Back close

Application of Secret Sharing Scheme in Software Watermarking

Publication Type : Conference Paper

Publisher : Springer

Source : Information and Communication Technology for Intelligent Systems

Url : https://link.springer.com/chapter/10.1007/978-981-15-7078-0_32

Campus : Coimbatore

Center : TIFAC CORE in Cyber Security

Department : TIFAC-CORE in Cyber Security

Year : 2020

Abstract : The software watermarking technique is used to eradicate software piracy that is increasing widely in this digital world. The programmer can prove his ownership by recovering the watermark from the source code. In this paper, we modify the Xmark watermarking method using Shamir’s secret sharing scheme along with the collatz function to embed the watermark in source code. The watermark value is split by applying Shamir’s secret sharing and is given as input to run the collatz conjecture. The advantage of using Shamir’s secret sharing scheme is that it is flexible for any number of embedding points. We use the sbt-instrumentation tool for instrumenting the source code. We insert the config file in the sbt-instrumentation tool that contains the rules required to instrument the LLVM IR of the source code to extract the watermark and verify our ownership of the software. We have also done the time analysis to find the time taken when the watermark is embedded in the source code.

Cite this Research Publication : Aiswarya K.K., Praveen, K., Amritha P.P., Sethumadhavan M., Application of Secret Sharing Scheme in Software Watermarking, ICTIS 2020. Smart Innovation, Systems and Technologies, Springer.

Admissions Apply Now