z-logo
Premium
The evaluation of two software watermarking algorithms
Author(s) -
Myles Ginger,
Collberg Christian,
Heidepriem Zachary,
Navabi Armand
Publication year - 2005
Publication title -
software: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.437
H-Index - 70
eISSN - 1097-024X
pISSN - 0038-0644
DOI - 10.1002/spe.657
Subject(s) - java bytecode , computer science , digital watermarking , algorithm , software , bytecode , set (abstract data type) , java , programming language , theoretical computer science , operating system , artificial intelligence , java applet , java annotation , image (mathematics)
In this paper we analyze the effectiveness of two different software watermarking algorithms. The first is an algorithm proposed by Akito Monden et al . and the second an algorithm proposed by Robert L. Davidson and Nathan Myhrvold of the Microsoft Corporation. We have implemented these techniques within the S AND M ARK framework, a system designed to study the effectiveness of software protection algorithms on Java bytecode. To the best of our knowledge this is the first implementation and empirical evaluation of these algorithms with respect to a set of properties such as bit‐rate, stealth, and resilience to attack. We demonstrate through the use of the S AND M ARK framework that both of these algorithms have a high bit‐rate but are unstealthy and easy to attack. Copyright © 2005 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here