2009 Fifth International Conference on Information Assurance and Security 2009
DOI: 10.1109/ias.2009.327
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Graph Watermark Scheme of Tamper Resistance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…by (2), (5) and (7), as can be shown by a straightforward but lengthy computation. Let d = ε 2 log n. This implies that…”
Section: Observation 13mentioning
confidence: 88%
See 1 more Smart Citation
“…by (2), (5) and (7), as can be shown by a straightforward but lengthy computation. Let d = ε 2 log n. This implies that…”
Section: Observation 13mentioning
confidence: 88%
“…In this case, the object being marked is a piece of software and the goal of a "graph watermarking" scheme is to create a graph, G, from a message, m, and then embed G into the control flow of a piece of software, S, to mark S. Examples of such work include pioneering work by Collberg and Thomborson [15], as well as subsequent work by Venkatesan, Vazirani, and Sinha [52] and Collberg et al [14]. (See also Chen et al [7] and Bento et al [4], as well as a survey by Hamilton and Danicic [22].) This work on software watermarking differs from the graph watermarking problem we study in the present paper, however, because in the graph watermarking problem we study an input graph is provided and we want to alter it to add a mark.…”
Section: Additional Related Workmentioning
confidence: 99%
“…Several papers [9,62,81,79,45,82] describe a technique which combines radix graphs with the errorcorrecting properties of PPCTs by converting a radix graph into a PPCT-like structure.…”
Section: Graph Watermarkingmentioning
confidence: 99%
“…This allows developers of software to verify their copyright through extracting their signature from illegal copies. Researchers have developed a number of watermarking techniques over the past two decades that can be categorized into three major classes according to the extraction method, namely abstract, static and dynamic watermarking [4]. Most current watermarking methods attack a feature of the program that can assume many connections but, however, only hiding the watermark in one connection.…”
Section: Introductionmentioning
confidence: 99%