• Corpus ID: 14527641

A Functional Taxonomy for Software Watermarking

  title={A Functional Taxonomy for Software Watermarking},
  author={Krishnaswamy Palsberg and Ma Minseok},
Despite the recent surge of interest in digital watermarking technology from the research community, we lack a comprehensive and precise terminology for software watermarking. In this paper, we attempt to fill that gap by giving distinctive names for the various protective functions served by software watermarks: Validation Mark, Licensing Mark, Authorship Mark and Fingerprinting Mark. We identify the desirable properties and specific vulnerabilities of each type of watermark, and we illustrate… 

Figures from this paper

A survey of static software watermarking

A survey of the known static software watermarking techniques, including a brief explanation of each, is presented.

Informed Recognition in Software Watermarking

  • W. Zhu
  • Computer Science
  • 2007
This paper studies one of core concepts in software watermarking - informed recognition, where to recognize a watermark in a software is to judge the existence of such a watermarks in the corresponding software code.

A Survey of Software Watermarking by Code Re-Ordering

This paper surveys the proposed software watermarking algorithms based on code re-ordering and describes the existing techniques and highlights the short-comings of these algorithms, namely that they are highly susceptible to semantics preserving transformations attacks.

Recognition in software watermarking

A prototype model of software watermark embedding and recognition system based on the concepts and algorithms established in this paper are designed and designed.

SoftMark: Software Watermarking via a Binary Function Relocation

This work presents SoftMark, a software watermarking system that leverages a function relocation where the order of functions implicitly encodes a hidden identifier, being robust in unauthorized detection, while maintaining a negligible performance overhead and reasonable capacity.

Hash Function Based Software Watermarking

A hash function based dynamic software watermarking algorithm that will be able to withstand a variety form of attacks.

Software manipulative techniques of protection and detection: A review

Some of the related methods in software security such as steganography, obfuscation and cryptography, also some of the most applicable techniques in securing software from manipulation such as software watermarking, fingerprinting and software birthmarking are reviewed in this paper.

A robust software watermarking for copyright protection

Watermarking Essential Data Structures for Copyright Protection

A novel method for watermarking R-tree data structure and its variants based on a numbering system that uses variable radix and factorial base is proposed and provides a threat model and analysis to show that the watermarked R-trees are robust and can withstand various types of attacks.

Threading Software Watermarks

A new dynamic technique for embedding robust software watermarks into a software program using thread contention is introduced and it is shown to be resilient to many semantic-preserving transformations that most existing proposals are susceptible to.



Robust Object Watermarking: Application to Code

The vector extraction paradigm is introduced which is the transformation between digital data and an abstract vector representation of these data and a new, robust technique in order to insert watermarks in executable code is proposed.

Fingerprints for Copyright Software Protection

This work introduces two different fingerprint schemes based on equivalent variants of the program that can be easily combined and extended to be resilient against partial fingerprint destruction.

Software watermarking: models and dynamic embeddings

A new software watermarking technique in which a dynamic graphic watermark is stored in the execution state of a program.

Some general methods for tampering with watermarks

To what extent a watermark can be resistant to tampering is discussed and a variety of possible attacks are described.

Digital watermarking: An overview

The main features of an efficient watermarking scheme are presented, robustness issues are discussed and the three main stages of a watermarked algorithm namely watermark generation, embedding and detection are described.

Intellectual Property Protection Systems and Digital Watermarking

The implications of this vulnerability are explored and the use of compression and watermarking in the control of piracy is discussed.

A practical method for watermarking Java programs

This work proposes a practical method that discourages program theft by embedding Java programs with a digital watermark, which is indiscernible by program users, yet enables us to identify an illegal program that contains stolen class files.

On the invertibility of invisible watermarking techniques

It is shown that non-invertibility is a necessary but not sufficient condition in resolving ownership disputes and analysis is presented that links invertibility and quasi-inverts to some classes of watermarking techniques with different properties, as well as to the different classes of attacks developed.

A Review of of Watermarking Principles and Practices

A digital watermark embeds an imperceptible signal into data such as audio, video and images, for a variety of purposes, including captioning and copyright control. As watermarking is increasingly

Semifragile watermarking for authenticating JPEG visual content

A semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks is proposed.