Characterizing Watermark Numbers encoded as Reducible Permutation Graphs against Malicious Attacks

12/28/2018
by   Anna Mpanti, et al.
0

In the domain of software watermarking, we have proposed several graph theoretic watermarking codec systems for encoding watermark numbers w as reducible permutation flow-graphs F[π^*] through the use of self-inverting permutations π^*. Following up on our proposed methods, we theoretically study the oldest one, which we call W-RPG, in order to investigate and prove its resilience to edge-modification attacks on the flow-graphs F[π^*]. In particular, we characterize the integer w≡π^* as strong or weak watermark through the structure of self-inverting permutations π^* which encodes it. To this end, for any integer watermark w ∈ R_n=[2^n-1, 2^n-1], where n is the length of the binary representation b(w) of w, we compute the minimum number of 01-modifications needed to be applied on b(w) so that the resulting b(w') represents the valid watermark number w'; note that a number w' is called valid (or, true-incorrect watermark number) if w' can be produced by the W-RPG codec system and, thus, it incorporates all the structural properties of π^* ≡ w.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/21/2017

Encoding Watermark Numbers as Reducible Permutation Graphs using Self-inverting Permutations

Several graph theoretic watermark methods have been proposed to encode n...
research
04/15/2020

Complete Edge-Colored Permutation Graphs

We introduce the concept of complete edge-colored permutation graphs as ...
research
06/04/2020

An integer program and new lower bounds for computing the strong rainbow connection numbers of graphs

We present an integer programming model to compute the strong rainbow co...
research
04/03/2023

L_∞ norm minimization for nowhere-zero integer eigenvectors of the block graphs of Steiner triple systems and Johnson graphs

We study nowhere-zero integer eigenvectors of the block graphs of Steine...
research
08/03/2020

Using Expander Graphs to test whether samples are i.i.d

The purpose of this note is to point out that the theory of expander gra...
research
06/09/2019

Graph Independence Testing

Identifying statistically significant dependency between variables is a ...
research
06/10/2018

Analysis of Nederlof's algorithm for subset sum

In 2017, J. Nederlof proposed an algorithm [Information Processing Lette...

Please sign up or login with your details

Forgot password? Click here to reset