A Software Watermarking Algorithm Based on the Full Array of Expression Coefficients

  • Cheng ChengEmail author
  • Niande Jiang
  • Huiyuan Li
  • Rong Zeng
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 634)


In order to solve the problem of low message hidden rate and against attacks, this paper proposed an algorithm based on a full array of expressions coefficient. Algorithm through coefficient expressions of permutations and binary number and sequence number of one-to-one correspondence to construct a mapping dictionary. Then the mapping dictionary is used to embedding and extracting watermark. At last, the program which embedded watermark is encrypted by AES module. This algorithm is used to concrete some real examples on the SandMark platform, and then it is compared with the Monden algorithm, Mohammad algorithm and inverse number algorithm in performance. Theoretical analysis and experimental results proves that the algorithm is significantly improved anti attack and data rate.


Software watermarking Expression coefficient Mapping dictionary Ordinal arrangement 


  1. 1.
    Zhang, L., Yang, Y., Niu, X.: Overview of software watermarking. Softw. J. 14(2), 268–277 (2003)zbMATHGoogle Scholar
  2. 2.
    Akito, M., Hajimu, I., Ken-ichi M., et al.: A practical method for watermarking Java programs. In: Proceedings of the 24th Computer Software and Applications Conference (2000)Google Scholar
  3. 3.
    Patel, S.J., Pattewar, T.M.: Software birthmark based theft detection of Java Script programs using agglomerative clustering and frequent subgraph mining. In: 2014 International Conference on Embedded Systems (ICES) (2014)Google Scholar
  4. 4.
    Hua, J., Sha, Z., Xuan, A.: Software watermarking algorithm based on inverse number of expression. Comput. Appl. 09(06), 3189–3190 (2009)Google Scholar
  5. 5.
    Zhou, L.: Evaluation of Software Watermarking Algorithm. Jilin Universiy, Ji Lin (2010)Google Scholar
  6. 6.
    Cui, X.: Software Encryption and Decryption, pp. 378–488. People’s Posts and Telecommunications Press, Beijing (2012)Google Scholar
  7. 7.
    Chan, P.P.F., Hui, L.C.K., Yiu, S.M.: Heap graph based software theft detection. In: IEEE Transactions on Information Forensics and Security (2013)Google Scholar
  8. 8.
    Tang, Z.Y., Fang, D.Y., Shu, L.: A tamper resistant software watermarking scheme based on code encryption. J. Univ. Sci. Technol. China 41(7), 599–606 (2011)Google Scholar
  9. 9.
    Ying, G., Lu, L., Wang, L.: The research and practice of computer graphics teaching reform based on algorithm demonstration and algorithm training. J. East China Inst. Technol. (Soc. Sci.) 32(1), 78–80 (2013)Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2016

Authors and Affiliations

  • Cheng Cheng
    • 1
    Email author
  • Niande Jiang
    • 1
  • Huiyuan Li
    • 1
  • Rong Zeng
    • 1
  1. 1.Department of Information EngineeringEast China University of TechnologyNanchangChina

Personalised recommendations