Skip to main content

A Software Watermarking Algorithm Based on the Full Array of Expression Coefficients

  • Conference paper
  • First Online:
  • 695 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 634))

Abstract

In order to solve the problem of low message hidden rate and against attacks, this paper proposed an algorithm based on a full array of expressions coefficient. Algorithm through coefficient expressions of permutations and binary number and sequence number of one-to-one correspondence to construct a mapping dictionary. Then the mapping dictionary is used to embedding and extracting watermark. At last, the program which embedded watermark is encrypted by AES module. This algorithm is used to concrete some real examples on the SandMark platform, and then it is compared with the Monden algorithm, Mohammad algorithm and inverse number algorithm in performance. Theoretical analysis and experimental results proves that the algorithm is significantly improved anti attack and data rate.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zhang, L., Yang, Y., Niu, X.: Overview of software watermarking. Softw. J. 14(2), 268–277 (2003)

    MATH  Google Scholar 

  2. Akito, M., Hajimu, I., Ken-ichi M., et al.: A practical method for watermarking Java programs. In: Proceedings of the 24th Computer Software and Applications Conference (2000)

    Google Scholar 

  3. Patel, S.J., Pattewar, T.M.: Software birthmark based theft detection of Java Script programs using agglomerative clustering and frequent subgraph mining. In: 2014 International Conference on Embedded Systems (ICES) (2014)

    Google Scholar 

  4. Hua, J., Sha, Z., Xuan, A.: Software watermarking algorithm based on inverse number of expression. Comput. Appl. 09(06), 3189–3190 (2009)

    Google Scholar 

  5. Zhou, L.: Evaluation of Software Watermarking Algorithm. Jilin Universiy, Ji Lin (2010)

    Google Scholar 

  6. Cui, X.: Software Encryption and Decryption, pp. 378–488. People’s Posts and Telecommunications Press, Beijing (2012)

    Google Scholar 

  7. Chan, P.P.F., Hui, L.C.K., Yiu, S.M.: Heap graph based software theft detection. In: IEEE Transactions on Information Forensics and Security (2013)

    Google Scholar 

  8. Tang, Z.Y., Fang, D.Y., Shu, L.: A tamper resistant software watermarking scheme based on code encryption. J. Univ. Sci. Technol. China 41(7), 599–606 (2011)

    Google Scholar 

  9. Ying, G., Lu, L., Wang, L.: The research and practice of computer graphics teaching reform based on algorithm demonstration and algorithm training. J. East China Inst. Technol. (Soc. Sci.) 32(1), 78–80 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Cheng, C., Jiang, N., Li, H., Zeng, R. (2016). A Software Watermarking Algorithm Based on the Full Array of Expression Coefficients. In: Tan, T., et al. Advances in Image and Graphics Technologies. IGTA 2016. Communications in Computer and Information Science, vol 634. Springer, Singapore. https://doi.org/10.1007/978-981-10-2260-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2260-9_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2259-3

  • Online ISBN: 978-981-10-2260-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics