Abstract
The work deals with copyright protection for software written in object-oriented language (such as C++ and Java). The model used allows to insert watermarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic watermarking schemes were presented and their security discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. Aucsmith. Tamper resistant software. In R. Anderson, editor, Information Hiding, First International Workshop Cambridge, 1996, pages 317–334. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1174.
M. Barni, F. Bartolini, V. Cappellini, and A. Piva. Copyright protection of digital images by embedding unperceivable marks. Image and Vision Computing, 16:997–906, 1998.
H. Bergal. Watermarking cyberspace. Communications of ACM, 41:19–24, 1998.
J. Brassil and L. O’Gorman. Watermarking document images with bounding box expansion. In R. Anderson, editor, Information Hiding, First International Workshop, Cambridge, 1996, pages 227–235. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1174.
J.T. Brassil, S. Low, N.F. Maxemchuk, and L. O’Gorman. Electronic masking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications, 13(8), 1995.
C. Collberg and C. Thomborson. On the limits of software watermarking. Technical Report 164, Department of Computer Science, the University of Auckland, Auckland, New Zealand, 1998.
I. Cox, J. Kilian, T. Leighton, and T. Shamoon. A secure, robust watermark for multimedia. In R. Anderson, editor, Information Hiding, First International Workshop, Cambridge, 1996, pages 183–206. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1174.
O. Faugeras. Three Dimensional Computer Vision: A Geometric Viewpoint. MIT Press, 1993.
D. Glover. The protection of computer software. Cambridge University, 2nd Edition, 1992.
J. Pieprzyk. Fingerprints for copyright software protection. In M. Mambo and Y. Zheng, editors, Information Security, Second International Workshop, ISW’99, pages 178–190. Springer-Verlag, 1999. Lecture Notes in Computer Science No. 1729.
C.I. Podilchuk and W. Zeng. Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications, 16:525–539, 1998.
R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne. A digital watermark. In Proceedings IEEE International Conference on Image Processing, volume 2, pages 86–90, 1994.
P. Wayner. Digital copyright protection. Academic Press, Boston, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pastuszak, J., Michałek, D., Pieprzyk, J. (2002). Copyright Protection of Object-Oriented Software. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_15
Download citation
DOI: https://doi.org/10.1007/3-540-45861-1_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43319-4
Online ISBN: 978-3-540-45861-6
eBook Packages: Springer Book Archive