Font Size: a A A

Research And Design Of Zero-watermarking Scheme Based On Obfuscation

Posted on:2012-06-17Degree:MasterType:Thesis
Country:ChinaCandidate:G X XuFull Text:PDF
GTID:2178330335452626Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Computer industry has gradually bring our society to an information, intelligence, pluralistic society, whether in live, work or research areas are permeated with the effects of computer. It is precisely because of the computer in our life that our work has only become more convenient and abundant. As an component of computer, the software has an important status. The progress of software is the major driving force for computer area. However, in today's society, the software is faced with various threats and obstacles. For example, software piracy, malicious tampering and access the data of software violation, etc. These illegal actions not only violate the software copyright, but only hit the confidence of software developers who will develop new software. In order to ensure the normal development of software, the research of software security has important practical significance.Software security technology is divided into two kinds. One is pre-protection technology, such as encryption algorithms, code obfuscation, dongle, etc. The other is after-protection technology, such as software watermarking, digital watermarking and other technologies. Combining the two technology, this paper has proposed a zero-watermarking scheme based on obfuscation.This paper presents three threat model of software watermarking, and introduces the main stage of software protection technology. According to the characteristics of code obfuscation the design principles are proposed and some common techniques are introduced. This design framework for software watermarking is conducted in-depth analysis, and on this basis, the design of zero-watermarking is introduced. Based on the features of code obfuscation and watermarking, this paper has proposed the zero-watermarking scheme based on obfucation and the main content is that the watermark is embedded into software in the process of code obfuscation without additional code, thus it can improve the security of software watermarking.In order to prove that the scheme is feasible, this paper propose a simple prototype system, and the result of the experiment has proved it. Then this paper analyse the scheme from point of the correctness, the hidden ability and the robustness, and the scheme is proved feasible to the level of theory.
Keywords/Search Tags:code obfuscation, software watermarking, zero-watermarking, software security, reverse engineering
PDF Full Text Request
Related items