Robust Software Watermarking Scheme Using RC4 and HASH

被引:0
|
作者
Sun, Xiaoyan [1 ]
Zhang, Maosheng
Zhu, Xiaoshu [1 ]
Li, Shuoming
机构
[1] Yulin Normal Univ, Sch Comp Sci & Engn, Yulin 537000, Peoples R China
关键词
software watermarking; robust; ownership; dynamic diagram;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel software watermarking method using RC4 and Hash function is proposed. The method with good robust can be applied to protect and verify software copyright. The copyright information of ownership should be encrypted by RC4 stream cipher algorithm to ensure that the information is confidentiality, and prevent the information from forging. In order to avoid leaking the copyright information, the hash value is evaluated. Combining the PPCT and permutation encoding, even the code pointers have been attacked, this method will make use of the encrypted data or hash value to reconstruct the Dynamic diagram of the watermark information which was embedded in programs.
引用
收藏
页码:229 / 236
页数:8
相关论文
共 50 条
  • [1] RC4-Hash: A new hash function based on RC4 - (Extended abstract)
    Chang, Donghoon
    Gupta, Kishan Chand
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 80 - +
  • [2] Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher
    Noura, Hassan
    Salman, Ola
    Chehab, Ali
    Couturier, Raphael
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 531 - 537
  • [3] Generalized RC4 Key Collisions and Hash Collisions
    Chen, Jiageng
    Miyaji, Atsuko
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 73 - 87
  • [4] Fault Detection and Correction Scheme using RC4 Stream Cipher
    Kiruba, S.
    Kirubaraj, A. Alfred
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 311 - 314
  • [5] Securing Compressed Video Streams using RC4 Encryption Scheme
    Giradkar, Shrutika S.
    Bhattacharya, Antara
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 628 - 632
  • [6] Using the RC4 encryption algorithm at the server
    Zhao Chun Yang
    NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, : 383 - 386
  • [7] RC4 in Hadoop Security using MapReduce
    Jayan, Anandu
    Upadhyay, Bhargavi R.
    2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN DATA SCIENCE (ICCIDS), 2017,
  • [8] Impossible fault analysis of RC4 and differential fault analysis of RC4
    Biham, E
    Granboulan, L
    Nguyên, PQ
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 359 - 367
  • [9] Hash Function Based Software Watermarking
    Zhang, Xuesong
    He, Fengling
    Zuo, Wanli
    PROCEEDINGS OF THE 2008 ADVANCED SOFTWARE ENGINEERING & ITS APPLICATIONS, 2008, : 95 - 98
  • [10] Content dependent image watermarking using chaos and robust hash
    Lu, Wei
    Lu, Hongtao
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 660 - +