Proceedings of the 4th ACM International Workshop on Contents Protection and Security 2006
DOI: 10.1145/1178766.1178776
|View full text |Cite
|
Sign up to set email alerts
|

Recognition in software watermarking

Abstract: The piracy of software has long been a concern for owners and developers of software. In order to prevent software from piracy and unauthorized modification, many techniques to protect software have been developed. Software watermarking is such a technique for protecting software by embedding secret information into the software to identify its copyright owner. As a relatively new scientific area, the key concepts in software watermarking are informal; some are even confusing. There is a need to formalize thes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 40 publications
0
8
0
Order By: Relevance
“…These involve access to source code, where programmers insert copyright marks and integrity checks right inside their code. Information inserted in this way can be used to prove the integrity and authorship of the program [13]. Outside Hydan, other authors [1] have later described different techniques to introduce information in executable files.…”
Section: Previous Workmentioning
confidence: 99%
“…These involve access to source code, where programmers insert copyright marks and integrity checks right inside their code. Information inserted in this way can be used to prove the integrity and authorship of the program [13]. Outside Hydan, other authors [1] have later described different techniques to introduce information in executable files.…”
Section: Previous Workmentioning
confidence: 99%
“…In this section, we introduce some concepts of embedding a watermark into, extracting a watermark from, and recognizing a watermark from a software program. These issues were already addressed in our previous paper [19,20]. We need these concepts to define the concepts of informed recognition.…”
Section: Embedding Extraction and Recognitionmentioning
confidence: 94%
“…As for the detailed concepts of extraction and recognition in software watermarking, please refer to papers [19,20].…”
Section: Definition 3 (Set Of Candidate Watermarks) a W ∈ W Is Callementioning
confidence: 99%
See 2 more Smart Citations