Skip to main content

A Survey of Software Watermarking

  • Conference paper
Intelligence and Security Informatics (ISI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Included in the following conference series:

Abstract

In the Internet age, software is one of the core components for the operation of network and it penetrates almost all aspects of industry, commerce, and daily life. Since digital documents and objects can be duplicated and distributed easily and economically cheaply and software is also a type of digital objects, software security and piracy becomes a more and more important issue. In order to prevent software from piracy and unauthorized modification, various techniques have been developed. Among them is software watermarking which protects software through embedding some secret information into software as an identifier of the ownership of copyright for this software. This paper gives a brief overview of software watermarking. It describes the taxonomy, attack models, and algorithms of software watermarking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arboit, G.: A Method for Watermarking Java Programs via Opaque Predicates. In: The Fifth International Conference on Electronic Commerce Research, ICECR-5 (2002)

    Google Scholar 

  2. Collberg, C., Thomborson, C.: Software Watermarking: Models and Dynamic Embeddings. In: POPL 1999 (1999)

    Google Scholar 

  3. Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering 28, 735–746 (2002)

    Article  Google Scholar 

  4. Collberg, C., Carter, E., Debray, S., Huntwork, A., Kececioglu, J., Linn, C., Stepp, M.: Dynamic path-based software watermarking. In: ACM SIGPLAN Notices. Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation, June 2004, vol. 39(6) (2004)

    Google Scholar 

  5. Collberg, C., Jha, S., Tomko, D., Wang, H.: UWStego: A General Architecture for Software Watermarking, Technical Report (August 31, 2001), available on http://www.cs.wisc.edu/~hbwang/watermark/TR.ps (November 20, 2001)

  6. Cousot, P., Cousot, R.: An abstract interpretation-based framework for software watermarking. Principles of Programming Languages 2003, 311–324 (2003)

    Google Scholar 

  7. Curran, D., Hurley, N., Cinneide, M.: Securing Java through Software Watermarking. In: PPPJ 2003, Kilkenny City, Irenland, pp. 145–148 (2003)

    Google Scholar 

  8. Davidson, R., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program, US Patent 5,559,884, Assignee: Microsoft Corporation (September 1996)

    Google Scholar 

  9. Monden, A., Iida, H., Matsumoto, K., Inoue, K., Torii, K.: A Practical Method for Watermarking Java Programs. In: The 24th Computer Software and Applications Conference (compsac 2000), Taipei, Taiwan (October 2000)

    Google Scholar 

  10. Nagra, J., Thomborson, C., Collberg, C.: A functional taxonomy for software watermarking. In: Oudshoorn, M.J. (ed.) Proc. 25th Australasian Computer Science Conference 2002, ACS, January 2002, pp. 177–186 (2002)

    Google Scholar 

  11. Nagra, J., Thomborson, C.: Threading Software Watermarks. In: Proc. Information Hiding Workshop (2004)

    Google Scholar 

  12. Qu, G., Potkonjak, M.: Analysis of Watermarking Techniques for Graph Coloring Problem. In: Proceeding of 1998 IEEE/ACM International Conference on Computer Aided Design, pp. 190–193. ACM Press, New York (1998)

    Chapter  Google Scholar 

  13. Stern, J., Hachez, G., Koeune, F., Quisquater, J.: Robust Object Watermarking: Application to Code. In: Information Hiding, pp. 368–378 (1999)

    Google Scholar 

  14. Thomborson, C., Nagra, J., Somaraju, R., He, C.: Tamper-proofing Software Watermarks. In: Montague, P., Steketee, C. (eds.) Proc. Second Australasian Information Security Workshop (AISW 2004), ACS, CRPIT, vol. 32, pp. 27–36 (2004)

    Google Scholar 

  15. Venkatesan, R., Vazirani, V., Sinha, S.: A Graph Theoretic Approach to software watermarking. Presented at 4th International Information Hiding Workshop, Pittsburgh, PA, USA (April 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, W., Thomborson, C., Wang, FY. (2005). A Survey of Software Watermarking. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_42

Download citation

  • DOI: https://doi.org/10.1007/11427995_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics