Skip to main content

Dither Modulation Watermarking of Dynamic Memory Traces

  • Conference paper
Information Hiding (IH 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3727))

Included in the following conference series:

  • 997 Accesses

Abstract

We describe a dynamic software watermark embedded in the memory trace of an executing Java program. Our approach is a generalisation of the spread–transform watermarking technique developed for use in the multimedia domain. We show how the spread–transform paradigm enables the embedding of dither modulation watermarks in a Java program and report its robustness to realistic additive noise attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. In: ISIT: Proceedings IEEE International Symposium on Information Theory, sponsored by The Information Theory Society of The Institute of Electrical and Electronic Engineers, May 2000, vol. 47, pp. 1424–1443 (2000)

    Google Scholar 

  2. Collberg, C.S.: SandMark User’s Guide (January 2003), http://www.cs.arizona.edu/sandmark

  3. Collberg, C.S., Thomborson, C.D.: Software Watermarking: Models and Dynamic Embeddings. In: Principles of Programming Languages 1999 (POPL 1999), pp. 311–324 (January 1999)

    Google Scholar 

  4. Collberg, C.S., Thomborson, C.D., Low, D.: A Taxonomy of Obfuscating Transformations. Technical Report TR98–148, Department of Computer Science, The University of Auckland (July 1997)

    Google Scholar 

  5. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: A Secure, Robust Watermark for Multimedia. In: Workshop on Information Hiding, pp. 175–190 (May 1996)

    Google Scholar 

  6. Curran, D.M., Hurley, N.J., Cinnéide, M.Ó.: Securing Java Through Software Watermarking. In: Principles and Practice of Programming in Java (PPPJ 2003) (June 2003)

    Google Scholar 

  7. Hachez, G.: A Comparative Study of Software Protection Tools Suited for E–Commerce with Contributions to Software Watermarking and Smart Cards. PhD thesis, Universite Catholique de Louvain (March 2003)

    Google Scholar 

  8. Argonne National Laboratory. NEOS Optimization Server, http://www-neos.mcs.anl.gov/neos

  9. Liang, S., Viswanathan, D.: Comprehensive Profiling Support in the Java Virtual Machine. In: 5th USENIX Conference on Object–Oriented Technologies and Systems (COOTS 1999) (May 1999)

    Google Scholar 

  10. Maña, A., Pimentel, E.: An Efficient Software Protection Scheme. In: Dupuy, M., Paradinas, P. (eds.) IFIP Conference Proceedings Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP 2001), vol. 193, pp. 385–402. Kluwer, Dordrecht (2001)

    Google Scholar 

  11. Sun Microsystems. Java Virtual Machine, http://java.sun.com

  12. Miller, M., Cox, I.J., Linnartz, J.P., Kalker, T.: A Review of Watermarking Principles and Practices. Digital Signal Processing in Multimedia Systems (1999)

    Google Scholar 

  13. Dash Optimization. Xpress–MP, http://www.dashoptimization.com

  14. Peticolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding — A Survey. In: Proceedings of the IEEE, vol. 87, pp. 1062–1078 (July 1999)

    Google Scholar 

  15. Sahoo, T., Collberg, C.: Software Watermarking in the Frequency Domain: Implementation, Analysis, and Attacks. Technical Report TR04–07, Department of Computer Science, The University of Arizona (March 2004)

    Google Scholar 

  16. Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.-J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  17. UCLA Compilers Group. Java Tree Builder, compilers.cs.ucla.edu/jtb

  18. Venkatesan, R., Vazirani, V., Sinha, S.: A Graph Theoretic Approach to Software Watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 157–168. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  19. Zhang, X., Gupta, R.: Hiding Program Slices for Software Security. In: International Symposium on Code Generation and Optimization (CGO 2003), p. 325 (March 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Larkin, A.J., Balado, F., Hurley, N.J., Silvestre, G.C.M. (2005). Dither Modulation Watermarking of Dynamic Memory Traces. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_27

Download citation

  • DOI: https://doi.org/10.1007/11558859_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29039-1

  • Online ISBN: 978-3-540-31481-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics