天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

軟件保護(hù)中的擴(kuò)頻水印研究

發(fā)布時(shí)間:2019-03-07 21:50
【摘要】:伴隨著互聯(lián)網(wǎng)技術(shù)的飛速發(fā)展,數(shù)字產(chǎn)品的傳播也得到了極大的方便,不過隨之而來的副作用也引起了人們的廣泛關(guān)注和重視。其中軟件作為一種典型的數(shù)字產(chǎn)品,其開發(fā)需要耗費(fèi)大量的人力、物力和財(cái)力,但復(fù)制和傳播卻很容易,這使得軟件盜版猖獗,嚴(yán)重?fù)p害了軟件開發(fā)者的利益,打擊了其開發(fā)積極性。軟件水印就是為了解決軟件知識(shí)產(chǎn)權(quán)證明問題而發(fā)展起來的一門學(xué)科,通過將軟件的版權(quán)信息或用戶的個(gè)人身份信息嵌入軟件之中,在必要時(shí)提取出來以證明軟件的版權(quán)歸屬或追蹤到盜版源。 本文介紹了軟件保護(hù)和其中的一些常用技術(shù),包括軟件加密、代碼混淆、軟件防篡改、軟件水印和軟件胎記,詳細(xì)闡述了其中的軟件水印技術(shù),包括軟件水印的定義、模型、分類和攻擊方式等,其中擴(kuò)頻軟件水印具有較好的隱蔽性和魯棒性,它根據(jù)擴(kuò)頻技術(shù)的原理,修改從軟件中提取出的特征矢量的各分量值從而嵌入水印,這樣每個(gè)分量上所隱藏的水印信息很少且不可被隨意檢測到。 在研究已有擴(kuò)頻軟件水印算法的基礎(chǔ)上,提出了一種基于局部指令統(tǒng)計(jì)的擴(kuò)頻軟件水印算法。算法按一定方式選取載體指令,載體指令出現(xiàn)次數(shù)最多的方法即載體方法,并根據(jù)原始程序哈希值調(diào)整這一對應(yīng)關(guān)系,這樣不同的程序?qū)?yīng)不同的載體指令,攻擊者共謀攻擊難度加大,即使推測出某一載體指令也無法找到其重新對應(yīng)的載體方法。嵌入水印時(shí),只修改載體方法內(nèi)對應(yīng)載體指令的出現(xiàn)次數(shù),檢測水印時(shí)只對載體方法內(nèi)對應(yīng)載體指令的變化情況進(jìn)行統(tǒng)計(jì)分析,這樣攻擊者對程序所做的修改只要不是在載體方法內(nèi)就不影響水印的檢測。算法對水印信息附加了循環(huán)冗余校驗(yàn)碼,可對水印信息進(jìn)行糾錯(cuò),從一定程序恢復(fù)被破壞的信息位。 最后分析了算法所涉及的相關(guān)技術(shù),包括對Java類文件的修改、代碼本、指令等價(jià)替換和插入冗余指令、數(shù)據(jù)校驗(yàn)碼以及如何選取載體指令和載體方法,并針對Java字節(jié)碼在SandMark平臺(tái)上進(jìn)行了算法實(shí)現(xiàn),并進(jìn)行了性能測試和抗攻擊性測試,實(shí)驗(yàn)結(jié)果表明,在進(jìn)一步提高水印抗攻擊性的同時(shí),嵌入的水印對程序的性能影響較小。
[Abstract]:With the rapid development of Internet technology, the spread of digital products has been greatly convenient, but the following side effects have also attracted widespread attention and attention. Software as a typical digital product, its development needs a lot of manpower, material resources and financial resources, but it is easy to copy and spread, which makes software piracy rampant, and seriously damages the interests of software developers. Hit its development enthusiasm. Software watermarking is a discipline developed to solve the problem of software intellectual property proof. By embedding the copyright information of the software or the personal identity information of the user into the software, Extract when necessary to prove the copyright of the software or trace to the pirated source. This paper introduces software protection and some commonly used technologies, including software encryption, code confusion, software tamper-proof, software watermark and software birthmark. The software watermarking technology, including the definition and model of software watermark, is described in detail. Among them, the spread spectrum software watermark has better concealment and robustness. According to the principle of spread spectrum technology, it modifies the components of the feature vector extracted from the software to embed the watermark. In this way, the hidden watermark information on each component is little and can not be detected at will. In this paper, a spread spectrum software watermarking algorithm based on local instruction statistics is proposed on the basis of studying the existing spread spectrum software watermarking algorithm. The algorithm selects the carrier instruction in a certain way, and the method with the most times of occurrence of the carrier instruction, that is, the carrier method, adjusts the corresponding relation according to the hash value of the original program, so that different programs correspond to different carrier instructions. It is more difficult for an attacker to conspire to attack, and even if a certain vector instruction is inferred, it is impossible to find the carrier method corresponding to it again. When the watermark is embedded, only the number of times that the corresponding carrier instruction appears in the carrier method is modified, and the change of the corresponding carrier instruction in the carrier method is statistically analyzed when the watermark is detected. In this way, the attacker's modification to the program does not affect watermark detection as long as it is not in the carrier method. The algorithm appends cyclic redundancy check code to watermark information, which can correct watermark information and restore damaged information bit from certain program. Finally, the related technologies involved in the algorithm are analyzed, including the modification of Java class file, code base, equivalent substitution and insertion of redundant instruction, data check code, and how to select carrier instruction and carrier method, and how to select carrier instruction and carrier method, and how to select carrier instruction and carrier method. The algorithm is implemented on the SandMark platform for Java bytecode, and the performance test and anti-attack test are carried out. The experimental results show that the embedded watermark has little effect on the performance of the program while further improving the robustness of the watermark.
【學(xué)位授予單位】:武漢理工大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2013
【分類號】:TP309.7;TP311.53

【參考文獻(xiàn)】

相關(guān)期刊論文 前10條

1 許金超;曾國蓀;;一種基于線程關(guān)系的軟件水印算法[J];電子學(xué)報(bào);2012年05期

2 鄒瀟湘;李錦濤;;基于擴(kuò)頻的非對稱數(shù)字水印[J];計(jì)算機(jī)科學(xué);2002年09期

3 楊建龍;王建民;李德毅;;軟件水印技術(shù)及其新進(jìn)展[J];計(jì)算機(jī)工程;2007年17期

4 歐陽康;張汗靈;;基于擴(kuò)展門限的軟件水印研究與實(shí)現(xiàn)[J];計(jì)算機(jī)工程;2011年13期

5 王建民;余志偉;王朝坤;付軍寧;;Java程序混淆技術(shù)綜述[J];計(jì)算機(jī)學(xué)報(bào);2011年09期

6 龍飛宇;劉嘉勇;袁熹;;一種變換PE文件引入表結(jié)構(gòu)的軟件水印[J];計(jì)算機(jī)應(yīng)用;2010年01期

7 周正虎;陳丹;周光霞;趙鑫;;基于病毒多態(tài)性的Java軟件水印技術(shù)[J];計(jì)算機(jī)與數(shù)字工程;2011年11期

8 劉建蓉;秦拯;彭程;;改進(jìn)的動(dòng)態(tài)圖水印技術(shù)編碼方案[J];計(jì)算機(jī)應(yīng)用研究;2011年02期

9 張海超;陳丹;;一種基于棧分配的軟件水印算法[J];計(jì)算機(jī)與數(shù)字工程;2012年08期

10 徐海銀;馮丹;李丹;陳海兵;劉鴻海;;擴(kuò)頻軟件水印研究[J];計(jì)算機(jī)應(yīng)用研究;2007年10期

相關(guān)博士學(xué)位論文 前3條

1 馮博;軟件安全開發(fā)關(guān)鍵技術(shù)的研究和實(shí)現(xiàn)[D];北京郵電大學(xué);2010年

2 魯曉成;嵌入式軟件保護(hù)關(guān)鍵技術(shù)研究與應(yīng)用[D];武漢理工大學(xué);2011年

3 吳建軍;惡意主機(jī)環(huán)境下的移動(dòng)代碼保護(hù)[D];浙江大學(xué);2004年

相關(guān)碩士學(xué)位論文 前5條

1 徐光興;基于代碼混淆的零水印方案的設(shè)計(jì)與研究[D];武漢理工大學(xué);2011年

2 艾解清;基于指令分布的軟件水印設(shè)計(jì)與實(shí)現(xiàn)[D];湖南大學(xué);2007年

3 羅毅;具有糾錯(cuò)特性的指令統(tǒng)計(jì)軟件水印算法研究[D];湖南大學(xué);2007年

4 周亮;軟件水印算法評估研究[D];吉林大學(xué);2010年

5 蘇琳;基于代碼加密的防篡改軟件水印技術(shù)的研究與實(shí)現(xiàn)[D];西北大學(xué);2010年

,

本文編號:2436484

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/falvlunwen/zhishichanquanfa/2436484.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶0b9f9***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請E-mail郵箱bigeng88@qq.com