字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者&題名查詢臺灣博碩士以作者查詢全國書目
研究生中文姓名:黃建豪
研究生英文姓名:Huang, Jian-Hao
中文論文名稱:基於數位簽章的動態軟體浮水印強健性研究
英文論文名稱:A Study on the Robustness of Digital Signature-Based Dynamic Software Watermarking
指導教授姓名:丁培毅
口試委員中文姓名:教授︰吳宗杉
副教授︰丁培毅
教授︰許建隆
學位類別:碩士
校院名稱:國立臺灣海洋大學
系所名稱:資訊工程學系
學號:10357002
請選擇論文與海洋研究相關度:無相關
請選擇論文為:學術型
畢業年度:104
畢業學年度:104
學期:
語文別:中文
論文頁數:30
中文關鍵詞:軟體浮水印虛擬亂數序列數位簽章軟體保護
英文關鍵字:software watermarkingpseudo-random sequencedigital signaturesoftware protection
相關次數:
  • 推薦推薦:0
  • 點閱點閱:30
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:15
  • 收藏收藏:0
將一段秘密的訊息隱藏於軟體中,當發生使用權糾紛時透過公開的擷取演算法取出訊息以證明軟體的所有權,是軟體浮水印的基本概念,目前大多數軟體浮水印研究著重於浮水印嵌入方法的強健性,浮水印、著作權擁有者和軟體三者之間並沒有緊密關聯性,導致浮水印方法在法律層面的證據性薄弱。本文提出具有不可否認性及不可偽造性的軟體浮水印方法:計算欲保護軟體的數位簽章,以此簽章為亂數種子產生計算上不可預測的虛擬亂數序列,再運用具有相當強健性的動態浮水印嵌入方法將此序列隱藏於欲保護軟體的條件判斷式中,不僅藉由數位簽章建立著作權所有者與軟體間計算上不可變更的關聯性,也藉由亂數序列的隨機性質進一步隱藏浮水印,加強動態浮水印的強健性,使惡意使用者更難移除浮水印,另外也使得部份破壞的浮水印仍然具有不可偽造的可驗證性質。
The basic idea of software watermarking is to hide a passage of secret message in the software such that it can be extracted by a publicized extraction algorithm to prove the legal usage right in case of being charged of software copyright infringement. While most software watermarking researches focus on the robustness of the watermark embedding methods, this robustness do not guarantee the unbreakable linkage among the watermarks, the copyright owner, and the target software. Thus, most watermarking methods do not provide sufficient legal evidence in the court. In this thesis, a software watermarking method which provides the properties of non-repudiation and unforgeability is proposed. First the owner obtains a digital signature on the claimed software. This signature is used as a seed to a computationally unpredictable pseudo-random generator. The output pseudo-random sequence is treated as the watermark bits for a sufficiently robust dynamic software watermarking scheme. This sequence is hidden in the selection statements of the target software. In this way, the digital signature of the copyright owner establishes a strong immutable relation between himself and the target software. The randomness of the watermark further hides itself such that sabotaged watermarks can be recognized and verified with great confidence. The robustness of the dynamic software watermarking scheme, i.e. the hardness to remove a watermark for malicious adversaries, is greatly enhanced.
摘要 I
Abstract II
圖次 IV
表次 V
第一章 緒論 1
1.1 概述 1
1.2 相關研究 3
1.3 本文貢獻 6
1.4 章節介紹 10
第二章 背景知識 11
2.1 軟體浮水印 11
2.2 數位簽章 12
2.3 虛擬亂數產生器 12
2.4 漢明碼 13
2.5 展頻通訊 14
第三章 系統建構 15
3.1 參數設置演算法 15
3.2 嵌入演算法 16
3.3 偵測演算法 19
第四章 分析和結果討論 21
第五章 結論與未來工作 28
參考文獻 29

[1] G. Arboit, “A Method for Watermarking JAVA Programs via Opaque Predicates,” 5th International Conference on Electronic Commerce Research( ICECR-5 ), 124 -131, 2002.
[2] C. Collberg, C. Thomborson and D. Low, “On the limits of software watermarking,” in Technical Report #164, Department of Computer Science, he University of Auckland, 1998.
[3] C. Collberg, C. Thomborson, and D. Low, “Manufacturing Cheap,Resilient, and Stealthy Opaque Constructs,” Proc. Symp. Principles of Programming Languages (POPL'98), Jan. 1998.
[4] C. Collberg, and C. Thomborson, “Software watermarking: Models and dynamic embedding,” ACM Symposium on Principles of Programming Languages, 311-324, 1999.
[5] C. Collberg and C. Thomborson, “Watermarking, tamper-proofing, and obfuscation-tools for software protection,” IEEE Transactions on Software Engineering, vol.28, 735-746, 2002.
[6] C. Collberg, G. Myles, and A. Huntwork, “Sandmark--A Tool for Software Protection Research.” IEEE Security Privacy, vol.1, no. 4, 40-49, 2003
[7] C. Collberg, E. Carter, S. Debray, A. Huntwork, J. Kececioglu, C.Linn, and M. Stepp, “Dynamic path-based software watermarking,” ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 107-118, 2004.
[8] J. Hamilton, and S. Danicic, “An Evaluation of the Resilience of Static JAVA Bytecode Watermarks Against Distortive Attacks,” IAENG, International Journal of Computer Science, vol. 38, 1-15, 2001.
[9] Y. He, “Tamperproofing a software watermark by encoding constants,” Master’s thesis, University of Auckland, Mar 2002.
[10] A. Monden, H. Iida, K. ichi Matsumoto, K. Inoue, and K. Torii, “Watermarking java programs,” in International Symposium on Future Software Technology ’99, 119–124, October 1999.
[11] A. Monden, H. Iida, and K. ichi Matsumoto, “A practical method for watermarking java programs,” in The 24th Computer Software and Applications Conference, 191–197, 2000.
[12] G. Myles and C. Collberg, “Software watermarking via opaque predicates: Implementation, analysis, and attacks,” Electronic Commerce Res 6 (2), 155-171, 2006.
[13] J. Nagra, and C. Thomborson, “Threading software watermarks,” 6th International Information Hiding Workshop, 2004.
[14] S. Thaker, “Software watermarking via assembly code transformations,” Master’s thesis. San Jose State University, 2004.
[15] C. Thomborson, J. Nagra, R. Somaraju and Y. He, “Tamper-proofing Software Watermarks,” Second Australasian Information Security Workshop(AISW2004), ed. P. Montague and C. Steketee, ACS, CRPIT, Vol.32, 27-36, 2004.
[16] P.-Y. Ting, S.-D Huang, T.-S. Wu and H.-Y. Lin, “A Provable Watermark-Based Copyright Protection Scheme,” 10th Asia Joint Conference on Information Security (AsiaJCIS), 124-129, 2015.
[17] R. Venkatesan et al, “A Graph Theoretic Approach to Software Watermarking,” 4th International Workshop on Information Hiding, London:Springer-Verlag, 157-168, 2001.
[18] 黃少達、丁培毅 和 吳宗杉,“基於浮水印技術且具不可偽造性及不模糊性的著作權保護機制”,2015全國計算機會議。

電子全文
全文檔開放日期:2016/07/29
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *