Skip to main content

Fingerprints for Copyright Software Protection

  • Conference paper
  • First Online:
Information Security (ISW 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1729))

Included in the following conference series:

Abstract

The work studies the problem of copyright protection of software using cryptographic fingerprinting. The identity of software must be unique for each copy. There are two classes of identities: one is based on equivalent variants of the program and the other applies behaviour of the software as its identity. For these two types of identity, we introduce two different fingerprint schemes. The two schemes use digital signatures and can be easily combined and extended to be resilient against partial fingerprint destruction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Aucsmith. Tamper resistant software. In R. Anderson, editor, Information Hinding, First International Workshop, Cambridge, 1996, pages 317–334. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1174.

    Google Scholar 

  2. D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In D. Coppersmith, editor, Advances in Cryptology-CRYPTO’95, pages 452–465. Springer-Verlag, 1995. Lecture Notes in Computer Science No. 963.

    Google Scholar 

  3. C. Collberg and C. Thomborson. On the limits of software watermarking. Technical Report 164, Department of Computer Science, the University of Auckland, Auckland, New Zealand, 1998.

    Google Scholar 

  4. I. Cox, J. Kilian, T. Leighton, and T. Shamoon. A secure, robust watermark for multimedia. In R. Anderson, editor, Information Hinding, First International Workshop, Cambridge, 1996, pages 183–206. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1174.

    Google Scholar 

  5. M. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, 1979.

    Google Scholar 

  6. A. Herzberg and S. Pinter. Public protection of software. ACM Transactions on Computer Systems, 5(4):371–393, 1987.

    Article  Google Scholar 

  7. J. Smith and B. Comiskey. Modulation and information hiding in images. In R. Anderson, editor, Information Hinding, First International Workshop, Cambridge, 1996, pages 207–226. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1174.

    Google Scholar 

  8. D.R. Stinson. Cryptography: Theory and Practice. CRC Press, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pieprzyk, J. (1999). Fingerprints for Copyright Software Protection. In: Information Security. ISW 1999. Lecture Notes in Computer Science, vol 1729. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47790-X_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-47790-X_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66695-0

  • Online ISBN: 978-3-540-47790-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics