首页 | 官方网站   微博 | 高级检索  
     

基于混沌优化的分存软件水印方案
引用本文:李 斌,周清雷.基于混沌优化的分存软件水印方案[J].计算机应用研究,2013,30(11):3418-3420.
作者姓名:李 斌  周清雷
作者单位:郑州大学 信息工程学院, 郑州 450001
基金项目:国家“863”计划基金资助项目(2009AA012201)
摘    要:针对软件水印鲁棒性差、水印分存算法执行效率低的问题, 提出了一种基于混沌优化的分存软件水印方案。该方案通过引入混沌系统, 将水印信息矩阵分割、混沌置乱, 形成分存水印; 水印嵌入时, 将分存水印一一编码为DPPCT拓扑图, 并将hash处理后的水印信息分别填充于各个DPPCT的info域; 水印嵌入后, 利用混沌加密, 保护全部代码, 防止逆向工程等手段对软件水印的破坏。理论分析和实验表明, 该方案可有效地抵抗各种语义保持变换攻击, 减少程序负载, 提高水印的鲁棒性及执行效率。

关 键 词:软件水印  混沌理论  水印分存  DPPCT拓扑图  鲁棒性

Sharing software watermarking scheme based on chaotic optimization
LI Bin,ZHOU Qing-lei.Sharing software watermarking scheme based on chaotic optimization[J].Application Research of Computers,2013,30(11):3418-3420.
Authors:LI Bin  ZHOU Qing-lei
Affiliation:School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China
Abstract:In order to solve the poor robustness of software watermarking and the low execution efficiency of watermarking sharing algorithm, this paper proposed a sharing software watermarking scheme based on chaotic optimization. The scheme took advantage of chaos system, matrix partition and chaotic scrambling the watermarking information to form sharing watermarking. When watermarking was embedded, using DPPCT topology graph encode the sharing watermarking, then putting the hash value of the watermarking information into the info field of each DPPCT. After the watermarking embedded, using chaotic encryption to protect all code and prevent reverse engineering and other methods to attack the software watermarking. Theoretical analysis and experimental results show that the scheme can effectively resist various semantics preserving transformation attacks, decrease the program load and improve robustness and execution efficiency of the watermarking.
Keywords:software watermarking  chaos theory  sharing watermarking  DPPCT topology graph  robustness
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号