Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
133 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Characterizing Watermark Numbers encoded as Reducible Permutation Graphs against Malicious Attacks (1812.11080v1)

Published 28 Dec 2018 in cs.DM and cs.CR

Abstract: In the domain of software watermarking, we have proposed several graph theoretic watermarking codec systems for encoding watermark numbers $w$ as reducible permutation flow-graphs $F[\pi*]$ through the use of self-inverting permutations $\pi*$. Following up on our proposed methods, we theoretically study the oldest one, which we call W-RPG, in order to investigate and prove its resilience to edge-modification attacks on the flow-graphs $F[\pi*]$. In particular, we characterize the integer $w\equiv\pi*$ as strong or weak watermark through the structure of self-inverting permutations $\pi*$ which encodes it. To this end, for any integer watermark $w \in R_n=[2{n-1}, 2n-1]$, where $n$ is the length of the binary representation $b(w)$ of $w$, we compute the minimum number of 01-modifications needed to be applied on $b(w)$ so that the resulting $b(w')$ represents the valid watermark number $w'$; note that a number $w'$ is called valid (or, true-incorrect watermark number) if $w'$ can be produced by the W-RPG codec system and, thus, it incorporates all the structural properties of $\pi* \equiv w$.

Summary

We haven't generated a summary for this paper yet.