Abstract
In this paper, we focus on a step of the watermarking process whose importance has been disregarded so far. In this perspective, we introduce the vector extraction paradigm which is the transformation between digital data and an abstract vector representation of these data. As an application, we propose a new, robust technique in order to insert watermarks in executable code.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1999 (1999)
Collberg, C., Thomborson, C., Low, D.: Breaking abstraction and unstructuring data structures. In: IEEE International Conference on Computer Languages, ICCL 1998 (1998)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, Springer. Heidelberg (1996)
Cox, I.J., Miller, M.L.: A review of watermarking anf the importance of perceptual modeling. In: Proc. of Electronic Imagining (1997)
Davidson, R., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program. U.S. Patent 5, 559–884 (1996)
Ergun, F., Kilian, J., Kumar, R.: A note on the limits of collusion resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)
Holmes, K.: Computer software protection. U.S. Patent 5, 531–21 (1994)
Kilian, J., Leighton, T., Matheson, L.R., Shamoon, T.G., Tarjan, R.E., Zane, F.: Resistance of digital watermarks to collusive attacks. Technical Report TR-58598, Departement of computer science, Princeton University (1998)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding. a survey. Proceedings of the IEEE, special issue on protection of multimedia content (1999) (to appear)
Pfitzmann, B., Waidner, M.: Annonymous fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)
Pfitzmann, B., Waidner, M.: Asymmetric fingerprinting for larger collusions. In: 4th ACM Conference on Computer and Communications Security, pp. 151–160 (1997)
Pfitzmann, B., Sadeghi, A.-R.: Coin-based anonymous fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 150–164. Springer, Heidelberg (1999)
Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting (extended abstract). In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stern, J.P., Hachez, G., Koeune, F., Quisquater, JJ. (2000). Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_25
Download citation
DOI: https://doi.org/10.1007/10719724_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67182-4
Online ISBN: 978-3-540-46514-0
eBook Packages: Springer Book Archive