{"title":"可视化密码方案在软件水印中的应用","authors":"Reetu Mariya Jacob, P. K, A. P","doi":"10.1109/ICOEI48184.2020.9142987","DOIUrl":null,"url":null,"abstract":"Software watermark is a unique identifier that is embedded in software that can be extracted later to prove the identity of the owner. Software is prone to threats like piracy, modification, and illicit use. In this technologically sophisticated period, software watermarking is necessary to authenticate ownership of the software. In the proposed scheme, collatz conjecture to embed the watermark is used and the input to collatz function is generated using a visual cryptographic scheme. The watermark value is split into different shares by the visual cryptographic secret sharing scheme. Instrumentation is done using sbt-instrumentation to extract the watermark. The advantage of this scheme is that it is flexible for any number of embedding points. This watermarking scheme is also resistant to model checking and watermarking attacks.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Application of Visual Cryptography Scheme in Software Watermarking\",\"authors\":\"Reetu Mariya Jacob, P. K, A. P\",\"doi\":\"10.1109/ICOEI48184.2020.9142987\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software watermark is a unique identifier that is embedded in software that can be extracted later to prove the identity of the owner. Software is prone to threats like piracy, modification, and illicit use. In this technologically sophisticated period, software watermarking is necessary to authenticate ownership of the software. In the proposed scheme, collatz conjecture to embed the watermark is used and the input to collatz function is generated using a visual cryptographic scheme. The watermark value is split into different shares by the visual cryptographic secret sharing scheme. Instrumentation is done using sbt-instrumentation to extract the watermark. The advantage of this scheme is that it is flexible for any number of embedding points. This watermarking scheme is also resistant to model checking and watermarking attacks.\",\"PeriodicalId\":267795,\"journal\":{\"name\":\"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOEI48184.2020.9142987\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOEI48184.2020.9142987","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Application of Visual Cryptography Scheme in Software Watermarking
Software watermark is a unique identifier that is embedded in software that can be extracted later to prove the identity of the owner. Software is prone to threats like piracy, modification, and illicit use. In this technologically sophisticated period, software watermarking is necessary to authenticate ownership of the software. In the proposed scheme, collatz conjecture to embed the watermark is used and the input to collatz function is generated using a visual cryptographic scheme. The watermark value is split into different shares by the visual cryptographic secret sharing scheme. Instrumentation is done using sbt-instrumentation to extract the watermark. The advantage of this scheme is that it is flexible for any number of embedding points. This watermarking scheme is also resistant to model checking and watermarking attacks.