Experimental Study of the Resilience of a Graph-based Watermarking System under Edge Modifications

Anna Mpanti, Stavros D. Nikolopoulos, Maria Rini
{"title":"Experimental Study of the Resilience of a Graph-based Watermarking System under Edge Modifications","authors":"Anna Mpanti, Stavros D. Nikolopoulos, Maria Rini","doi":"10.1145/3139367.3139436","DOIUrl":null,"url":null,"abstract":"Over the last 25 years, a wide range of software watermarking techniques has been proposed encoding watermark numbers as graphs whose structure resembles that of real program graphs. In this domain, we have recently proposed several watermarking codec systems for encoding integer numbers w as reducible permutation flow-graphs F[π*] through the use of self-inverting permutations π*. Following up on our codec systems, we experimentally study the oldest one in order to investigate and attest its resilience to edge-modification attacks on its flow-graph F[π*]. In particular, we construct the flow-graphs F[πi*] which encode the watermarks wi in the range R4 = [8,15], we attack the graph F[πi*] by modifying k edges, perform a series of experiments for each attack case, and determine the percentage of the cases maintaining four properties, namely, Odd-One, Bitonic, Block and Range. Whenever a flow-graph F[πi*] is attacked having k edges modified, if all the four properties are satisfied during the decoding process then the decoding algorithm returns a true-incorrect watermark wj, that is, wj ≠ wi. The experimental study reveals those watermarks wi ∈ R4 which are more resilient in the sense that the decoding algorithm has low probability to return a true-incorrect watermark wj after an edge-modification attack to graph F[πi*] encoding a watermark wi.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3139367.3139436","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Over the last 25 years, a wide range of software watermarking techniques has been proposed encoding watermark numbers as graphs whose structure resembles that of real program graphs. In this domain, we have recently proposed several watermarking codec systems for encoding integer numbers w as reducible permutation flow-graphs F[π*] through the use of self-inverting permutations π*. Following up on our codec systems, we experimentally study the oldest one in order to investigate and attest its resilience to edge-modification attacks on its flow-graph F[π*]. In particular, we construct the flow-graphs F[πi*] which encode the watermarks wi in the range R4 = [8,15], we attack the graph F[πi*] by modifying k edges, perform a series of experiments for each attack case, and determine the percentage of the cases maintaining four properties, namely, Odd-One, Bitonic, Block and Range. Whenever a flow-graph F[πi*] is attacked having k edges modified, if all the four properties are satisfied during the decoding process then the decoding algorithm returns a true-incorrect watermark wj, that is, wj ≠ wi. The experimental study reveals those watermarks wi ∈ R4 which are more resilient in the sense that the decoding algorithm has low probability to return a true-incorrect watermark wj after an edge-modification attack to graph F[πi*] encoding a watermark wi.
边缘修改下基于图的水印系统弹性的实验研究
在过去的25年中,人们提出了各种各样的软件水印技术,将水印数字编码为结构类似于实际程序图的图形。在这个领域中,我们最近提出了几种利用自反转置换π*将整数w编码为可约置换流图F[π*]的水印编解码系统。在我们的编解码器系统之后,我们实验研究了最古老的编解码器,以调查和证明其对其流图F[π*]的边缘修改攻击的弹性。特别地,我们构造了在R4 =[8,15]范围内对水印wi进行编码的流图F[πi*],通过修改k条边对图F[πi*]进行攻击,并对每种攻击情况进行了一系列实验,确定了保持奇数一、双onic、块和范围四种性质的情况所占的百分比。当对一个流图F[πi*]进行k条边修改攻击时,如果在解码过程中满足这四个属性,则解码算法返回一个正误水印wj,即wj≠wi。实验研究表明,对编码水印wi的图F[πi*]进行边缘修改攻击后,解码算法返回正误水印wj的概率较低,具有较强的复原能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信