期刊文献+

基于PPCT混合编码的防篡改水印方案 被引量:1

A TAMPER-PROOFING WATERMARKING SCHEME BASED ON PPCT MIXED ENCODING
下载PDF
导出
摘要 简单介绍了动态图水印的特征,概括了典型的PPCT的编码特征和纠错属性,分析了分别将PPCT与排列图和k-基数相结合的编码方案,提出一种改进的PPCT防篡改水印方案。该方案在不改变PPCT结构的前提下,引入基数编码提高了水印的数据率;利用防篡改技术弥补了PPCT纠错属性的局限性,实现了水印的双重防篡改功能;采用水印的冗余嵌入实现了水印的容错提取,增强了水印的鲁棒性。 In this paper we briefly introduced the features of ideal dynamic graph-based watermarks,generalized the encoding characteristics and the error-correcting properties of typical PPCTs,and then analysed the encoding schemes which combines PPCT with permutation graph and k-radix encoding respectively,finally we proposed an improved tamper-proofing watermarking scheme based on PPCTs.The scheme improves the data rate of watermarking by introducing radix encoding without modifying the structures of PPCTs.It utilizes tamper-proofing technology to make up the limitation of PPCTs'error-correcting properties,so as to have realized dual tamper-proofing functions of the watermarking.The scheme also adopts redundancy embedding on watermarking to have realised watermarking error-tolerant extraction,and thus the robustness of watermarks is enhanced.
作者 白雪梅
出处 《计算机应用与软件》 CSCD 2011年第1期53-56,共4页 Computer Applications and Software
基金 国家自然科学基金项目(60873198) 广东省自然科学基金项目(06023961) 广东省教育厅自然科学基金重点项目(05Z013)
关键词 动态图水印 基数编码 防篡改技术 Dynamic graph-based watermarking Radix encoding Tamper-proofing technology
  • 相关文献

参考文献9

  • 1Collberg C,Thomborson C. Software Watermarking:Modds and Dynamic Embeddings[ C]//Proceedings of the 26th Annual SIGPLAN-AIGACT Symposium on Principles of Programming Languages (POPL' 99 ). Association for Computing Machinery Press, 1999:311 - 324. 被引量:1
  • 2Palsberg J, Krishnaswami S, Kown M, et al. Experience with software watermarking[ C]//Proceedings of the 16^th Annual Computer Security Applications Conference ( ACSAC 2000), New Orleans :IEEE Computer Society Press ,2000. 被引量:1
  • 3Thomborson C, Nagra J, Somaraju R, et al. Tamper-proofing Software Watermarks [ C l//Proc. Second Australasian Information Security Workshop, ed. P. Montague and C. Steketee, ACS, CRPIT,2004,32:27 - 36. 被引量:1
  • 4Christian Collberg,Clark Thomborson,Gregg M. Townsend. Dynamic Graph- Based Software Watermarking [ R ]. Technical Report TR04 -08,2004 ,Department of Computer Science,University of Arizon &Auckland. 被引量:1
  • 5Jens Palsberg, Sowmya Krishnaswamy, Minseok Kwon, et al. Experience with Software Watermarking[ C ]//Annual Computer Security Applications Conference 2000. ( A CS AC'0 2), Los Alamitos, USA 2000 : 308 -516. 被引量:1
  • 6Akito Monden, Hajimu Iida, et al. A Practical Method for Watermarking Java Programs [ C ]//The 24th Computer Software and Applications Conference, Chicago, USA ,2000 : 191- 197. 被引量:1
  • 7Christian Collberg,et al. Error-Correcting graphs for software watermarking[ C ]//Workshop on Graphs in Computer Science ( WG' 2003 ), June 2003. 被引量:1
  • 8虞涛,杨杰.一种动态图软件水印技术编码方案[J].交通与计算机,2006,24(1):76-79. 被引量:3
  • 9沈静博,房鼎益,吴晓南,陈晓江.基于多常量编码的动态图软件水印保护技术[J].计算机工程,2006,32(20):160-162. 被引量:6

二级参考文献10

  • 1Zhu W, Thomborson C, Wang F Y. A survey of software watermarking. Lecture Notes in Computer Science-Volume ,2002(3495) : 454-458. 被引量:1
  • 2Collberg C, Thomborson C. Software watermarking:models and dynamic embeddings. In: Aiken A, et al. , eds. Proceedings of the 26th Annual SIGPLANAIGACT Symposium on Principles of Programming Languages (POPL'99). Association for Computing Machinery Press, 1999. 311-324. 被引量:1
  • 3He Y. Tamperproofing a software watermark by encoding constants, http://www, cs. auckland, ac.nz/-cthombor/Students/yhe/yhethesis, pdf, 2005-09-13. 被引量:1
  • 4Palsberg J, Krishnaswamy S, Kwon M et al.Experience with software watermarking. In:Proceedings of the 16th Annual Computer Security Applications Conference, ACSAC'00, 308-316. 被引量:1
  • 5Collberg,Thomborson.Software Watermarking:Models and Dynamic Embeddings[C].Proc.of the 26th ACM SIGPLANSIGACT,Symposium on Principles of Programming Languages,1999. 被引量:1
  • 6Collberg,Thomborson.Watermarking,Tamper-proffing,and Obfuscation:Tools for Software Protection[J].IEEE Transactions on Software Engineering,2002,28(8). 被引量:1
  • 7Palsberg J,Krishnaswamy S,Kwon M,et al.Experience with Software Watermarking[C].Proceedings of the 16th Annual Computer Security Applications Conference,2000:308-316. 被引量:1
  • 8Curran D,Hurley N J,Cinnéide M ó.Securing Java Through Software Watermarking[C].Proceedings of the 2nd International Conference on Principles and Practice of Programming in Java,2003. 被引量:1
  • 9王勇,杨义先.一种基于PPCT的软件水印库生成方案[C].北京:第三届全国信息安全会议,2003. 被引量:2
  • 10张立和,杨义先,钮心忻,牛少彰.软件水印综述[J].软件学报,2003,14(2):268-277. 被引量:89

共引文献7

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部