Sciweavers

1143 search results - page 20 / 229
» Extraction in software watermarking
Sort
View
TSE
2002
65views more  TSE 2002»
13 years 7 months ago
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection
Christian S. Collberg, Clark D. Thomborson
ICIP
2007
IEEE
14 years 9 months ago
A Composite Approach for Blind Grayscale Logo Watermarking
This paper presents a composite blind digital watermarking technique, CompMark, to hide a visually meaningful grayscale logo in a host image. The multi-resolution fusion principle...
Elliot First, Xiaojun Qi
CCS
2001
ACM
14 years 2 days ago
Dynamic Self-Checking Techniques for Improved Tamper Resistance
We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for ...
Bill G. Horne, Lesley R. Matheson, Casey Sheehan, ...
MM
2000
ACM
112views Multimedia» more  MM 2000»
13 years 12 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
COMPSAC
2000
IEEE
13 years 12 months ago
A Practical Method for Watermarking Java Programs
Java programs distributed through Internet are now suffering from program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled...
Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koj...