Abstract
The work studies the problem of copyright protection of software using cryptographic fingerprinting. The identity of software must be unique for each copy. There are two classes of identities: one is based on equivalent variants of the program and the other applies behaviour of the software as its identity. For these two types of identity, we introduce two different fingerprint schemes. The two schemes use digital signatures and can be easily combined and extended to be resilient against partial fingerprint destruction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. Aucsmith. Tamper resistant software. In R. Anderson, editor, Information Hinding, First International Workshop, Cambridge, 1996, pages 317–334. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1174.
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In D. Coppersmith, editor, Advances in Cryptology-CRYPTO’95, pages 452–465. Springer-Verlag, 1995. Lecture Notes in Computer Science No. 963.
C. Collberg and C. Thomborson. On the limits of software watermarking. Technical Report 164, Department of Computer Science, the University of Auckland, Auckland, New Zealand, 1998.
I. Cox, J. Kilian, T. Leighton, and T. Shamoon. A secure, robust watermark for multimedia. In R. Anderson, editor, Information Hinding, First International Workshop, Cambridge, 1996, pages 183–206. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1174.
M. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, 1979.
A. Herzberg and S. Pinter. Public protection of software. ACM Transactions on Computer Systems, 5(4):371–393, 1987.
J. Smith and B. Comiskey. Modulation and information hiding in images. In R. Anderson, editor, Information Hinding, First International Workshop, Cambridge, 1996, pages 207–226. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1174.
D.R. Stinson. Cryptography: Theory and Practice. CRC Press, 1995.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pieprzyk, J. (1999). Fingerprints for Copyright Software Protection. In: Information Security. ISW 1999. Lecture Notes in Computer Science, vol 1729. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47790-X_15
Download citation
DOI: https://doi.org/10.1007/3-540-47790-X_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66695-0
Online ISBN: 978-3-540-47790-7
eBook Packages: Springer Book Archive