32

Characterizing Watermark Numbers encoded as Reducible Permutation Graphs against Malicious Attacks

Abstract

In the domain of software watermarking, we have proposed several graph theoretic watermarking codec systems for encoding watermark numbers ww as reducible permutation flow-graphs F[π]F[\pi^*] through the use of self-inverting permutations π\pi^*. Following up on our proposed methods, we theoretically study the oldest one, which we call W-RPG, in order to investigate and prove its resilience to edge-modification attacks on the flow-graphs F[π]F[\pi^*]. In particular, we characterize the integer wπw\equiv\pi^* as strong or weak watermark through the structure of self-inverting permutations π\pi^* which encodes it. To this end, for any integer watermark wRn=[2n1,2n1]w \in R_n=[2^{n-1}, 2^n-1], where nn is the length of the binary representation b(w)b(w) of ww, we compute the minimum number of 01-modifications needed to be applied on b(w)b(w) so that the resulting b(w)b(w') represents the valid watermark number ww'; note that a number ww' is called valid (or, true-incorrect watermark number) if ww' can be produced by the W-RPG codec system and, thus, it incorporates all the structural properties of πw\pi^* \equiv w.

View on arXiv
Comments on this paper