CASIA OpenIR  > 09年以前成果
A survey of software watermarking
Zhu, W; Thomborson, C; Wang, FY; Kantor, P; Muresan, G; Roberts, F; Zeng, DD; Wang, FY; Chen, H; Merkle, RC
AbstractIn the Internet age, software is one of the core components for the operation of network and it penetrates almost all aspects of industry, commerce, and daily life. Since digital documents and objects can be duplicated and distributed easily and economically cheaply and software is also a type of digital objects, software security and piracy becomes a more and more important issue. In order to prevent software from piracy and unauthorized modification, various techniques have been developed. Among them is software watermarking which protects software through embedding some secret information into software as an identifier of the ownership of copyright for this software. This paper gives a brief overview of software watermarking. It describes the taxonomy, attack models, and algorithms of software watermarking.
KeywordSoftware Security Software Watermarking
WOS HeadingsScience & Technology ; Technology
Indexed ByISTP ; SCI
WOS Research AreaComputer Science
WOS SubjectComputer Science, Artificial Intelligence ; Computer Science, Information Systems ; Computer Science, Interdisciplinary Applications ; Computer Science, Theory & Methods
WOS IDWOS:000230114100042
Citation statistics
Document Type期刊论文
Affiliation1.Univ Auckland, Dept Comp Sci, Auckland, New Zealand
2.Univ Arizona, Syst & Ind Engn Dept, Tucson, AZ 85721 USA
3.Chinese Acad Sci, Inst Automat, Key Lab Complex Syst & Intelligent Sci, Beijing 100080, Peoples R China
Recommended Citation
GB/T 7714
Zhu, W,Thomborson, C,Wang, FY,et al. A survey of software watermarking[J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,2005,3495:454-458.
APA Zhu, W.,Thomborson, C.,Wang, FY.,Kantor, P.,Muresan, G.,...&Merkle, RC.(2005).A survey of software watermarking.INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS,3495,454-458.
MLA Zhu, W,et al."A survey of software watermarking".INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS 3495(2005):454-458.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Zhu, W]'s Articles
[Thomborson, C]'s Articles
[Wang, FY]'s Articles
Baidu academic
Similar articles in Baidu academic
[Zhu, W]'s Articles
[Thomborson, C]'s Articles
[Wang, FY]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Zhu, W]'s Articles
[Thomborson, C]'s Articles
[Wang, FY]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.