A Software Watermarking Algorithm Based on Binder Technology

Article Preview

Abstract:

Information hiding in a resources section’s redundancies has large amount of watermark embedding, and the software watermarking based on PE file resources section format has high concealment. This paper combined this two algorithms’ advantages, and embedded the watermark information in these two ways. It also introduced the information hiding technology based on ICON file and binder technology to realize the tamper-proof function of the watermark. Experiments shows that this scheme not only improves the embedded information capacity, but also overcomes the problem that the embedded watermark are susceptible to tamper-proof attack. So the new scheme improves the watermark’s comprehensive performance, and create a more secure and robust software watermark.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2971-2974

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] LU Bin, ZHENG Jun-jie, LIU Fen-lin et al. A software watermark method combines source code with object code: China, 200810188310. 5[P]. 2009-07-08.

Google Scholar

[2] WANG Jian-min, ZHANG Chang-jiang, WANG Chao-kun et al. A method of embedding and extracting watermark in a computer program: China, 200810119358. 0[P]. 2009-01-21.

Google Scholar

[3] WANG Jian-min, WANG Chao-kun, YU Zhi-wei et al. A method of using software watermark to limit illegal JAVA software running: China, 201010621775. 2[P]. 2011-07-13.

Google Scholar

[4] ZENG Guo-sun, WANG-wei, XU Jin-chao. A method of software watermark information processing based on the relationship between threads: China, 201110440512. 6[P]. 2013-01-23.

Google Scholar

[5] YANG Jian-long, WANG Jian-min, LI De-yi. Recent development of software watermark [J]. Computer Engineering, 2007, vol. 33, no. 17, pp: 168-175.

Google Scholar

[6] LIU Hong-sheng, SUN Chang-ying. The protection of software copyright by software watermarking [J]. Computer Knowledge and Technology, 2010, vol. 6, no. 7, pp: 1701-1703.

Google Scholar

[7] LU Bin, LUO Xiang-yang, LIU Fen-lin. A chaos-based framework and implementation for software watermarking algorithm [J]. Journal of Software, 2007, vol. 18, no. 2, pp: 351-360.

DOI: 10.1360/jos180351

Google Scholar