소프트웨어 저작권 보호를 위한 워터마킹 기술

  • Published : 2016.01.18

Abstract

Keywords

References

  1. Business Software Alliance, Ninth Annual BSA and IDC Global Software Piracy Study. 2012.
  2. Business Software Alliance, 경쟁력 우위: 정품 소프트웨어의 경제적 효과 (Competitive Advantage The Economic Impact of Properly Licensed Software), 2013.
  3. Christian Collberg and Clark Thomborson. Software watermarking: Models and dynamic embeddings. In Principles of Programming Languages POPL'99, 1999.
  4. Christian Collberg and Clark Thomborson. Watermarking, tamper-proofing, and obfuscation tools for software protection. IEEE Trans. Software Engineering, 28(11)pp. 735-746, 2002 https://doi.org/10.1109/TSE.2002.1027797
  5. Christian Collberg and Clark Thomborson. On the limitsof software watermarking. Technical Report 164, Departmentof Computer Science, University of Auckland, 1998.
  6. Robert L. Davidson and Nathan Myhrvold. Method and system for generating and auditing a signature for a computer program. US Patent 5,664,191, 1996.
  7. Ginger Myles and Christian Collberg, The evaluation of two software watermarking algorithms. Software Practice and Experience, 35(10), pp. 923-938, 2005. https://doi.org/10.1002/spe.657
  8. Gaurav Gupta and Josef Pieprzyk. Software Watermarking Resilient to Debugging Attacks. Journal of Multimedia, 2(2), pp. 10-16, 2007.
  9. Gaurav Gupta and Josef Pieprzyk. Source Code Watermarking Based on Function Dependency Oriented Sequencing. Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008.
  10. J. Hamilton and S. Danicic. An Evaluation of Static Java Bytecode Watermarking. Proceedings of The World Congress on Engineering and Computer Science, 2010.
  11. A. Monden, H. Iida, K. Matsumoto, Katsuro Inoue, and Koji Torii. A practical method for watermarking java programs. In Proceedings of The 24th Computer Software and Applications Conference, 2000.
  12. James Hamilton and Sebastian Danicic, A Survey of Software Watermarking by Code Re-Ordering, 2010.
  13. G. Qu and M. Potkonjak. Analysis of watermarking techniques for graph coloring problem. In IEEE/ACM International Conference on Computer Aided Design, '98, pp. 190-193, 1998.
  14. G. Qu and M. Potkonjak. Hiding signatures in graph coloring solutions. In Information Hiding Workshop '99, pp. 348-367, 1999.
  15. William Zhu and Clark Thomborson. Recognition in software watermarking. In Proceedings of the 4th ACM international workshop on Contents protection and security, pages 29.36, Santa Barbara, California, USA, 2006.