Publication Type : Conference Paper
Publisher : Springer
Source : Information and Communication Technology for Intelligent Systems
Url : https://link.springer.com/chapter/10.1007/978-981-15-7078-0_32
Campus : Coimbatore
Center : TIFAC CORE in Cyber Security
Department : TIFAC-CORE in Cyber Security
Year : 2020
Abstract : The software watermarking technique is used to eradicate software piracy that is increasing widely in this digital world. The programmer can prove his ownership by recovering the watermark from the source code. In this paper, we modify the Xmark watermarking method using Shamir’s secret sharing scheme along with the collatz function to embed the watermark in source code. The watermark value is split by applying Shamir’s secret sharing and is given as input to run the collatz conjecture. The advantage of using Shamir’s secret sharing scheme is that it is flexible for any number of embedding points. We use the sbt-instrumentation tool for instrumenting the source code. We insert the config file in the sbt-instrumentation tool that contains the rules required to instrument the LLVM IR of the source code to extract the watermark and verify our ownership of the software. We have also done the time analysis to find the time taken when the watermark is embedded in the source code.
Cite this Research Publication : Aiswarya K.K., Praveen, K., Amritha P.P., Sethumadhavan M., Application of Secret Sharing Scheme in Software Watermarking, ICTIS 2020. Smart Innovation, Systems and Technologies, Springer.