Skip to main content
Log in

LMDGW: a novel matrix based dynamic graph watermark

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Android platform induces an open application development framework to attract more developers and promote larger market occupations. However, the open architecture also makes it easier to reverse engineering, which results in the property loss for both developers and companies, and increases the risks of mobile malicious code. Therefore, copyright protection for android application is of significant importance. A class of copyright protection methods are based on Android watermark. Different from static watermark, the process of embedding and extracting of dynamic graph watermark (DGW) is based on the function path and operation process of the app, which has better concealment. In this paper, we proposed a late-model dynamic watermark based on matrix, called “LMDGW”. This method is proposed to overcome the shortcoming of unintuitive and vulnerable property of traditional numberal DGW. We encode a matrix with low rank into a watermark graph, and embed the graph construction statements into smali code. With the containing of sensitive block characteristics, LMDGW is able to perceive and locate the changes in the specific block. Besides, LWDGW has great performance in tamper-proof attacks. Experiment results and analysis justified that LMDGW has great data rate and robust, and is available in sensitive code locating. LMDGW is proved to be an intelligent watermarking scheme, and is enlightening for intelligent security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Chasaki D, Mansour C (2015) Security challenges in the internet of things. In: Journal International (ed) of. Services and Data Management, Space Based and Situated Computing, Special Issue on Future Internet

  • Chen M, Lin Z, Ma Y, Wu L (2010). The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. Eprint Arxiv, 9

  • Chen Y, Jalali A, Sanghavi S, Caramanis C (2013) Low-rank matrix recovery from errors and erasures. IEEE Trans Inf Theory 59(7):4324–4337

    Article  Google Scholar 

  • Cheng C, Zeng R (2016). An improved watermarking scheme based on ppct coding. Comput Knowl Technol

  • Cheng J, Song Y (2012). Dynamic map based on ppct structure software watermark protection. In: World automation congress, pp 133–136

  • Collberg C, Myles G, Huntwork A (2003) Sandmark-a tool for software protection research. Secur Priv IEEE 1(4):40–49

    Article  Google Scholar 

  • Collberg C, Thomborson C (1999). Software watermarking: models and dynamic embeddings. In: ACM Sigplan-Sigact Symposium on Principles of Programming Languages, pp 311–324

  • Collberg CS, Thomborson C (2000) Watermarking, tamper-proofing, and obfuscation—tools for software protection. Softw Eng IEEE Trans 28(8):735–746

    Article  Google Scholar 

  • Collberg CS, Thomborson C, Townsend GM (2007) Dynamic graph-based software fingerprinting. ACM Trans Program Lang Syst 29(6):35

    Article  Google Scholar 

  • Hamilton J, Danicic S (2011). A survey of static software watermarking. In: Internet security, pp 100–107

  • In: Proc of CIHW (2013) A software watermark database scheme based on ppct. 2004:1–12

  • Khalid SKA, Deris MM, Mohamad KM (2013) Anti-cropping digital image watermarking using sudoku. Int J Grid Util Comput 4(2/3):169–177

    Article  Google Scholar 

  • Kuzuno H, Magata K (2016) Detecting and characterising of mobile advertisement network traffic using graph modelling: Comput Int J Space Based Situat 6(2):90

    Article  Google Scholar 

  • Kuzuno H, Tonami S (2013). Signature generation for sensitive information leakage in android applications. In: IEEE international conference on data engineering workshops, pp 112–119

  • Liu Y, Liu C, Zou H (2016) A new structure tensor based image inpainting algorithm. Int J Grid Util Comput 7(4):294–303

    Article  Google Scholar 

  • Luo YX, Cheng JH, Fang DY (2008). Dynamic graph watermark algorithm based on the threshold scheme. In: International symposium on information science and engineering, pp 689–693

  • Palsberg J, Krishnaswamy S, Kwon M, Ma D, Shao Q, Zhang Y (2000). Experience with software watermarking. In: Computer security applications, 2000. ACSAC ’00. Conference, pp 308–316

  • Ren W, Huang S, Ren Y, Raymond KK (2016a) Lipisc: a lightweight and flexible method for privacy-aware intersection set computation. Plos One 11(6):e0157752

    Article  Google Scholar 

  • Ren W, Liu R, Lei M, Choo KKR (2016b) Segoac: a tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing. Comput Stand Interfaces 54:29–35

    Article  Google Scholar 

  • Steinbauer M, Kotsis GA (2016) Dynamograph: extending the pregel paradigm for large-scale temporal graph processing. Int J Grid Util Comput 7(2):141

    Article  Google Scholar 

  • Wang Y (2012). Improved ppct hybrid coding scheme. Computer Engineering & Applications

  • Xiong L, Xu Z, Shi Y. Q (2017). An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimens Syst Signal Process, pp 1–12

  • Zhang H, Chen D (2012). An improved dynamic graph watermark algorithm. In: Multimedia information networking and security, pp 568–571

  • Zhang Y, Chen K (2014). Appmark: A picture-based watermark for android apps. In: Eighth international conference on software security and reliability, pp 58–67

  • Zhilyakova LY (2015) Dynamic graph models and their properties. Autom Remote Control 76(8):1417–1435

    Article  MathSciNet  MATH  Google Scholar 

  • Zhou W, Zhang X, Jiang X (2013). Appink:watermarking android apps for repackaging deterrence. pages 1–12

  • Zhou Z, Wang Y, Wu QMJ, Yang CN, Sun X (2016) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12(1):48–63

    Article  Google Scholar 

Download references

Acknowledgements

This work is financially supported by Open Funding of Guizhou Provincial Key Laboratory of Public Big Data, No. 2017BDKFJJ006

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Ren.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zeng, L., Ren, W., Chen, Y. et al. LMDGW: a novel matrix based dynamic graph watermark. J Ambient Intell Human Comput 10, 295–304 (2019). https://doi.org/10.1007/s12652-017-0657-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-017-0657-3

Keywords

Navigation