메뉴 건너뛰기




Volumn , Issue , 2006, Pages 29-36

Recognition in software watermarking

Author keywords

Embedder; Extraction; Graph; Interference graph; Recognition; Software watermark

Indexed keywords

ALGORITHMS; COPYRIGHTS; DIGITAL WATERMARKING; SECURITY OF DATA; SOFTWARE PROTOTYPING;

EID: 34547374329     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1178766.1178776     Document Type: Conference Paper
Times cited : (27)

References (46)
  • 3
    • 35248834521 scopus 로고    scopus 로고
    • Natural language watermarking and tamperproofing
    • Fifth Information Hiding Workshop, of
    • M. Atallah, V. Raskin, C. Hempelmann, M. Karahan, R. Sion, K. Triezenberg, and U. Topkara. Natural language watermarking and tamperproofing. In Fifth Information Hiding Workshop, volume 2578 of LNCS, pages 196-212, 2003.
    • (2003) LNCS , vol.2578 , pp. 196-212
    • Atallah, M.1    Raskin, V.2    Hempelmann, C.3    Karahan, M.4    Sion, R.5    Triezenberg, K.6    Topkara, U.7
  • 4
    • 34547283854 scopus 로고    scopus 로고
    • Uwstego: A general architecture for software watermarking
    • Technical Report TRO4-11, Aug. 31
    • C. Collberg, S. Jha, D. Tomko, and H. Wang. Uwstego: A general architecture for software watermarking. Technical Report TRO4-11, Aug. 31 2001.
    • (2001)
    • Collberg, C.1    Jha, S.2    Tomko, D.3    Wang, H.4
  • 6
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - tools for software protection
    • Aug
    • C. Collberg and C. Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28:735-746, Aug. 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 7
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Tech. Report, No.148, Dept. of Computer Sciences, The University of Auckland
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. In Tech. Report, No.148, Dept. of Computer Sciences, The University of Auckland, 1997.
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 8
    • 0031649930 scopus 로고    scopus 로고
    • Manufacturing cheap, resilient, and stealthy opaque constructs
    • C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In POPL'98, pages 184-196, 1998.
    • (1998) POPL'98 , pp. 184-196
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 9
    • 34547364191 scopus 로고    scopus 로고
    • C. Collberg, C. Thomborson, and D. Low. On the limits of software watermarking. In Technical Report #164, Department of Computer Science, The University of Auckland, 1998.
    • C. Collberg, C. Thomborson, and D. Low. On the limits of software watermarking. In Technical Report #164, Department of Computer Science, The University of Auckland, 1998.
  • 10
    • 34547370890 scopus 로고    scopus 로고
    • D. Graver. The Protection of Computer Software, Its Technology and Applications. Cambridge University Press, 2 edition, 1997
    • D. Graver. The Protection of Computer Software - Its Technology and Applications. Cambridge University Press, 2 edition, 1997.
  • 12
    • 84937438364 scopus 로고    scopus 로고
    • Provably secure steganography
    • CRYPTO 2002, of
    • N. J. Hopper, J. Langford, and L. von Ahn. Provably secure steganography. In CRYPTO 2002, volume 2442 of LNCS, pages 77-92, 2002.
    • (2002) LNCS , vol.2442 , pp. 77-92
    • Hopper, N.J.1    Langford, J.2    von Ahn, L.3
  • 17
    • 0035173458 scopus 로고    scopus 로고
    • Game-theoretic analysis of watermark detection
    • P. Moulin and A. Ivanovic. Game-theoretic analysis of watermark detection. In ICIP (8), pages 975-978, 2001.
    • (2001) ICIP , vol.8 , pp. 975-978
    • Moulin, P.1    Ivanovic, A.2
  • 21
    • 24944554182 scopus 로고    scopus 로고
    • Software watermarking through register allocation: Implementation, analysis, and attacks
    • G. Myles and C. Collberg. Software watermarking through register allocation: Implementation, analysis, and attacks. In LNCS 2971, pages 274-293, 2004.
    • (2004) LNCS , vol.2971 , pp. 274-293
    • Myles, G.1    Collberg, C.2
  • 22
    • 34547306974 scopus 로고    scopus 로고
    • Software watermarking via, opaque predicates: Implementation, analysis, and attacks
    • G. Myles and C. Collberg. Software watermarking via, opaque predicates: Implementation, analysis, and attacks. In ICECR-7, 2004.
    • (2004) ICECR-7
    • Myles, G.1    Collberg, C.2
  • 23
    • 33746610961 scopus 로고    scopus 로고
    • Self-validating branch-based software watermarking
    • IH 2005, of, Springer Verlag
    • G. Myles and H. Jin. Self-validating branch-based software watermarking. In IH 2005, volume 3727 of LNCS, pages 342-356. Springer Verlag, 2005.
    • (2005) LNCS , vol.3727 , pp. 342-356
    • Myles, G.1    Jin, H.2
  • 24
    • 28844452176 scopus 로고    scopus 로고
    • Threading software watermarks
    • J. Nagra, and C. Thomborson. Threading software watermarks. In IH'04, 2004.
    • (2004) IH'04
    • Nagra, J.1    Thomborson, C.2
  • 28
    • 34547358551 scopus 로고    scopus 로고
    • Copyright protection of object-oriented softwares
    • ICICS 2001, of
    • J. Pastuszak, D. Michalek, and J. Pieprzyk. Copyright protection of object-oriented softwares. In ICICS 2001, volume 2288 of LNCS, pages 186-199, 2002.
    • (2002) LNCS , vol.2288 , pp. 186-199
    • Pastuszak, J.1    Michalek, D.2    Pieprzyk, J.3
  • 31
    • 1142307016 scopus 로고    scopus 로고
    • Hiding signatures in graph coloring solutions
    • G. Qu and M. Potkonjak. Hiding signatures in graph coloring solutions. In Information Hiding Workshop '99, pages 348-367, 1999.
    • (1999) Information Hiding Workshop '99 , pp. 348-367
    • Qu, G.1    Potkonjak, M.2
  • 32
    • 2442618084 scopus 로고    scopus 로고
    • R. Sion, M. J. Atallah, and S. Prabhakar. wmdb.: Rights protection for numeric relational data. In ICDE, page 863. IEEE Computer Society, 2004.
    • R. Sion, M. J. Atallah, and S. Prabhakar. wmdb.: Rights protection for numeric relational data. In ICDE, page 863. IEEE Computer Society, 2004.
  • 39
    • 33746054154 scopus 로고    scopus 로고
    • Algorithms to watermark software through register allocation
    • DRMTICS 2005, of, October
    • W. Zhu and C. Thomborson. Algorithms to watermark software through register allocation. In DRMTICS 2005, volume 3919 of LNCS, pages 180-191, October 2005.
    • (2005) LNCS , vol.3919 , pp. 180-191
    • Zhu, W.1    Thomborson, C.2
  • 40
    • 24944512730 scopus 로고    scopus 로고
    • On the QP algorithm in software watermarking
    • IEEE ISI 2005, of, May
    • W. Zhu and C. Thomborson. On the QP algorithm in software watermarking. In IEEE ISI 2005, volume 3495 of LNCS, pages 646-647, May 2005.
    • (2005) LNCS , vol.3495 , pp. 646-647
    • Zhu, W.1    Thomborson, C.2
  • 42
    • 24944463250 scopus 로고    scopus 로고
    • A survey of software watermarking
    • IEEE ISI 2005, of, May
    • W. Zhu, C. Thomborson, and F.-Y. Wang. A survey of software watermarking. In IEEE ISI 2005, volume 3495 of LNCS, pages 454-458, May 2005.
    • (2005) LNCS , vol.3495 , pp. 454-458
    • Zhu, W.1    Thomborson, C.2    Wang, F.-Y.3
  • 43
    • 33745796000 scopus 로고    scopus 로고
    • Application of homomorphic function to software obfuscation
    • WISI 2006, of, April
    • W. Zhu, C. Thomborson, and F.-Y. Wang. Application of homomorphic function to software obfuscation. In WISI 2006, volume 3917 of LNCS, pages 152-153, April 2006.
    • (2006) LNCS , vol.3917 , pp. 152-153
    • Zhu, W.1    Thomborson, C.2    Wang, F.-Y.3
  • 45
    • 33745884975 scopus 로고    scopus 로고
    • Covering based granular computing for conflict analysis
    • IEEE ISI 2006, of
    • W. Zhu and F.-Y. Wang. Covering based granular computing for conflict analysis. In IEEE ISI 2006, volume 3975 of LNCS, pages 566-571, 2006.
    • (2006) LNCS , vol.3975 , pp. 566-571
    • Zhu, W.1    Wang, F.-Y.2
  • 46
    • 34547374329 scopus 로고    scopus 로고
    • Extraction in software watermarking
    • to appear in, September, Geneva, Switzerland
    • W. Zhu and C. Thomborson. Extraction in software watermarking. In to appear in A CM Multimedia and Security Workshop, 26-27, September, 2006, Geneva, Switzerland, 2006.
    • (2006) A CM Multimedia and Security Workshop , pp. 26-27
    • Zhu, W.1    Thomborson, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.