软件水印综述
作者:
基金项目:

Supported by the National Natural Science Foundation of China under Grant No.60073049 (国家自然科学基金); the National Grand Fundamental Research 973 Program of China under Grant No.G1999035805 (国家重点基础研究发展规划(973)); the Assisting Project of Ministry of Education o

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [12]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    随着软件产业的迅速发展,软件产品的版权保护已成为一个十分重要的问题.详细介绍了软件水印这种新兴软件版权保护技术,深入分析了软件水印的现状、分类、攻击方法以及已有的各种算法,并分别讨论了这些算法的利弊,最后提出软件水印的下一步发展方向.

    Abstract:

    With the rapid development of software industry, the copyright protection of software product already becomes a very important issue. In this paper, the software watermarking technique is presented in detail. An overview of software watermarking including the taxonomy, the methods of attacking, the current algorithms, and their advantages and disadvantages are presented in this paper. Finally the state of arts and possible new directions of software watermarking are also stated.

    参考文献
    [1]Kan X. Encryption and Decryption: Software Protection Technique and Complete Resolvent. Beijing: Electronic Engineering Publishing Company, 2001 (in Chinese).
    [2]Holmes K. Computer software protection. American Pat 5 287 407. 1994.
    [3]Davidson R L, Myhrvold N. Method and system for generating and auditing a signature for a computer program. American Pat 5 559 884. 1996.
    [4]Moskowitz SA, Cooperman M. Method for stega-cipher protection of computer code. American Pat 5 745 569. 1996.
    [5]Samson PR. Apparatus and method for serializing and validating copies of computer software. American Pat 5 287 408. 1994.
    [6]Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding. IBM Systems Journal, 1996,35(3-4):313~336.
    [7]Christian C, Thomborsen C, Douglas L. A taxonomy of obfuscation transformations. Technical Report #148, 1997.
    [8]Christian C, Thomborsen C. Software watermarking: models and dynamic embeddings. In: Aiken A, et al., eds. Proceedings of the 26th Annual SIGPLAN-AIGACT Symposium on Principles of Programming Languages (POPL'99). Association for Computing Machinery Press, 1999. 311~324.
    [9]Palsberg J, Krishnaswamy S, Minseok K, Ma D, Shao QY, Zhang Y. Experience with software watermaking. In: Epstein J, et al., eds. Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000). New Orleans: IEEE Computer Society Press, 2000. 308~316.
    [10]Monden A, Hajimu L, Matsumoto KI, Inoue K, Torii K. Watermarking java programs. In: Lu J, et al., eds. Proceedings of the 4th International Symposium on Future Software Technology. Nanjing: Software Engineers Association, 1999. 119~124.
    [11]Stern P, Hachez J, Quisquater G, Jean-Jacques. Robust object watermarking: application to code. In: Andreas P, et al., eds. Proceedings of the 3rd International Workshop on Information Hiding. Springer-Verlag, 1999.
    [12]看雪.加密与解密--软件保护技术及完全解决方案.北京:电子工业出版社,2001.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

张立和,杨义先,钮心忻,牛少彰.软件水印综述.软件学报,2003,14(2):268-277

复制
分享
文章指标
  • 点击次数:9005
  • 下载次数: 10647
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2002-05-13
  • 最后修改日期:2002-09-06
文章二维码
您是第20381073位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号