
CN104335219B (en) Use variable-dependent coding to protect accessible systems
Collberg et al. Dynamic graph-based software fingerprinting
El-Khalil et al. Hydan: Hiding information in program binaries
Chroni et al. An efficient graph codec system for software watermarking
Collberg et al. More on graph theoretic software watermarks: Implementation, analysis, and attacks
Collberg et al. Error-correcting graphs for software watermarking
Collberg et al. Dynamic graph-based software watermarking
US8141162B2 (en) Method and system for hiding information in the instruction processing pipeline
Collberg et al. Graph theoretic software watermarks: Implementation, analysis, and attacks
Yang et al. Srcmarker: Dual-channel source code watermarking via scalable code transformations
Kim et al. Romadroid: A robust and efficient technique for detecting android app clones using a tree structure and components of each app’s manifest file
Huang et al. Smart contract watermarking based on code obfuscation
Chroni et al. Efficient encoding of watermark numbers as reducible permutation graphs
Chroni et al. An embedding graph-based model for software watermarking
Chroni et al. Encoding watermark integers as self-inverting permutations
Chionis et al. A dynamic watermarking model for embedding reducible permutation graphs into software
Hamilton et al. An evaluation of the resilience of static java bytecode watermarks against distortive attacks
Chionis et al. Evaluating the WaterRpg software watermarking model on Java application programs
Bento et al. Full characterization of a class of graphs tailored for software watermarking
Chroni et al. Design and Evaluation of a Graph Codec System for Software Watermarking.
CN109933962B (en) Software watermarking method based on question guess
Mpanti et al. Graph-structured watermarking using bitonic sequences of self-inverting permutations
US20040034602A1 (en) Method and apparatus for watermarking binary computer code