Characterizing Watermark Numbers encoded as Reducible Permutation Graphs
against Malicious Attacks
- WaLM
In the domain of software watermarking, we have proposed several graph theoretic watermarking codec systems for encoding watermark numbers as reducible permutation flow-graphs through the use of self-inverting permutations . Following up on our proposed methods, we theoretically study the oldest one, which we call W-RPG, in order to investigate and prove its resilience to edge-modification attacks on the flow-graphs . In particular, we characterize the integer as strong or weak watermark through the structure of self-inverting permutations which encodes it. To this end, for any integer watermark , where is the length of the binary representation of , we compute the minimum number of 01-modifications needed to be applied on so that the resulting represents the valid watermark number ; note that a number is called valid (or, true-incorrect watermark number) if can be produced by the W-RPG codec system and, thus, it incorporates all the structural properties of .
View on arXiv