Abstract
Techniques of watermarking/fingerprinting concern the embedding of identification data into a digital object, allowing for later claims of authorship/ownership and therefore discouraging piracy. Graph-based watermarking schemes comprise an encoding algorithm, which translates a given number (the identifier, usually a positive integer) onto some appropriately tailored graph (the watermark), and a decoding algorithm, which extracts the original identifier from a given watermark. Collberg, Kobourov, Carter and Thomborson (Error-correcting graphs for software watermarking, WG’03) introduced one such scheme, meant for software watermarking, in which an integer key was encoded onto a reducible permutation graph. A number of interesting ideas have further improved the original scheme, including the formulation of a particularly promising linear-time codec by Chroni and Nikolopoulos. We extend the work of these authors in various aspects. First, we characterize the class of graphs constituting the image of Chroni and Nikolopoulos’s encoding function. Furthermore, we formulate a novel, linear-time decoding algorithm which detects and recovers from ill-intentioned removals of k ≤ 2 edges. Finally, our results also include the detection of k ≤ 5 edge modifications (insertions/deletions) in polynomial time and a proof that such bound is tight, so the resilience of the considered watermarking scheme is fully determined. Our proof that graphs of a well-characterized class can detect and recover from bounded-magnitude distortive attacks reinforces the interest in regarding those graphs as possible watermarking solutions to numerous applications.
Work partially supported by Eletrobrás — Distribuição Rondônia, DR/069/2012.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chroni, M., Nikolopoulos, S.D.: Efficient encoding of watermark numbers as reducible permutation graphs. arXiv:1110.1194v1 [cs.DS] (2011)
Chroni, M., Nikolopoulos, S.D.: Encoding watermark numbers as cographs using self-inverting permutations. In: 12th Int’l Conference on Computer Systems and Technologies, CompSysTech 2011, vol. 578, pp. 142–148. ACM ICPS (2011) (Best Paper Award)
Chroni, M., Nikolopoulos, S.D.: An efficient graph codec system for software watermarking. In: 36th IEEE Conference on Computers, Software, and Applications (COMPSAC 2012). IEEE Proceedings, pp. 595–600 (2012)
Chroni, M., Nikolopoulos, S.D.: Multiple encoding of a watermark number into reducible permutation graphs using cotrees. In: 13th Int’l Conference on Computer Systems and Technologies (CompSysTech 2012). ACM ICPS Proceedings, pp. 118–125 (2012)
Chroni, M., Nikolopoulos, S.D.: An embedding graph-based model for software watermarking. In: 8th Int’l Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012. IEEE Proceedings, pp. 261–264 (2012)
Collberg, C., Huntwork, A., Carter, E., Townsend, G., Stepp, M.: More on graph theoretic software watermarks: implementation, analysis and attacks. Information and Software Technology 51, 56–67 (2009)
Collberg, C., Kobourov, S., Carter, E., Thomborson, C.: Error-correcting graphs for software watermarking. In: Bodlaender, H.L. (ed.) WG 2003. LNCS, vol. 2880, pp. 156–167. Springer, Heidelberg (2003)
Collberg, C., Thomborson, C.: Software watermarking models and dynamic embeddings. In: Proc. 26th ACM SIGPLAN-SIGACT on Principles of Programming Languages, POPL 1999, pp. 311–324 (1999)
Collberg, C., Thomborson, C., Townsend, G.M.: Dynamic graph-based software fingerprinting. ACM Transactions on Programming Languages and Systems 29, 1–67 (2007)
Davidson, R.L., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program, US Patent 5.559.884. Microsoft Corporation (1996)
Hecht, M.S., Ullman, J.D.: Flow graph reducibility. SIAM J. Computing 1, 188–202 (1972)
Hecht, M.S., Ullman, J.D.: Characterizations of reducible flow graphs. Journal of the ACM 21, 367–375 (1974)
Zhu, J., Liu, Y., Yin, K.: A novel dynamic graph software watermark scheme. In: 1st Int’l Workshop on Education Technology and Computer Science, vol. 3, pp. 775–780 (2009)
Venkatesan, R., Vazirani, V.V., Sinha, S.: A graph theoretic approach to software watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 157–168. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bento, L.M.S., Boccardo, D., Machado, R.C.S., Pereira de Sá, V.G., Szwarcfiter, J.L. (2013). Towards a Provably Resilient Scheme for Graph-Based Watermarking. In: Brandstädt, A., Jansen, K., Reischuk, R. (eds) Graph-Theoretic Concepts in Computer Science. WG 2013. Lecture Notes in Computer Science, vol 8165. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45043-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-45043-3_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-45042-6
Online ISBN: 978-3-642-45043-3
eBook Packages: Computer ScienceComputer Science (R0)