首页 | 本学科首页   官方微博 | 高级检索  
     检索      

结合随机数和哈希函数的可重构软件水印方案
引用本文:张茂胜,孙小雁.结合随机数和哈希函数的可重构软件水印方案[J].华南师范大学学报(自然科学版),2013,45(2):47-0.
作者姓名:张茂胜  孙小雁
作者单位:1.1.武汉大学计算机学院、国家多媒体软件工程技术研究中心
基金项目:广西壮族自治区自然科学基金项目(桂科青0832101);广西壮族自治区教育厅立项项目(201106LX513、201106LX516);玉林师范学院重点项目(2012YJZD17)
摘    要:提出一种利用哈希函数和随机数特性并结合PPCT和排列图的混合软件水印方案. 利用随机数和哈希函数进行预处理隐藏真实的版权信息,通过修改PPCT的叶节点的左、右指针来创建排列图.在发生版权纠纷时,PPCT或排列图任何一个被提取即可证明版权.利用排列图或随机数可重构嵌入程序中的水印拓扑图,而且,即使在水印被攻击而部分提取的情况下,根据重构的PPCT与提取的PPCT的相似度为证明版权提供证据,进一步增强软件水印的鲁棒性.仿真实验的提取结果表明,混合软件水印方案在删除、修改、增加指针后仍能证明版权,明显增强水印的抗攻击性能.

关 键 词:软件水印  版权  重构  鲁棒性
收稿时间:2012-05-30

RECONFIGURABLE MIXED SOFTWARE WATERMARKING SCHEME UTILIZING RANDOM NUMBER AND HASH FUNCTION
ZHANG Maosheng,SUN Xiaoyan.RECONFIGURABLE MIXED SOFTWARE WATERMARKING SCHEME UTILIZING RANDOM NUMBER AND HASH FUNCTION[J].Journal of South China Normal University(Natural Science Edition),2013,45(2):47-0.
Authors:ZHANG Maosheng  SUN Xiaoyan
Institution:1.School of mathematics and information,Yulin Normal University,Yulin,Guangxi 537000,China; 2.School of computer science and engineering,Yulin Normal University,Yulin,Guangxi 537000,China)
Abstract:It is difficult to protect software copyrights. In order to improve the robustness of software watermarking, a new software watermarking algorithm is proposed combining the advantages of Pareto Diagram, Planted Plane Cubic Tree (PPCT), Hash function and random number. Hash function and random number are used in preprocessing to hide the real copyrights information. The Pareto Diagram is created by modifying the left and right points of the leaf nodes of the PPCT. Both the PPCT and Pareto Diagram can be used to prove the copyright when it is in a copyright disputes. Even when the code pointers have been attacked, this algorithm will make use of the Pareto Diagram or the random number to reconstruct the PPCT of the watermark information which is embedded in programs. Even in the case of partial extraction,it also can provide evidence for the proof of copyright according to the similarity of reconstructing and extracting PPCT and in this way it further enhances the robustness of the software watermarking. The experimental results show that the proposed system can prove the privacy when some points in software watermark have been deleted, modified, or added and it significantly improves the performance against attack.
Keywords:
本文献已被 CNKI 等数据库收录!
点击此处可从《华南师范大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《华南师范大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号