JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGIES, VOLUME 2, ISSUE 10, NOVEMBER 2012
© 2012 JICTwww.jict.co.uk
Where V' is calculated using the LOC andVersion number of the received software.
Definition 6 (Compare):
The receivedwatermark is compared to the calculatedwatermark. Mathematically can be expressedas:
If compare function returns true than it meansthat the watermark is present and not distorted,or if the compare function evaluates to thefalse than it means that attack was performedon the software.
In this paper a brief note on the Motivation of VBSW, the Frame Model of VBSW and thearchitecture of VBSW are proposed.
D.Curran, N.Hurley, and
M.O.Cinneide, “Securing Java throughsoftware watermarking”, in
Proceedings of the 2
internationalconference on Principles and Practiceof Programming in Java, 2003, pp. 311
C.Colleberg and C.Thomberson,
“Software Watermarking: Models andDynamic Embeddings”, in Proceedings
of Symposium on Principles of Programming Languages, POPL'99,1999, pp. 311
Hirose, N., Okamoto, E., Mambo, M.,
“A proposal for software protetion”, in
proc. 1998 Symposium onCryptography and Information
-9.2.C, Jan. 1998. (inJapanese)4.
A.B.Kahng, J. Lach, W.H.Mangoine-Smith, S,. Mantik, I.L.Markov, M.Potkonjak, P.Tucker, H.Wang, , and
G.Wolfe, “Watermarking Techniquesfor Intellectual Property Protection”,
ACM/ IEEE DAC design
Automation Conf. (DAC’98), pp. 776
-781, June 1999.5.
S. Kannan and T.A.Proebsting,Register allocation in structuredPrograms, Journal of Algorithms,29(2); 223-237, Nov.1998.6.
A.Monden, H.Iida, and K.ichi
Matsumoto, “A practical method for watermarking Java programs”, in The
Computer Software andApplications Conference, 2000, pp.191
A.Monden, H.Iida, and K.ichiMatsumoto, K.Inoue, and K.Torii,
“Watermarking Java Programs”, in
International Symposium on FutureSoftware Technology'99, Ocotober1999, pp. 119
G.Qu and M.Potkonjak, Analysis of watermarking techniques for graphcoloring problem, in IEEE/ACMInternational Cnference on ComputerAided Design, pages 190-193, Nov.1998.9.
G.Qu and M.Potkonjak, “Hiding
Signatures in graph coloring
solutions”, in Information Hiding
Worshop '99, pp.348 -367.10.
T.Sahoo and C.Collberg, “Software
watermarking in the frequencydomain: Implementation, analysis, and
attacks”, in Computer Science
department, University of Arizona(USA), Technical Report, vol. TR0407, March 2004.11.
J.Stern, G.Hachez, P.Kouene, and
J.J.Quisquater, “Robust objectwatermarking: Application to code”, in
Information Hiding Workshop'99,1999, pp.368
R.Venkatesan, V.Vazirani, and
S.Sinha, “A Graph Theoretic approach