Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions

2021 ◽  
pp. 250-280
Author(s):  
Rishab Goyal ◽  
Sam Kim ◽  
Brent Waters ◽  
David J. Wu
2010 ◽  
Vol 29 (12) ◽  
pp. 3188-3190 ◽  
Author(s):  
Hua JIANG ◽  
Zong-lu SHA ◽  
Ai-cheng XUAN

Algorithmica ◽  
2016 ◽  
Vol 79 (4) ◽  
pp. 1318-1352 ◽  
Author(s):  
San Ling ◽  
Duong Hieu Phan ◽  
Damien Stehlé ◽  
Ron Steinfeld
Keyword(s):  

2004 ◽  
Vol 39 (1) ◽  
pp. 173-185 ◽  
Author(s):  
Patrick Cousot ◽  
Radhia Cousot

2012 ◽  
Vol 268-270 ◽  
pp. 1873-1876
Author(s):  
Dong Lai Fu

To prevent three dimension applications developed using jMonkey Engine from being pirated, a robust software watermarking algorithm was proposed. A watermark based on an initial sequence of scene-graph-traversal was embedded into the software by a numbering system. Since the initial sequence was a very important clue for extracting the embedded watermark, it should be only known by the owner. Furthermore, the algorithm for embedding and extracting the watermark was discussed. Analysis shows that the new method is more robust. And it enjoys the advantage that the size of scene graph does not be changed.


Author(s):  
Lucas Kowalczyk ◽  
Tal Malkin ◽  
Jonathan Ullman ◽  
Mark Zhandry
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document