##plugins.themes.academic_pro.article.main##
Abstract
The rise  in use  of Internet  and  byte code  languages such  as Java byte code  and  Microsoft’s  Common Intermediate language have  made copying, decompiling  and disassembling software easier with the rapid development of Internet  and Software Industry. The issue of software piracy and security is of great concern. Software watermarking is a new technique appeared in recent years for software copyright protection. It embeds some secret information (watermark) into software as an identifier of the ownership of copyright for the software. We are going to implement a software watermarking algorithm that is effective for the copyright protection of java program, especially for java class files.
Index Terms—software watermarking, byte code, software copyright, protection, java program, class files.
##plugins.themes.academic_pro.article.details##
References
Watermarkingâ€, 2012 International Conference on Systems
and Informatics (ICSAI 2012).
[2] James Hamilton and Sebastian Danicic â€An Evaluation of
the Resilience of Static Java Bytecode Watermarks Against Distortive
Attacksâ€,IAENG International Journal of Computer
Science, 38:1, 2011.
[3] Christian S. Collberg and Clark Thomborson â€Watermarking,
Tamper- Proofing, and Obfuscation Tools for Software
Protectionâ€, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
VOL. 28, NO. 8, AUGUST 2002.
[4] William Feng Zhu â€Concepts and Techniques in Software
Watermarking and Obfuscationâ€, A thesis on Doctor of Philosophy
in Computer Science, August 2007.
[5] H. Tamada, M. Nakamura, A. Monden, and K. Matsumoto
â€Design and evaluation of birthmarks for detecting theft of java
programsâ€, in Proc. IASTED International Conference on
Software Engineering (IASTED SE2004), Feb 2004, pp. 569-
57.
[6] D. Grover â€The Protection of Computer Software - Its Technology
and Applicationsâ€, 2nd ed. Cambridge University Press,
1997.
[7] J. Nagra, C. Thomborson, and C. Collberg A functional
taxonomy for software watermarking, in Twenty-Fifth Australasian
Computer Science Conference (ACSC2002), M. J.
Oudshoorn, Ed. Melbourne, Australia: ACS, 2002.
[8] Y. He Tamperproofing a software watermark by encoding constants,
Masters thesis, University of Auckland, Mar 2002.
[9] C. Collberg and C. Thomborson Software watermarking:
Models and dynamic embeddings, in Proceedings of Symposium
on Principles of Programming Lan- guages, POPL99,
1999, pp. 311324.
[10] L. Zhang, Y. Yang, , X. Niu, and S. Niu, â€A survey on
software watermarkingâ€,Journal of Software, vol. 14, no. 2,
pp. 268-277, 2003.
[11] R. El-Khalil and A. Keromytis,â€Hydan: Embedding secrets
in program binariesâ€,Aug. 14 2004.
[12] C. Collberg, S. Jha, D. Tomko, and H. Wang, â€Uwstego:
A general architecture for software watermarkingâ€, Technical
Report TR04-11, Aug. 31 2001.
[13] C. Collberg, G. Myles, and A. Huntwork, â€Sandmark-a tool
for software protection researchâ€, IEEE Security and Privacy,
vol. 1, no. 4, pp. 40-49, 2003.