Towards a Provably Resilient Scheme for Graph-Based Watermarking | SpringerLink
Skip to main content

Towards a Provably Resilient Scheme for Graph-Based Watermarking

  • Conference paper
Graph-Theoretic Concepts in Computer Science (WG 2013)

Abstract

Techniques of watermarking/fingerprinting concern the embedding of identification data into a digital object, allowing for later claims of authorship/ownership and therefore discouraging piracy. Graph-based watermarking schemes comprise an encoding algorithm, which translates a given number (the identifier, usually a positive integer) onto some appropriately tailored graph (the watermark), and a decoding algorithm, which extracts the original identifier from a given watermark. Collberg, Kobourov, Carter and Thomborson (Error-correcting graphs for software watermarking, WG’03) introduced one such scheme, meant for software watermarking, in which an integer key was encoded onto a reducible permutation graph. A number of interesting ideas have further improved the original scheme, including the formulation of a particularly promising linear-time codec by Chroni and Nikolopoulos. We extend the work of these authors in various aspects. First, we characterize the class of graphs constituting the image of Chroni and Nikolopoulos’s encoding function. Furthermore, we formulate a novel, linear-time decoding algorithm which detects and recovers from ill-intentioned removals of k ≤ 2 edges. Finally, our results also include the detection of k ≤ 5 edge modifications (insertions/deletions) in polynomial time and a proof that such bound is tight, so the resilience of the considered watermarking scheme is fully determined. Our proof that graphs of a well-characterized class can detect and recover from bounded-magnitude distortive attacks reinforces the interest in regarding those graphs as possible watermarking solutions to numerous applications.

Work partially supported by Eletrobrás — Distribuição Rondônia, DR/069/2012.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chroni, M., Nikolopoulos, S.D.: Efficient encoding of watermark numbers as reducible permutation graphs. arXiv:1110.1194v1 [cs.DS] (2011)

    Google Scholar 

  2. Chroni, M., Nikolopoulos, S.D.: Encoding watermark numbers as cographs using self-inverting permutations. In: 12th Int’l Conference on Computer Systems and Technologies, CompSysTech 2011, vol. 578, pp. 142–148. ACM ICPS (2011) (Best Paper Award)

    Google Scholar 

  3. Chroni, M., Nikolopoulos, S.D.: An efficient graph codec system for software watermarking. In: 36th IEEE Conference on Computers, Software, and Applications (COMPSAC 2012). IEEE Proceedings, pp. 595–600 (2012)

    Google Scholar 

  4. Chroni, M., Nikolopoulos, S.D.: Multiple encoding of a watermark number into reducible permutation graphs using cotrees. In: 13th Int’l Conference on Computer Systems and Technologies (CompSysTech 2012). ACM ICPS Proceedings, pp. 118–125 (2012)

    Google Scholar 

  5. Chroni, M., Nikolopoulos, S.D.: An embedding graph-based model for software watermarking. In: 8th Int’l Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012. IEEE Proceedings, pp. 261–264 (2012)

    Google Scholar 

  6. Collberg, C., Huntwork, A., Carter, E., Townsend, G., Stepp, M.: More on graph theoretic software watermarks: implementation, analysis and attacks. Information and Software Technology 51, 56–67 (2009)

    Article  Google Scholar 

  7. Collberg, C., Kobourov, S., Carter, E., Thomborson, C.: Error-correcting graphs for software watermarking. In: Bodlaender, H.L. (ed.) WG 2003. LNCS, vol. 2880, pp. 156–167. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Collberg, C., Thomborson, C.: Software watermarking models and dynamic embeddings. In: Proc. 26th ACM SIGPLAN-SIGACT on Principles of Programming Languages, POPL 1999, pp. 311–324 (1999)

    Google Scholar 

  9. Collberg, C., Thomborson, C., Townsend, G.M.: Dynamic graph-based software fingerprinting. ACM Transactions on Programming Languages and Systems 29, 1–67 (2007)

    Article  Google Scholar 

  10. Davidson, R.L., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program, US Patent 5.559.884. Microsoft Corporation (1996)

    Google Scholar 

  11. Hecht, M.S., Ullman, J.D.: Flow graph reducibility. SIAM J. Computing 1, 188–202 (1972)

    Article  MathSciNet  MATH  Google Scholar 

  12. Hecht, M.S., Ullman, J.D.: Characterizations of reducible flow graphs. Journal of the ACM 21, 367–375 (1974)

    Article  MathSciNet  MATH  Google Scholar 

  13. Zhu, J., Liu, Y., Yin, K.: A novel dynamic graph software watermark scheme. In: 1st Int’l Workshop on Education Technology and Computer Science, vol. 3, pp. 775–780 (2009)

    Google Scholar 

  14. Venkatesan, R., Vazirani, V.V., Sinha, S.: A graph theoretic approach to software watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 157–168. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bento, L.M.S., Boccardo, D., Machado, R.C.S., Pereira de Sá, V.G., Szwarcfiter, J.L. (2013). Towards a Provably Resilient Scheme for Graph-Based Watermarking. In: Brandstädt, A., Jansen, K., Reischuk, R. (eds) Graph-Theoretic Concepts in Computer Science. WG 2013. Lecture Notes in Computer Science, vol 8165. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45043-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45043-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45042-6

  • Online ISBN: 978-3-642-45043-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics