A robust steganography-based software watermarking

Author(s):  
Cheol Jeon ◽  
Yookun Cho
2010 ◽  
Vol 29 (12) ◽  
pp. 3188-3190 ◽  
Author(s):  
Hua JIANG ◽  
Zong-lu SHA ◽  
Ai-cheng XUAN

2016 ◽  
Vol 9 (16) ◽  
pp. 3880-3892 ◽  
Author(s):  
Qilin Qi ◽  
Aaron Sharp ◽  
Dongming Peng ◽  
Yaoqing Yang ◽  
Hamid Sharif

2004 ◽  
Vol 39 (1) ◽  
pp. 173-185 ◽  
Author(s):  
Patrick Cousot ◽  
Radhia Cousot

2012 ◽  
Vol 268-270 ◽  
pp. 1873-1876
Author(s):  
Dong Lai Fu

To prevent three dimension applications developed using jMonkey Engine from being pirated, a robust software watermarking algorithm was proposed. A watermark based on an initial sequence of scene-graph-traversal was embedded into the software by a numbering system. Since the initial sequence was a very important clue for extracting the embedded watermark, it should be only known by the owner. Furthermore, the algorithm for embedding and extracting the watermark was discussed. Analysis shows that the new method is more robust. And it enjoys the advantage that the size of scene graph does not be changed.


2017 ◽  
Vol 168 (12) ◽  
pp. 3-10
Author(s):  
Aminou Halidou ◽  
Youssoufa Mohamadou ◽  
Georges Delort
Keyword(s):  

2016 ◽  
Vol 10 (7) ◽  
pp. 147-156 ◽  
Author(s):  
Krishan Kumar ◽  
Viney Kehar ◽  
Prabhpreet Kaur

Sign in / Sign up

Export Citation Format

Share Document