Characterizing Watermark Numbers encoded as Reducible Permutation Graphs against Malicious Attacks (1812.11080v1)
Abstract: In the domain of software watermarking, we have proposed several graph theoretic watermarking codec systems for encoding watermark numbers $w$ as reducible permutation flow-graphs $F[\pi*]$ through the use of self-inverting permutations $\pi*$. Following up on our proposed methods, we theoretically study the oldest one, which we call W-RPG, in order to investigate and prove its resilience to edge-modification attacks on the flow-graphs $F[\pi*]$. In particular, we characterize the integer $w\equiv\pi*$ as strong or weak watermark through the structure of self-inverting permutations $\pi*$ which encodes it. To this end, for any integer watermark $w \in R_n=[2{n-1}, 2n-1]$, where $n$ is the length of the binary representation $b(w)$ of $w$, we compute the minimum number of 01-modifications needed to be applied on $b(w)$ so that the resulting $b(w')$ represents the valid watermark number $w'$; note that a number $w'$ is called valid (or, true-incorrect watermark number) if $w'$ can be produced by the W-RPG codec system and, thus, it incorporates all the structural properties of $\pi* \equiv w$.