{"title":"使用代码加密的防篡改软件水印","authors":"Zhanyong Tang, Dingyi Fang","doi":"10.1109/ISI.2011.5983991","DOIUrl":null,"url":null,"abstract":"Utilizing a modified PPCT structure, a tamper-proof software watermark solution with code-based encryption is proposed. The General Chinese Remainder Theorem is exploited to split the watermark which is represented as a big number into pieces to enhance stealth. Changes to the source and object code are made to embed the watermark, and according to certain policies some parts of object code are encrypted with an en/decryption key which is highly coupled with object code to increase robustness and tamper-proof capability.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A tamper-proof software watermark using code encryption\",\"authors\":\"Zhanyong Tang, Dingyi Fang\",\"doi\":\"10.1109/ISI.2011.5983991\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Utilizing a modified PPCT structure, a tamper-proof software watermark solution with code-based encryption is proposed. The General Chinese Remainder Theorem is exploited to split the watermark which is represented as a big number into pieces to enhance stealth. Changes to the source and object code are made to embed the watermark, and according to certain policies some parts of object code are encrypted with an en/decryption key which is highly coupled with object code to increase robustness and tamper-proof capability.\",\"PeriodicalId\":220165,\"journal\":{\"name\":\"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISI.2011.5983991\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2011.5983991","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A tamper-proof software watermark using code encryption
Utilizing a modified PPCT structure, a tamper-proof software watermark solution with code-based encryption is proposed. The General Chinese Remainder Theorem is exploited to split the watermark which is represented as a big number into pieces to enhance stealth. Changes to the source and object code are made to embed the watermark, and according to certain policies some parts of object code are encrypted with an en/decryption key which is highly coupled with object code to increase robustness and tamper-proof capability.