软件保护中的扩频水印研究
[Abstract]:With the rapid development of Internet technology, the spread of digital products has been greatly convenient, but the following side effects have also attracted widespread attention and attention. Software as a typical digital product, its development needs a lot of manpower, material resources and financial resources, but it is easy to copy and spread, which makes software piracy rampant, and seriously damages the interests of software developers. Hit its development enthusiasm. Software watermarking is a discipline developed to solve the problem of software intellectual property proof. By embedding the copyright information of the software or the personal identity information of the user into the software, Extract when necessary to prove the copyright of the software or trace to the pirated source. This paper introduces software protection and some commonly used technologies, including software encryption, code confusion, software tamper-proof, software watermark and software birthmark. The software watermarking technology, including the definition and model of software watermark, is described in detail. Among them, the spread spectrum software watermark has better concealment and robustness. According to the principle of spread spectrum technology, it modifies the components of the feature vector extracted from the software to embed the watermark. In this way, the hidden watermark information on each component is little and can not be detected at will. In this paper, a spread spectrum software watermarking algorithm based on local instruction statistics is proposed on the basis of studying the existing spread spectrum software watermarking algorithm. The algorithm selects the carrier instruction in a certain way, and the method with the most times of occurrence of the carrier instruction, that is, the carrier method, adjusts the corresponding relation according to the hash value of the original program, so that different programs correspond to different carrier instructions. It is more difficult for an attacker to conspire to attack, and even if a certain vector instruction is inferred, it is impossible to find the carrier method corresponding to it again. When the watermark is embedded, only the number of times that the corresponding carrier instruction appears in the carrier method is modified, and the change of the corresponding carrier instruction in the carrier method is statistically analyzed when the watermark is detected. In this way, the attacker's modification to the program does not affect watermark detection as long as it is not in the carrier method. The algorithm appends cyclic redundancy check code to watermark information, which can correct watermark information and restore damaged information bit from certain program. Finally, the related technologies involved in the algorithm are analyzed, including the modification of Java class file, code base, equivalent substitution and insertion of redundant instruction, data check code, and how to select carrier instruction and carrier method, and how to select carrier instruction and carrier method, and how to select carrier instruction and carrier method. The algorithm is implemented on the SandMark platform for Java bytecode, and the performance test and anti-attack test are carried out. The experimental results show that the embedded watermark has little effect on the performance of the program while further improving the robustness of the watermark.
【学位授予单位】:武汉理工大学
【学位级别】:硕士
【学位授予年份】:2013
【分类号】:TP309.7;TP311.53
【参考文献】
相关期刊论文 前10条
1 许金超;曾国荪;;一种基于线程关系的软件水印算法[J];电子学报;2012年05期
2 邹潇湘;李锦涛;;基于扩频的非对称数字水印[J];计算机科学;2002年09期
3 杨建龙;王建民;李德毅;;软件水印技术及其新进展[J];计算机工程;2007年17期
4 欧阳康;张汗灵;;基于扩展门限的软件水印研究与实现[J];计算机工程;2011年13期
5 王建民;余志伟;王朝坤;付军宁;;Java程序混淆技术综述[J];计算机学报;2011年09期
6 龙飞宇;刘嘉勇;袁熹;;一种变换PE文件引入表结构的软件水印[J];计算机应用;2010年01期
7 周正虎;陈丹;周光霞;赵鑫;;基于病毒多态性的Java软件水印技术[J];计算机与数字工程;2011年11期
8 刘建蓉;秦拯;彭程;;改进的动态图水印技术编码方案[J];计算机应用研究;2011年02期
9 张海超;陈丹;;一种基于栈分配的软件水印算法[J];计算机与数字工程;2012年08期
10 徐海银;冯丹;李丹;陈海兵;刘鸿海;;扩频软件水印研究[J];计算机应用研究;2007年10期
相关博士学位论文 前3条
1 冯博;软件安全开发关键技术的研究和实现[D];北京邮电大学;2010年
2 鲁晓成;嵌入式软件保护关键技术研究与应用[D];武汉理工大学;2011年
3 吴建军;恶意主机环境下的移动代码保护[D];浙江大学;2004年
相关硕士学位论文 前5条
1 徐光兴;基于代码混淆的零水印方案的设计与研究[D];武汉理工大学;2011年
2 艾解清;基于指令分布的软件水印设计与实现[D];湖南大学;2007年
3 罗毅;具有纠错特性的指令统计软件水印算法研究[D];湖南大学;2007年
4 周亮;软件水印算法评估研究[D];吉林大学;2010年
5 苏琳;基于代码加密的防篡改软件水印技术的研究与实现[D];西北大学;2010年
,本文编号:2436484
本文链接:https://www.wllwen.com/falvlunwen/zhishichanquanfa/2436484.html