A Software Watermarking Based on PE File with Tamper-proof Function

After embedding the watermark based on the algorithm of PE file resources section, the data of resource section was still easy to be rearranged, so this paper put forward a new watermark algorithm with the function of anti-tamper. The new algorithm still used watermark information to control the ord...

Full description

Saved in:
Bibliographic Details
Main Authors: Che, Shengbing (Author), Wang, Yemao (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2014-02-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01972 am a22002773u 4500
001 ijeecs3095_1160
042 |a dc 
100 1 0 |a Che, Shengbing  |e author 
100 1 0 |e contributor 
700 1 0 |a Wang, Yemao  |e author 
245 0 0 |a A Software Watermarking Based on PE File with Tamper-proof Function 
260 |b Institute of Advanced Engineering and Science,   |c 2014-02-01. 
520 |a After embedding the watermark based on the algorithm of PE file resources section, the data of resource section was still easy to be rearranged, so this paper put forward a new watermark algorithm with the function of anti-tamper. The new algorithm still used watermark information to control the order of software resource structure's nodes, and hid the watermark information in the rearranged resource structure. At the same time it recorded the exchanged node information of each layer, and encoded these exchanged nodes' information. Then it constructed corresponding MPPCT and DPPCT according to the encoding results to achieve the purpose of anti-tamper. Experiment shows that it realizes a blind detection, resists multiple common attacks effectively, and has strong robustness.  DOI : http://dx.doi.org/10.11591/telkomnika.v12i2.4215 
540 |a Copyright (c) 2014 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a eng 
690 |a Software Watermark; PE File; Resource Section; Anti-tamper 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 12, No 2: February 2014; 1012-1021 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v12.i2 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3095/1160 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3095/1160  |z Get fulltext