Font Size: a A A

A Software Watermarking Algorithm Based On Distribution Of Instruction And Its Implementation

Posted on:2008-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:J Q AiFull Text:PDF
GTID:2178360215479838Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the fast development of the network, software protection issues face extremely severe challenge. Software products can be spread widely in short time over the network. Bootleggers are no longer a few specialized pirate personages but hundreds and thousands of individuals. Software protection technology has been actively researched at home and abroad, which is mainly on the safety of software's distribution and the safety of software's running, but it is inefficient in resisting pirate. Software watermarking is an important branch of digital watermarking technology which prevents pirate by embedding copyright information. Recent years, many software watermarking algorithms have been proposed, but most of what can not achieve appropriate balance between robustness and realization, so there is still a blank in the area of usable software watermarking algorithm.In this paper, an improved software watermarking algorithm is proposed based on distribution of instructions. It simplifies the implementation of this algorithm by forming codebook in different ways. In addition, by reorder of the codebook, the new scheme has the ability of resisting collusive attack and interpretation attack. This paper designs and realizes an extensible prototype system which associates with the feature of MSIL instruction set. The system includes the construction of Code Book, de-assembly, user requirement control, file analysis control and some protection plug-in(each plug-in is an implementation of one protection technology). The system not only provides a platform to implement this algorithm, but also serve for those algorithms will presented in the future as long as fitting for the interface of this system.The experiment aims to comparing the Stern algorithm with our version. The experiment results show that, the scheme is of less influence on object program's performance, simply implementation, better performance on resisting interpretation attack and collusive attack.
Keywords/Search Tags:Software watermarking, Distribution of instruction, Code Book, Collusive attack, Interpretation attack
PDF Full Text Request
Related items