Abstract
In order to solve the problem of low message hidden rate and against attacks, this paper proposed an algorithm based on a full array of expressions coefficient. Algorithm through coefficient expressions of permutations and binary number and sequence number of one-to-one correspondence to construct a mapping dictionary. Then the mapping dictionary is used to embedding and extracting watermark. At last, the program which embedded watermark is encrypted by AES module. This algorithm is used to concrete some real examples on the SandMark platform, and then it is compared with the Monden algorithm, Mohammad algorithm and inverse number algorithm in performance. Theoretical analysis and experimental results proves that the algorithm is significantly improved anti attack and data rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang, L., Yang, Y., Niu, X.: Overview of software watermarking. Softw. J. 14(2), 268–277 (2003)
Akito, M., Hajimu, I., Ken-ichi M., et al.: A practical method for watermarking Java programs. In: Proceedings of the 24th Computer Software and Applications Conference (2000)
Patel, S.J., Pattewar, T.M.: Software birthmark based theft detection of Java Script programs using agglomerative clustering and frequent subgraph mining. In: 2014 International Conference on Embedded Systems (ICES) (2014)
Hua, J., Sha, Z., Xuan, A.: Software watermarking algorithm based on inverse number of expression. Comput. Appl. 09(06), 3189–3190 (2009)
Zhou, L.: Evaluation of Software Watermarking Algorithm. Jilin Universiy, Ji Lin (2010)
Cui, X.: Software Encryption and Decryption, pp. 378–488. People’s Posts and Telecommunications Press, Beijing (2012)
Chan, P.P.F., Hui, L.C.K., Yiu, S.M.: Heap graph based software theft detection. In: IEEE Transactions on Information Forensics and Security (2013)
Tang, Z.Y., Fang, D.Y., Shu, L.: A tamper resistant software watermarking scheme based on code encryption. J. Univ. Sci. Technol. China 41(7), 599–606 (2011)
Ying, G., Lu, L., Wang, L.: The research and practice of computer graphics teaching reform based on algorithm demonstration and algorithm training. J. East China Inst. Technol. (Soc. Sci.) 32(1), 78–80 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Cheng, C., Jiang, N., Li, H., Zeng, R. (2016). A Software Watermarking Algorithm Based on the Full Array of Expression Coefficients. In: Tan, T., et al. Advances in Image and Graphics Technologies. IGTA 2016. Communications in Computer and Information Science, vol 634. Springer, Singapore. https://doi.org/10.1007/978-981-10-2260-9_22
Download citation
DOI: https://doi.org/10.1007/978-981-10-2260-9_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2259-3
Online ISBN: 978-981-10-2260-9
eBook Packages: Computer ScienceComputer Science (R0)