skip to main content
10.1145/2801948.2801981acmotherconferencesArticle/Chapter ViewAbstractPublication PagespciConference Proceedingsconference-collections
research-article

Encoding numbers into reducible permutation graphs using heap-ordered trees

Published:01 October 2015Publication History

ABSTRACT

Information hiding is widely used in almost all intelligence and security software systems as a standard technology to prevent piracy and copyright infringement. This technology mainly involves the idea of digital watermarking where a unique identifier (or, watermark number) is embedded into software, image, audio, or video data through the introduction of errors not detectable by human perception. In software watermarking, the proposed graph theoretic methods usually encode watermark numbers as graphs whose structure resembles that of real program graphs. In this paper, in light of our recently published algorithms which encode a watermark number w as a self-inverting permutation, we present an efficient encoding method, along with its corresponding decoding one, which embeds a self-inverting permutation π* into reducible permutation graphs F[π*]. More precisely, we present an encoding algorithm which embeds the permutation π* into F[π*] by first computing the heap-ordered tree of π* (i.e., a rooted binary tree having specific node-value and child-parent properties) using the lattice representation of π* and then, based on the heap node-value properties, producing a reducible permutation graph F[π*]. Moreover, we exploit the max-heap and min-heap representation tree of permutation π* and show that we can efficiently encode the same watermark w into two different reducible permutation graphs F1[π*] and F2[π*]. In general, such a property increases the safety performance of a watermarking system against attacks since it can embed multiple copies of the same watermark value w into a digital object.

References

  1. G. Arboit. A method for watermarking java programs via opaque predicates. In Proc. 5th International Conference on Electronic Commerce Research (ICECR-5), 2002.Google ScholarGoogle Scholar
  2. M. Chroni and S. Nikolopoulos. Encoding watermark integers as self-inverting permutations. In Proc. Int'l Conference on Computer Systems and Technologies (CompSysTech'10), volume ACM ICPS 471, pages 125--130, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Chroni and S. Nikolopoulos. Encoding watermark numbers as cographs using self-inverting permutations. In Proc. Int'l Conference on Computer Systems and Technologies (CompSysTech'11), volume ACM ICPS 578, pages 142--148, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Chroni and S. Nikolopoulos. An efficient graph codec system for software watermarking. In 36th IEEE Conference on Computers, Software, and Applications (COMPSAC'12), volume IEEE Proc., pages 595--600, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Chroni and S. Nikolopoulos. Multiple encoding of a watermark number into reducible permutation graphs using cotrees. In 13th Int'l Conference on Computer Systems and Technologies (CompSysTech'12), volume ACM, pages 118--125, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Chroni and S. Nikolopoulos. Design and evaluation of a graph codec system for software watermarking. In 2nd Int'l Conference on Data Management Technologies and Applications (DATA'13), volume SciTePress, pages 277--284, 2013.Google ScholarGoogle Scholar
  7. C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu, C. Linn, and M. Stepp. Dynamic path-based software watermarking. In ACM Sigplan Notices, volume 39, pages 107--118, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Collberg, E. Carter, S. Kobourov, and C. Thomborson. Error-correcting graphs for software watermarking. In Proc. 29th Workshop on Graphs in Computer Science (WG'03), volume LNCS 2880, pages 156--167, 2003.Google ScholarGoogle Scholar
  9. C. Collberg, A. Huntwork, E. Carter, G. Townsend, and M. Stepp. More on graph theoretic software watermarks: Implementation, analysis, and attacks. Information and Software Technology, 51:56--67, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Collberg and C. Thomborson. Software watermarking: models and dynamic embeddings. In Proc. 26th ACM SIGPLAN-SIGACT on Principles of Program. Languages (POPL'99), pages 311--324, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Cousot and R. Cousot. An abstract interpretation-based framework for software watermarking. In Proc. 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'04), pages 173--185, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Curran, N. Hurley, and M. Cinneide. Securing java through software watermarking. In Proc. Int'l Conference on Principles and Practice of Programming in Java (PPPJ'03), pages 145--148, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Hecht and J. Ullman. Flow graph reducibilit. SIAM J. Computing, 1:188--202, 1972.Google ScholarGoogle ScholarCross RefCross Ref
  14. A. Monden, H. Iida, K. Matsumoto, K. Inoue, and K. Torii. A practical method for watermarking java programs. In Proc. 24th Computer Software and Applications Conference (COMPSAC'00), pages 191--197, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Nagra and C. Thomborson. Threading software watermarks. In Proc. 6th Int'l Workshop on Information Hiding (IH'04), volume LNCS 3200, pages 208--223, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Qu and M. Potkonjak. Analysis of watermarking techniques for graph coloring problem. In Proc. IEEE/ACM Int'l Conference on Computer-aided Design (ICCAD'98), volume ACM Press, pages 190--193, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Sedgewick and P. Flajolet. An Introduction to the Analysis of Algorithms. Addison Wesley, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Stern, G. Hachez, F. Koeune, and J. Quisquater. Robust object watermarking: Application to code. In Proc. 3rd Int'l Workshop on Information Hiding (IH'99), volume LNCS 1768, pages 368--378, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Venkatesan, V. Vazirani, and S. Sinha. A graph theoretic approach to software watermarking. In Proc. 4th Int'l Workshop on Information Hiding (IH'01), volume LNCS 2137, pages 157--168, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Encoding numbers into reducible permutation graphs using heap-ordered trees

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              PCI '15: Proceedings of the 19th Panhellenic Conference on Informatics
              October 2015
              438 pages
              ISBN:9781450335515
              DOI:10.1145/2801948

              Copyright © 2015 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 October 2015

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              PCI '15 Paper Acceptance Rate64of148submissions,43%Overall Acceptance Rate190of390submissions,49%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader