摘要
针对软件水印鲁棒性差、水印分存算法执行效率低的问题,提出了一种基于混沌优化的分存软件水印方案。该方案通过引入混沌系统,将水印信息矩阵分割、混沌置乱,形成分存水印;水印嵌入时,将分存水印一一编码为DPPCT拓扑图,并将hash处理后的水印信息分别填充于各个DPPCT的info域;水印嵌入后,利用混沌加密,保护全部代码,防止逆向工程等手段对软件水印的破坏。理论分析和实验表明,该方案可有效地抵抗各种语义保持变换攻击,减少程序负载,提高水印的鲁棒性及执行效率。
In order to solve the poor robustness of software watermarking and the low execution efficiency of watermarking sharing algorithm,this paper proposed a sharing software watermarking scheme based on chaotic optimization. The scheme took advantage of chaos system,matrix partition and chaotic scrambling the watermarking information to form sharing watermarking.When watermarking was embedded,using DPPCT topology graph encode the sharing watermarking,then putting the hash value of the watermarking information into the info field of each DPPCT. After the watermarking embedded,using chaotic encryption to protect all code and prevent reverse engineering and other methods to attack the software watermarking. Theoretical analysis and experimental results show that the scheme can effectively resist various semantics preserving transformation attacks,decrease the program load and improve robustness and execution efficiency of the watermarking.
引文
[1]COLLERG C,THOMBORSON J,TOWSEND G M.Dynamic graphbased software watermarking,TR04-08[R].Pennsylvania:Pennsylvania State University,2004.
[2]COLLBERG C,NAGRA J.Surreptitious software:obfuscation,watermarking,and tamperproofing for software protection[M].[S.l.]:Addison-Wesley,2009:526-528.
[3]白雪梅,凌捷.基于中国剩余定理的动态水印方案[J].计算机工程,2006,32(16):155-157.
[4]赵彦锋.基于Asmuth-Bloom体系的动态图水印实现方案[J].现代电子技术,2011,34(5):125-128.
[5]芦斌,罗向阳,刘粉林.一种基于混沌的软件水印算法框架及实现[J].软件学报,2007,18(2):351-360.
[6]LIU Fen-lin,LU Bin,LUO Xiang-yang.A chaos-based robust software watermarking,information security practice and experience[C]//Lecture Notes in Computer Science,vol 3903.2006:355-366.
[7]罗养霞,房鼎益.基于混沌优化的动态水印算法研究[J].中国科学技术大学学报,2012,42(1):77-84.
[8]李淑芝,王显珉.基于m-n变进制规则的动态图软件水印算法[J].计算机工程,2012,38(21):17-21.
[9]RAWAT S,RAMAN B.A chaotic system based fragile watermarking scheme for image tamper detection[J].AEU-International Journal of Electronics and Communications,2011,65(10):840-847.
[10]王慧娇,沙宗鲁,轩爱成.基于PPCT和基数K的动态图混合编码方案[J].计算机工程与应用,2010,46(25):109-111.
[11]TANG Zhan-yong,FANG Ding-yi.A tamper-proof software watermark using code encryption[C]//Proc of IEEE International Conference on Intelligence and Security Informatics.2011:156-160.