DocumentCode :
3102493
Title :
Dependency in software watermarking
Author :
Curran, D. ; Cinneide, M.O. ; Hurley, N.J. ; Silvestre, G.C.M.
Author_Institution :
Dept. of Comput. Sci., Univ. Coll. Dublin, Ireland
fYear :
2004
fDate :
19-23 April 2004
Firstpage :
569
Lastpage :
570
Abstract :
The advent of bytecode languages such as Java and advances in decompilation tools has made it easier to infringe the copyright of software. This presents a serious challenge to the software industry, as modern Internet software is highly distributed and the potential for software piracy is immense. Software watermarking has been proposed as one means of protecting the intellectual property in software. The strategy is to embed secret ownership information (i.e., a ´watermark´) in a program that cannot be easily removed by unauthorized parties but that can be reliably extracted by an authorized decoder. We investigate a practical implementation of dynamic graph watermarking, focusing particularly on embedding stealthy watermark generating code in the program´s text. Our scheme is based on the premise that watermarking code should not be distinguishable from ordinary program code. This is because one strategy for an attacker whose goal is to destroy the watermark is to attempt to directly locate the watermark generating code within the program text and remove or alter it.
Keywords :
authorisation; computer crime; industrial property; watermarking; blended dynamic graph; copyright; dynamic graph watermarking; intellectual property; software piracy; software watermarking; Computer crime; Computer industry; Data mining; Decoding; Intellectual property; Internet; Java; Protection; Software tools; Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Communication Technologies: From Theory to Applications, 2004. Proceedings. 2004 International Conference on
Print_ISBN :
0-7803-8482-2
Type :
conf
DOI :
10.1109/ICTTA.2004.1307890
Filename :
1307890
Link To Document :
بازگشت