Robust Software Watermarking Scheme Using RC4 and HASH

被引:0
|
作者
Sun, Xiaoyan [1 ]
Zhang, Maosheng
Zhu, Xiaoshu [1 ]
Li, Shuoming
机构
[1] Yulin Normal Univ, Sch Comp Sci & Engn, Yulin 537000, Peoples R China
关键词
software watermarking; robust; ownership; dynamic diagram;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel software watermarking method using RC4 and Hash function is proposed. The method with good robust can be applied to protect and verify software copyright. The copyright information of ownership should be encrypted by RC4 stream cipher algorithm to ensure that the information is confidentiality, and prevent the information from forging. In order to avoid leaking the copyright information, the hash value is evaluated. Combining the PPCT and permutation encoding, even the code pointers have been attacked, this method will make use of the encrypted data or hash value to reconstruct the Dynamic diagram of the watermark information which was embedded in programs.
引用
收藏
页码:229 / 236
页数:8
相关论文
共 50 条
  • [31] An Effective RC4 Stream Cipher
    Weerasinghe, T. D. B.
    2013 8TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2013, : 69 - 74
  • [32] Refined Glimpse Correlations of RC4
    Ito, Ryoma
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (01) : 3 - 13
  • [33] Cache Timing Analysis of RC4
    Chardin, Thomas
    Fouque, Pierre-Alain
    Leresteux, Delphine
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 110 - 129
  • [34] Analysis methods for (alleged) RC4
    Knudsen, LR
    Meier, W
    Preneel, B
    Rijmen, V
    Verdoolaege, S
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 327 - 341
  • [35] Attack on Broadcast RC4 Revisited
    Maitra, Subhamoy
    Paul, Goutam
    Sen Gupta, Sourav
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 199 - 217
  • [36] (Not so) random shuffles of RC4
    Mironov, I
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 304 - 319
  • [37] How Not to Combine RC4 States
    Banik, Subhadeep
    Jha, Sonu
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 95 - 112
  • [38] Discrete Cosine Transform and Hash Functions toward Implementing a (Robust-Fragile) Watermarking Scheme
    AL-Mansoori, Saeed
    Kunhu, Alavi
    HIGH-PERFORMANCE COMPUTING IN REMOTE SENSING III, 2013, 8895
  • [40] Attacks on the RC4 stream cipher
    Klein, Andreas
    DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (03) : 269 - 286