A stern-based collusion-secure software watermarking algorithm and its implementation

被引:0
作者
Ai, Jieqing [1 ]
Sun, Xingming [1 ,2 ]
Liu, Yunhao [3 ]
Cox, Ingemar J. [2 ]
Sun, Guang [4 ]
Luo, Yi [1 ]
机构
[1] Hunan Univ, Sch Comp & Commun, Changsha, Peoples R China
[2] UCL, London, England
[3] Hong Kong Univ Sci & Technol, Hong Kong, Hong Kong, Peoples R China
[4] Hunan Coll Finance & Econom, Changsha, Hunan, Peoples R China
来源
MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS | 2007年
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Stern algorithm is a robust static software watermarking scheme. It can resist many common attacks except collusive attacks. In this paper we propose an improved Stern algorithm, make it has the ability of resisting collusive attacks and simplify its implementation at the same time. Furthermore, we describe the implementation of our algorithm and the issues that arise when targeting MSIL. We then validated it by experiments against a variety of attacks.
引用
收藏
页码:813 / +
页数:3
相关论文
共 7 条
[1]   Sandmark - A tool for software protection research [J].
Collberg, Christian ;
Myles, Ginger ;
Huntwork, Andrew .
IEEE Security and Privacy, 2003, 1 (04) :40-49
[2]   Watermarking, tamper-proofing, and obfuscation - Tools for software protection [J].
Collberg, CS ;
Thomborson, C .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (08) :735-746
[3]  
COX IJ, 1996, WORKSH INF HID NEWT, P175
[4]  
COX IJ, 2003, DIGITAL WATERMAKING
[5]  
NAGRA J, 2002, AUSTR COMP SCI C ACS, P177
[6]  
SAHOO T, 2006, J COMPUTER SECURITY, P721
[7]  
Stern JP, 2000, LECT NOTES COMPUT SC, V1768, P368