軟件保護中的擴頻水印研究
[Abstract]:With the rapid development of Internet technology, the spread of digital products has been greatly convenient, but the following side effects have also attracted widespread attention and attention. Software as a typical digital product, its development needs a lot of manpower, material resources and financial resources, but it is easy to copy and spread, which makes software piracy rampant, and seriously damages the interests of software developers. Hit its development enthusiasm. Software watermarking is a discipline developed to solve the problem of software intellectual property proof. By embedding the copyright information of the software or the personal identity information of the user into the software, Extract when necessary to prove the copyright of the software or trace to the pirated source. This paper introduces software protection and some commonly used technologies, including software encryption, code confusion, software tamper-proof, software watermark and software birthmark. The software watermarking technology, including the definition and model of software watermark, is described in detail. Among them, the spread spectrum software watermark has better concealment and robustness. According to the principle of spread spectrum technology, it modifies the components of the feature vector extracted from the software to embed the watermark. In this way, the hidden watermark information on each component is little and can not be detected at will. In this paper, a spread spectrum software watermarking algorithm based on local instruction statistics is proposed on the basis of studying the existing spread spectrum software watermarking algorithm. The algorithm selects the carrier instruction in a certain way, and the method with the most times of occurrence of the carrier instruction, that is, the carrier method, adjusts the corresponding relation according to the hash value of the original program, so that different programs correspond to different carrier instructions. It is more difficult for an attacker to conspire to attack, and even if a certain vector instruction is inferred, it is impossible to find the carrier method corresponding to it again. When the watermark is embedded, only the number of times that the corresponding carrier instruction appears in the carrier method is modified, and the change of the corresponding carrier instruction in the carrier method is statistically analyzed when the watermark is detected. In this way, the attacker's modification to the program does not affect watermark detection as long as it is not in the carrier method. The algorithm appends cyclic redundancy check code to watermark information, which can correct watermark information and restore damaged information bit from certain program. Finally, the related technologies involved in the algorithm are analyzed, including the modification of Java class file, code base, equivalent substitution and insertion of redundant instruction, data check code, and how to select carrier instruction and carrier method, and how to select carrier instruction and carrier method, and how to select carrier instruction and carrier method. The algorithm is implemented on the SandMark platform for Java bytecode, and the performance test and anti-attack test are carried out. The experimental results show that the embedded watermark has little effect on the performance of the program while further improving the robustness of the watermark.
【學位授予單位】:武漢理工大學
【學位級別】:碩士
【學位授予年份】:2013
【分類號】:TP309.7;TP311.53
【參考文獻】
相關期刊論文 前10條
1 許金超;曾國蓀;;一種基于線程關系的軟件水印算法[J];電子學報;2012年05期
2 鄒瀟湘;李錦濤;;基于擴頻的非對稱數(shù)字水印[J];計算機科學;2002年09期
3 楊建龍;王建民;李德毅;;軟件水印技術及其新進展[J];計算機工程;2007年17期
4 歐陽康;張汗靈;;基于擴展門限的軟件水印研究與實現(xiàn)[J];計算機工程;2011年13期
5 王建民;余志偉;王朝坤;付軍寧;;Java程序混淆技術綜述[J];計算機學報;2011年09期
6 龍飛宇;劉嘉勇;袁熹;;一種變換PE文件引入表結構的軟件水印[J];計算機應用;2010年01期
7 周正虎;陳丹;周光霞;趙鑫;;基于病毒多態(tài)性的Java軟件水印技術[J];計算機與數(shù)字工程;2011年11期
8 劉建蓉;秦拯;彭程;;改進的動態(tài)圖水印技術編碼方案[J];計算機應用研究;2011年02期
9 張海超;陳丹;;一種基于棧分配的軟件水印算法[J];計算機與數(shù)字工程;2012年08期
10 徐海銀;馮丹;李丹;陳海兵;劉鴻海;;擴頻軟件水印研究[J];計算機應用研究;2007年10期
相關博士學位論文 前3條
1 馮博;軟件安全開發(fā)關鍵技術的研究和實現(xiàn)[D];北京郵電大學;2010年
2 魯曉成;嵌入式軟件保護關鍵技術研究與應用[D];武漢理工大學;2011年
3 吳建軍;惡意主機環(huán)境下的移動代碼保護[D];浙江大學;2004年
相關碩士學位論文 前5條
1 徐光興;基于代碼混淆的零水印方案的設計與研究[D];武漢理工大學;2011年
2 艾解清;基于指令分布的軟件水印設計與實現(xiàn)[D];湖南大學;2007年
3 羅毅;具有糾錯特性的指令統(tǒng)計軟件水印算法研究[D];湖南大學;2007年
4 周亮;軟件水印算法評估研究[D];吉林大學;2010年
5 蘇琳;基于代碼加密的防篡改軟件水印技術的研究與實現(xiàn)[D];西北大學;2010年
,本文編號:2436484
本文鏈接:http://sikaile.net/falvlunwen/zhishichanquanfa/2436484.html