Font Size: a A A

Research On Dynamic Image Tamper Proofing Software Watermarking Based On Constant Coding

Posted on:2018-10-16Degree:MasterType:Thesis
Country:ChinaCandidate:C ChengFull Text:PDF
GTID:2348330536468312Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Driven by the rapid development of computer and Internet technology,the software industry has also ushered in unprecedented prosperity,but it also brings new problems: software piracy and illegal replication become more and more rampant.Software watermark is a new research software copyright protection of the subject area,it is the author's copyright information into watermark information embedded in the program,when necessary,the watermark can be used to prove the copyright.Based on the study of watermarking preprocessing,topological map construction,embedding method and tamper-resistant performance,this paper presents a dynamic code tamper-resistant software watermarking scheme based on constant coding.The research contents,design scheme,concrete realization process of watermarking are described,and its performance is analyzed.The main contents are as follows:(1)This paper studies the existing watermarking scheme and the watermark protection method of dynamic graphs,and analyzes the characteristics of watermark preprocessing technology,dynamic topology diagram and tamper resistance technology in software watermarking.(2)This paper focuses on the design and implementation of software watermarking scheme.In this paper,based on the research of dynamic graph software watermarking,a new method of dynamic image tamper resistant software watermarking is proposed.This scheme first uses the optimized segmentation matrix CS chaotic scrambling processing method and Asmuth-Bloom threshold sharing algorithm to preprocess the watermark data,then the watermark data encoding for PPCT graph structure improved,then the watermark is embedded in the program graph,and using the constructed F function watermark topology and procedures the constant in each other "connection",and sharing a watermark to F function is added to the form of opaque predicates,to tamper proof role.(3)Finally,the watermarking scheme is implemented on the Sand Mark platform.The experimental process of the watermarking scheme is expounded in detail,and its attack performance is verified by some attack methods.The performance of the watermarking scheme is analyzed and the data rate The concealment is compared with other similar watermarking schemes.It is proved that the scheme is better than the watermarking scheme of the same type in performance.
Keywords/Search Tags:Software watermarking, watermarking preprocessing, decoding function, watermark topology, SandMark test platform
PDF Full Text Request
Related items