Sciweavers

159 search results - page 2 / 32
» Informed Recognition in Software Watermarking
Sort
View
IH
2001
Springer
13 years 9 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
IH
2005
Springer
13 years 10 months ago
Dither Modulation Watermarking of Dynamic Memory Traces
We describe a dynamic software watermark embedded in the memory trace of an executing Java program. Our approach is a generalisation of the spread–transform watermarking techniqu...
Alan J. Larkin, Félix Balado, Neil J. Hurle...
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
13 years 11 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
DRMTICS
2005
Springer
13 years 10 months ago
Algorithms to Watermark Software Through Register Allocation
Software security is a significant issue in the Internet age. In order to prevent software from piracy and unauthorized modification, many techniques have been developed. Softwar...
William Zhu, Clark D. Thomborson
DRM
2005
Springer
13 years 10 months ago
Statistical audio watermarking algorithm based on perceptual analysis
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the pe...
Xiaomei Quan, Hongbin Zhang