Journal of University of Science and Technology of China ›› 2011, Vol. 41 ›› Issue (7): 599-606.DOI: 10.3969/j.issn.0253-2778.2011.07.006

Previous Articles     Next Articles

A tamper-proof software watermark using code-based encryption

TANG Zhanyong   

  1. School of Information Science and Technology, Northwest University, and NWU-Irdeto Network-Information Security Joint Lab (NISL), Xian 710127, China
  • Received:2011-04-28 Revised:2011-06-22 Online:2011-07-31 Published:2011-07-31

Abstract: Utilizing a modified PPCT structure, a tamper-proof software watermark solution with code-based encryption was proposed. The general Chinese remainder theorem was exploited to split the watermark which was represented as a big number into pieces to enhance stealthiness. Changes to the source and object code were made to embed the watermark, and according to certain policies some parts of the object code was encrypted with an en/decryption key that was highly coupled with the object code to increase robustness and tamper-proof capability.

Key words: software watermark, dynamic graph, general Chinese remainder theorem, code encryption, tamper-proof