Abstract
Software watermarking has been proposed as a way to prove ownership of software intellectual property in order to contain software piracy. In this paper, we propose a novel watermarking technique based on Zero Knowledge Proofs. The advantages are multi-fold. The watermark recognizer can now be distributed publicly. This helps in watermark being used as a proof for both authorship and authentication of the software. The watermark is shown as a mathematical proof which varies with every run instead of the watermark string as in the previous techniques. This watermarking scheme not only has a high degree of tamper resistance but also allows the protocol to point out the tampered subset of the embedded secret data. We present potential attacks on the protocol and discuss the strength of the watermarking scheme. We present empirical results based on our implementation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: Watermark detection with zero-knowledge disclosure. Multimedia Systems 9(3), 266–278 (2003)
Adelsbach, A., Sadeghi, A.-R.: Zero-Knowledge Watermark Detection and Proof of Ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)
Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure. In: XI European Signal Processing Conference, vol. I, pp. 446–449.
Gomathisankaran, M., Tyagi, A.: 3D Obfuscation Architecture. (2005) (under submission)
Aucsmith, D.: Tamper Resistant Software: An Implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 317–333. Springer, Heidelberg (1996)
Barni, M., Bartolini, F.: Watermarking systems engineering: enabling digital assets security and other applications. Marcel Dekker, New York (2004)
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)
Bellare, M., Fischlin, M., Goldwasser, S., Micali, S.: Identification Protocols Secure against Reset Attacks. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 495–511. Springer, Heidelberg (2001)
Collberg, C., Thomborson, C.: Software watermarking: Models & dynamic embeddings. In: POPL 1999 (1999)
Collberg, C.S., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. IEEE Transactions on Software Engineering 28(8), 735–746 (2002)
Collberg, C., Myles, G., Huntwork, A.: SandMark - A Tool for Software Protection Research. IEEE Security and Privacy 1(4) (July/August 2003)
Cox, I., Miller, M., Bloom, J.: Digital watermarking. Morgan Kaufmann, San Francisco (2002)
Craver, S.: Zero Knowledge Watermark Detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 101–116. Springer, Heidelberg (2000)
Davidson, R.L., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program (September 1996) US Patent 5, 559,884
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)
Fiat, A., Fiege, U., Shamir, A.: Zero-Knowledge Proofs of Identity. In: STOC 1997 (1987)
Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)
Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof Systems. SIAM Journal of Computing 18(1), 186–208 (1989)
Katzenbeisser, S.: On the Integration of Watermarks and Cryptography. In: Digital Watermarking 2003, pp. 50–60 (2003)
Katzenbeisser, S., Petitcolas, F.A.P. (eds.): Information hiding techniques for steganography and digital watermarking. Artech House (2000)
Palsberg, J., Krishnaswamy, S., Minseok, K., Ma, D., Shao, Q., Zhang, Y.: Experience with software watermarking. In: ACSAC 2000, pp. 308–316 (2000)
Venkatesan, R., Vazirani, V., Sinha, S.: A Graph Theoretic Approach to Software Watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, p. 157. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Venkatachalam, B. (2005). Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_23
Download citation
DOI: https://doi.org/10.1007/11551492_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)