Skip to main content

Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking

  • Conference paper
  • 1942 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3710))

Abstract

Software watermarking has been proposed as a way to prove ownership of software intellectual property in order to contain software piracy. In this paper, we propose a novel watermarking technique based on Zero Knowledge Proofs. The advantages are multi-fold. The watermark recognizer can now be distributed publicly. This helps in watermark being used as a proof for both authorship and authentication of the software. The watermark is shown as a mathematical proof which varies with every run instead of the watermark string as in the previous techniques. This watermarking scheme not only has a high degree of tamper resistance but also allows the protocol to point out the tampered subset of the embedded secret data. We present potential attacks on the protocol and discuss the strength of the watermarking scheme. We present empirical results based on our implementation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: Watermark detection with zero-knowledge disclosure. Multimedia Systems 9(3), 266–278 (2003)

    Article  Google Scholar 

  2. Adelsbach, A., Sadeghi, A.-R.: Zero-Knowledge Watermark Detection and Proof of Ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure. In: XI European Signal Processing Conference, vol. I, pp. 446–449.

    Google Scholar 

  4. Gomathisankaran, M., Tyagi, A.: 3D Obfuscation Architecture. (2005) (under submission)

    Google Scholar 

  5. Aucsmith, D.: Tamper Resistant Software: An Implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 317–333. Springer, Heidelberg (1996)

    Google Scholar 

  6. Barni, M., Bartolini, F.: Watermarking systems engineering: enabling digital assets security and other applications. Marcel Dekker, New York (2004)

    Google Scholar 

  7. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Bellare, M., Fischlin, M., Goldwasser, S., Micali, S.: Identification Protocols Secure against Reset Attacks. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 495–511. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Collberg, C., Thomborson, C.: Software watermarking: Models & dynamic embeddings. In: POPL 1999 (1999)

    Google Scholar 

  10. Collberg, C.S., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. IEEE Transactions on Software Engineering 28(8), 735–746 (2002)

    Article  Google Scholar 

  11. Collberg, C., Myles, G., Huntwork, A.: SandMark - A Tool for Software Protection Research. IEEE Security and Privacy 1(4) (July/August 2003)

    Google Scholar 

  12. Cox, I., Miller, M., Bloom, J.: Digital watermarking. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  13. Craver, S.: Zero Knowledge Watermark Detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 101–116. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  14. Davidson, R.L., Myhrvold, N.: Method and system for generating and auditing a signature for a computer program (September 1996) US Patent 5, 559,884

    Google Scholar 

  15. Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)

    Google Scholar 

  16. Fiat, A., Fiege, U., Shamir, A.: Zero-Knowledge Proofs of Identity. In: STOC 1997 (1987)

    Google Scholar 

  17. Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)

    Book  MATH  Google Scholar 

  18. Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof Systems. SIAM Journal of Computing 18(1), 186–208 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  19. Katzenbeisser, S.: On the Integration of Watermarks and Cryptography. In: Digital Watermarking 2003, pp. 50–60 (2003)

    Google Scholar 

  20. Katzenbeisser, S., Petitcolas, F.A.P. (eds.): Information hiding techniques for steganography and digital watermarking. Artech House (2000)

    Google Scholar 

  21. Palsberg, J., Krishnaswamy, S., Minseok, K., Ma, D., Shao, Q., Zhang, Y.: Experience with software watermarking. In: ACSAC 2000, pp. 308–316 (2000)

    Google Scholar 

  22. Venkatesan, R., Vazirani, V., Sinha, S.: A Graph Theoretic Approach to Software Watermarking. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, p. 157. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Venkatachalam, B. (2005). Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_23

Download citation

  • DOI: https://doi.org/10.1007/11551492_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28768-1

  • Online ISBN: 978-3-540-32052-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics