基于混沌优化的分存软件水印方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Sharing software watermarking scheme based on chaotic optimization
  • 作者:李斌 ; 周清雷
  • 英文作者:LI Bin;ZHOU Qing-lei;School of Information Engineering,Zhengzhou University;
  • 关键词:软件水印 ; 混沌理论 ; 水印分存 ; DPPCT拓扑图 ; 鲁棒性
  • 英文关键词:software watermarking;;chaos theory;;sharing watermarking;;DPPCT topology graph;;robustness
  • 中文刊名:JSYJ
  • 英文刊名:Application Research of Computers
  • 机构:郑州大学信息工程学院;
  • 出版日期:2013-06-28 16:07
  • 出版单位:计算机应用研究
  • 年:2013
  • 期:v.30;No.265
  • 基金:国家“863”计划基金资助项目(2009AA012201)
  • 语种:中文;
  • 页:JSYJ201311056
  • 页数:4
  • CN:11
  • ISSN:51-1196/TP
  • 分类号:224-226+235
摘要
针对软件水印鲁棒性差、水印分存算法执行效率低的问题,提出了一种基于混沌优化的分存软件水印方案。该方案通过引入混沌系统,将水印信息矩阵分割、混沌置乱,形成分存水印;水印嵌入时,将分存水印一一编码为DPPCT拓扑图,并将hash处理后的水印信息分别填充于各个DPPCT的info域;水印嵌入后,利用混沌加密,保护全部代码,防止逆向工程等手段对软件水印的破坏。理论分析和实验表明,该方案可有效地抵抗各种语义保持变换攻击,减少程序负载,提高水印的鲁棒性及执行效率。
        In order to solve the poor robustness of software watermarking and the low execution efficiency of watermarking sharing algorithm,this paper proposed a sharing software watermarking scheme based on chaotic optimization. The scheme took advantage of chaos system,matrix partition and chaotic scrambling the watermarking information to form sharing watermarking.When watermarking was embedded,using DPPCT topology graph encode the sharing watermarking,then putting the hash value of the watermarking information into the info field of each DPPCT. After the watermarking embedded,using chaotic encryption to protect all code and prevent reverse engineering and other methods to attack the software watermarking. Theoretical analysis and experimental results show that the scheme can effectively resist various semantics preserving transformation attacks,decrease the program load and improve robustness and execution efficiency of the watermarking.
引文
[1]COLLERG C,THOMBORSON J,TOWSEND G M.Dynamic graphbased software watermarking,TR04-08[R].Pennsylvania:Pennsylvania State University,2004.
    [2]COLLBERG C,NAGRA J.Surreptitious software:obfuscation,watermarking,and tamperproofing for software protection[M].[S.l.]:Addison-Wesley,2009:526-528.
    [3]白雪梅,凌捷.基于中国剩余定理的动态水印方案[J].计算机工程,2006,32(16):155-157.
    [4]赵彦锋.基于Asmuth-Bloom体系的动态图水印实现方案[J].现代电子技术,2011,34(5):125-128.
    [5]芦斌,罗向阳,刘粉林.一种基于混沌的软件水印算法框架及实现[J].软件学报,2007,18(2):351-360.
    [6]LIU Fen-lin,LU Bin,LUO Xiang-yang.A chaos-based robust software watermarking,information security practice and experience[C]//Lecture Notes in Computer Science,vol 3903.2006:355-366.
    [7]罗养霞,房鼎益.基于混沌优化的动态水印算法研究[J].中国科学技术大学学报,2012,42(1):77-84.
    [8]李淑芝,王显珉.基于m-n变进制规则的动态图软件水印算法[J].计算机工程,2012,38(21):17-21.
    [9]RAWAT S,RAMAN B.A chaotic system based fragile watermarking scheme for image tamper detection[J].AEU-International Journal of Electronics and Communications,2011,65(10):840-847.
    [10]王慧娇,沙宗鲁,轩爱成.基于PPCT和基数K的动态图混合编码方案[J].计算机工程与应用,2010,46(25):109-111.
    [11]TANG Zhan-yong,FANG Ding-yi.A tamper-proof software watermark using code encryption[C]//Proc of IEEE International Conference on Intelligence and Security Informatics.2011:156-160.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700