Software watermarking scheme with cloud computing constraints
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transf...
Saved in:
Main Authors: | Guang SUN, Xiao-ping FAN, Wang-dong JIANG, Hang-jun ZHOU, Sheng-zong LIU, Chun-hong GONG, Jing ZHU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-09-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00083 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Fragile watermarking technique for detecting image
by: Yu-hong CHANG, et al.
Published: (2017-07-01)
by: Yu-hong CHANG, et al.
Published: (2017-07-01)
Similar Items
-
Software services protection security protocol based on software watermarking in cloud environment
by: Jin-chao XU, et al.
Published: (2012-11-01) -
Traditional guidance mechanism based deep robust watermarking
by: Xuejing GUO, et al.
Published: (2023-04-01) -
Self-embedding robust digital watermarking algorithm with perfectly blind detection
by: Tian-yu YE
Published: (2012-10-01) -
Robust medical zero‐watermarking algorithm based on Residual‐DenseNet
by: Cheng Gong, et al.
Published: (2022-11-01) -
Rotation Correction Algorithm Based on Polar Harmonic Fourier Moments and Optimization of Color Image Security Quantization Watermarking Scheme
by: Yuli Yang, et al.
Published: (2024-01-01)