Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos
{"title":"A dynamic watermarking model for embedding reducible permutation graphs into software","authors":"Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos","doi":"10.5220/0004509600740085","DOIUrl":null,"url":null,"abstract":"Software watermarking involves embedding a unique identifier or, equivalently, a watermark value, within a software to discourage software theft; towards the embedding process, several graph theoretic watermarking algorithmic techniques encode the watermark values as graph structures and embed them in application programs. Recently, we presented an efficient codec system for encoding a watermark number w as a reducible permutation graph F[π<sup>∗</sup>] through the use of self-inverting permutations π<sup>∗</sup>. In this paper, we propose a dynamic watermarking model for embedding the watermark graph F[π<sup>∗</sup>] into an application program P. The main idea behind the proposed watermarking model is a systematic use of appropriate calls of specific functions of the program P. More precisely, our model uses the dynamic call-graph G(P, I<inf>key</inf>) of the program P, taken by the specific input I<inf>key</inf>, and the graph F[π<sup>∗</sup>], and produces the watermarked program P<sup>∗</sup> having the following key property: its dynamic call-graph G(P<sup>∗</sup>, I<inf>key</inf>) and the reducible permutation graph F[π<sup>∗</sup>] are isomorphic graphs. Within this idea the program P<sup>∗</sup> is produced by only altering appropriate real-calls of specific functions of the input program P. Moreover, the proposed watermarking model incorporates such properties which cause it resilient to attacks.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Security and Cryptography (SECRYPT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0004509600740085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Software watermarking involves embedding a unique identifier or, equivalently, a watermark value, within a software to discourage software theft; towards the embedding process, several graph theoretic watermarking algorithmic techniques encode the watermark values as graph structures and embed them in application programs. Recently, we presented an efficient codec system for encoding a watermark number w as a reducible permutation graph F[π∗] through the use of self-inverting permutations π∗. In this paper, we propose a dynamic watermarking model for embedding the watermark graph F[π∗] into an application program P. The main idea behind the proposed watermarking model is a systematic use of appropriate calls of specific functions of the program P. More precisely, our model uses the dynamic call-graph G(P, Ikey) of the program P, taken by the specific input Ikey, and the graph F[π∗], and produces the watermarked program P∗ having the following key property: its dynamic call-graph G(P∗, Ikey) and the reducible permutation graph F[π∗] are isomorphic graphs. Within this idea the program P∗ is produced by only altering appropriate real-calls of specific functions of the input program P. Moreover, the proposed watermarking model incorporates such properties which cause it resilient to attacks.