Software Watermarking

  • Mohammad Ali Nematollahi
  • Chalee Vorakulpipat
  • Hamurabi Gamboa Rosales
Part of the Springer Topics in Signal Processing book series (STSP, volume 11)


Generally, software watermarking is considered as a branch of digital watermarking technique which has not been attracted enough attention by researcher.


Mobile Agent Software Code Watermark Technique Watermark Extraction Collusive Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Cox, I.J., et al. 1996. A secure, robust watermark for multimedia. In Information hiding. Springer.Google Scholar
  2. 2.
    Tamada, H., et al. 2004. Design and evaluation of birthmarks for detecting theft of java programs. In IASTED conference on software engineering.Google Scholar
  3. 3.
    Samson, P.R. 1994. Apparatus and method for serializing and validating copies of computer software. Google Patents.Google Scholar
  4. 4.
    Moskowitz, S.A. and M. Cooperman. 1998. Method for stega-cipher protection of computer code. Google Patents.Google Scholar
  5. 5.
    Grover, D. 1992. Protection of computer software: Its technology and application. Cambridge University Press.Google Scholar
  6. 6.
    Davidson, R.I. and N. Myhrvold. 1996. Method and system for generating and auditing a signature for a computer program. Google Patents.Google Scholar
  7. 7.
    Bhat, V., I. Sengupta, and A. Das. 2010. An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digital Signal Processing 20(6): 1547–1558.CrossRefGoogle Scholar
  8. 8.
    Palsberg, J., et al. 2000. Experience with software watermarking. In 16th Annual conference on computer security applications, 2000, ACSAC’00. IEEE.Google Scholar
  9. 9.
    El-Khalil, R. and A. Keromytis. 2004. Hydan: Embedding secrets in program binaries.Google Scholar
  10. 10.
    Collberg, C., et al. 2004. Uwstego: A general architecture for software watermarking.Google Scholar
  11. 11.
    Collberg, C., G. Myles, and A. Huntwork. 2003. Sandmark–A tool for software protection research. IEEE Security and Privacy 4: 40–49.CrossRefGoogle Scholar
  12. 12.
    Ahmed, M.A., et al. 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. Journal of Applied Science 10(1): 59–64.CrossRefGoogle Scholar
  13. 13.
    Wong, J.L., G. Qu, and M. Potkonjak. 2004. Optimization-intensive watermarking techniques for decision problems. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on 23(1): 119–127.CrossRefGoogle Scholar
  14. 14.
    Qu, G. and M. Potkonjak. 2000. Hiding signatures in graph coloring solutions. In Information hiding. Springer.Google Scholar
  15. 15.
    Myles, G. and C. Collberg. 2004. Software watermarking through register allocation: Implementation, analysis, and attacks. In Information security and cryptology-ICISC 2003, 274–293. Springer.Google Scholar
  16. 16.
    Zhu, W. and C. Thomborson. 2006. Algorithms to watermark software through register allocation. In Digital rights management. Technologies, issues, challenges and systems, 180–191. Springer.Google Scholar
  17. 17.
    Stern, J.P., et al. 2000. Robust object watermarking: Application to code. In Information hiding. Springer.Google Scholar
  18. 18.
    Curran, D., et al. 2004. Dependency in software watermarking. In Proceedings of international conference on information and communication technologies: from theory to applications, 2004. IEEE.Google Scholar
  19. 19.
    Monden, A., et al. 2000. A practical method for watermarking java programs. In COMPSAC 2000. The 24th annual international on computer software and applications conference, 2000. IEEE.Google Scholar
  20. 20.
    Al-Haj, A. 2014. An imperceptible and robust audio watermarking algorithm. EURASIP Journal on Audio, Speech, and Music Processing 2014(1): 1–12.CrossRefGoogle Scholar
  21. 21.
    Kang, G.S., T.M. Moran, and D.A. Heide. 2005. Hiding information under speech. DTIC Document.Google Scholar
  22. 22.
    Cheung, W. 2000. Digital image watermarking in spatial and transform domains. In Proceedings of TENCON 2000. IEEE.Google Scholar
  23. 23.
    Kim, H.J., and Y.H. Choi. 2003. A novel echo-hiding scheme with backward and forward kernels. IEEE Transactions on Circuits and Systems for Video Technology 13(8): 885–889.CrossRefGoogle Scholar
  24. 24.
    Guerchi, D., et al. 2008. Speech secrecy: An FFT-based approach. International Journal of Mathematics and Computer Science 3(2): 1–19.MathSciNetzbMATHGoogle Scholar
  25. 25.
    Ma, B., et al. 2014. Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimedia tools and applications 72(1): 637–666.CrossRefGoogle Scholar
  26. 26.
    Cvejic, N. and T. Seppanen. 2004. Reduced distortion bit-modification for LSB audio steganography. In 2004 7th International conference on signal processing, 2004. Proceedings of ICSP’04. IEEE.Google Scholar
  27. 27.
    Matsuoka, H. 2006. Spread spectrum audio steganography using sub-band phase shifting. In International conference on intelligent information hiding and multimedia signal processing, 2006. IIH-MSP’06. IEEE.Google Scholar
  28. 28.
    Zong, T., et al. 2014. Robust histogram shape based method for image watermarking. Google Scholar
  29. 29.
    Zhu, W.F. 2007. Concepts and techniques in software watermarking and obfuscation. Auckland: ResearchSpace.Google Scholar
  30. 30.
    Georg T. Becker, D.S., Christof Paar and Wayne Burleson. 2012. Detecting software theft in embedded systems: A side-channel approach. IEEE Transactions on Information Forensics and Security 7(4): 1144–1154.Google Scholar
  31. 31.
    Lim, H.-I. 2015. A performance comparison on characteristics of static and dynamic software watermarking methods. Indian Journal of Science and Technology 8(21).Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2017

Authors and Affiliations

  • Mohammad Ali Nematollahi
    • 1
  • Chalee Vorakulpipat
    • 1
  • Hamurabi Gamboa Rosales
    • 2
  1. 1.National Electronics and Computer Technology Center (NECTEC)PathumthaniThailand
  2. 2.Universidad Autónoma de ZacatecasZacatecasMexico

Personalised recommendations