Hiding Signatures in Variable Names

  • Yinjie Su
  • Jiahui Liu
  • Dong Li
Part of the Communications in Computer and Information Science book series (CCIS, volume 320)


With the development of software technology, the copyright of the software is increasingly important. One aspect is the copyright of the source code. This paper proposed a new algorithm named HSVN (hiding signatures in variable names) to hide the copyright signature or watermark in the source code. It belongs to the static watermark. The basic idea of HSVN algorithm is adding signature bytes into the variable names which are located by random sequence, and the difference between the alongside two chars of the specific variable name is the hidden signature byte. HSVN Algorithm can hide the signature more easily and more invisibly. Moreover, it can hide a large amount of information with little redundancy added to the program.


watermark signature random sequence variable name 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia Data-embedding and Watermarking Technologies. Proc. of the IEEE 86(6), 1054–1087 (1998)CrossRefGoogle Scholar
  2. 2.
    Collberg, C.S., Thomborson, C.: Watermarking,Tamper-proofing, and Obfuscation-tools for Software Protection. IEEE Transactions on Software Engineering 28, 735–746 (2002)CrossRefGoogle Scholar
  3. 3.
    Hamilton, J., Danicic, S.: A Survey of Static Software Watermarking. In: Internet Security, pp. 100–107 (2011)Google Scholar
  4. 4.
    Dai, P., Wang, C., Yu, Z., Yue, Y., Wang, J.: A Software Watermark Based Architecture for Cloud Security. In: Sheng, Q.Z., Wang, G., Jensen, C.S., Xu, G. (eds.) APWeb 2012. LNCS, vol. 7235, pp. 270–281. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  5. 5.
    Chroni, M., Nikolopoulos, S.D.: Encoding Watermark Numbers as Cographs using Self-inverting Permutations. In: 12th International Conference on Computer Systems and Technologies, pp. 142–148 (2011)Google Scholar
  6. 6.
    Zhang, S., Zhu, G., Wang, Y.: A Strategy of Software Protection based on Multi-watermarking Embedding. In: 2nd International Conference on Control, Instrumentation and Automation, pp. 444–447 (2011)Google Scholar
  7. 7.
    Collberg, C.S., Thomborson, C.: On the Limits of Software Watermarking. Technical Report. 164 (August 1998)Google Scholar
  8. 8.
    Davidson, R.I., Myhrvold, N.: Method and System for Generating and Auditing a Signature for a Computer Program (September 1996)Google Scholar
  9. 9.
    Holmes, K.: Computer Software Protection. International Business Machines Corporation (February 1994)Google Scholar
  10. 10.
    Samson, P.R.: Apparatus and Method for Serializing and Validating Copies of Computer Software (February 1994)Google Scholar
  11. 11.
    Qu, G., Potkonjak, M.: Analysis of Watermarking Techniques for Graph Coloring Problem. In: Proceedings of the 1998 IEEE/ACM International Conference on Computer-aided Design, pp. 190–193 (1998)Google Scholar
  12. 12.
    Myles, G., Collberg, C.S.: Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 274–293. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  13. 13.
    Collberg, C.S., Thomborson, C.: Software Watermarking: Models and Dynamic Embeddings. In: Conference Record of the Annual ACM Symposium on Principles of Programming Languages, pp. 311–324 (1999)Google Scholar
  14. 14.
    Collberg, C.S., Huntwork, A., Carter, E., Townsend, G.: Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 192–207. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  15. 15.
    Venkatesan, R., Vazirani, V.V., Sinha, S.: A Graph Theoretic Approach to Software Watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 157–168. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  16. 16.
    Collberg, C.S., Huntwork, A., Carter, E., Townsend, G.: Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 192–207. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  17. 17.
    Shirali-Shahreza, M., Shirali-Shahreza, S.: Software Watermarking by Equation Reordering. In: 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA (2008) Google Scholar
  18. 18.
    Asmuth, C., Bloom, J.: AModular Approach to Key Safeguarding. IEEE Transactions on Information Theory IT-29, 208–210 (1983)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Myers, A.C., Liskow, B.: Protecting Privacy Using the Decentralized Label Model. ACM Transactions on Software Engineering and Methodology 9(4), 410–442 (2000)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Yinjie Su
    • 1
  • Jiahui Liu
    • 1
  • Dong Li
    • 1
  1. 1.School of Computer Science and TechnologyHarbin Institute of TechnologyHarbinChina

Personalised recommendations