吉林大学学报(工学版) ›› 2024, Vol. 54 ›› Issue (10): 3000-3008.doi: 10.13229/j.cnki.jdxbgxb.20230890

• 计算机科学与技术 • 上一篇    

混沌加载PE文件水印数据率改进方法

罗养霞(),吴燕玲   

  1. 西安财经大学 信息学院,西安 710100
  • 收稿日期:2023-08-22 出版日期:2024-10-01 发布日期:2024-11-22
  • 作者简介:罗养霞(1974-),女,教授,博士. 研究方向:软件安全,数据科学与智能计算. E-mail: yxluo8836@163.com
  • 基金资助:
    陕西省科技厅自然科学基础项目(2021JQ-765);陕西省社会科学基金项目(2022M005);西安财经大学2022年研究生重点研究项目(22YCZ11);陕西省重点研发计划项目(2024GX-YBXM-545)

Chaos theory to PE and improving method of watermark data rate

Yang-xia LUO(),Yan-ling WU   

  1. School of Information,Xi'an University of Finance and Economics,Xi'an 710100,China
  • Received:2023-08-22 Online:2024-10-01 Published:2024-11-22

摘要:

针对PE文件存在水印鲁棒性差和数据率低的不足,本文基于混沌扰动对子水印信息加密,提高了水印的鲁棒性;基于混沌散列把水印信息分散编码到整个代码段中,提高了水印的隐蔽性;应用MPPCT_DF动态图结构,增加图节点编码量,同时每个节点增加一个静态数据域,扩大了信息存储量。基于此,提出一种混沌加载PE文件的动态图水印(CBDW_PE)技术方案,并给出主要组成模块、关键算法,展示系统实现及概念数据模型,最后对算法进行对比和分析。经比较,该技术对剪切、篡改和逆向攻击等具有较好的效果,提高了水印的安全性与隐蔽性,有效改善了PE文件数据率低的问题,便于有意义水印的加载。

关键词: 软件水印, 混沌加密, 混沌置乱, 数据嵌入率

Abstract:

In view of the deficiencies of poor watermark robustness and low data rate in PE files, this paper encrypts the sub-watermark information based on chaotic perturbation, which improves the robustness of the watermark; disperses and encodes the watermark information into the whole code segment based on chaotic hashing, which improves the hiddenness of the watermark; and applies the dynamic graph structure of MPPCT_DF, which increases the amount of the node encoding of the graph, and at the same time, increases a static data field in each node, which enlarges the information storage capacity. Based on this, a chaotic loading PE file dynamic graph watermarking (CBDW_PE) technology scheme is proposed, and gives the main component modules, key algorithms, shows the system implementation and conceptual data model, and finally compares and analyzes the algorithms. After comparison, the technology has better effect on shearing, tampering and reverse attack, improves the security and concealment of watermark, effectively improves the problem of low data rate of PE files, and facilitates the loading of meaningful watermark.

Key words: software watermarking, chaos encryption, chaos disruption, data embedding rate

中图分类号: 

  • TP309

表1

与本文相关的混沌应用与数据率改进算法对比"

年份/[文献]作者主要技术加载对象提取方式需再编译
2007[16芦斌等混沌+Easter Egg水印PE文件全部
2008[18]陈刚表生成树+多个PE文件PE文件全部
2009[17Ke-xin等Shamir阈值+混沌加密源码部分
2012[19罗养霞等混沌加密+CT+PPCT图源码全部
2019[6]苏庆等Petri 动态图源码全部
2022[12]王巍等PPCT+数据域类文件全部
本文罗养霞等混沌加密\\置乱+MPPCT_DFPE文件部分

图1

CBDW_PE模块组成及关系示意"

图2

CBWD_PE嵌入过程"

图3

水印嵌入前后代码段情况对比"

图4

密钥发生器结构图"

图5

m序列扰动混沌示意图"

图6

密钥流生成过程"

图7

PPCT、MPPCT与MPPCT-DF对比"

图8

CBDW_PE系统实现CDM图"

表2

三种结构数据嵌入率对比"

所使用的叶结点数PPCT数据率MPPCT数据率MPPCT DF数据率
x[log2(2×Cx-2x/2-1)]/2xy=[xlog2x/2+1)]/4xy+10.6×log2x/2)
20.250 00.250 010.850 0
500.458 71.175 150.400 0
1000.476 81.418 261.243 0

表3

水印嵌入前后程序运行时间变化情况(执行20次取均值)"

测试程序

初始运行

时间/ms

代码转移

数目/个

水印嵌入后运行时间/ms增长率/%
n=4n=10n=4n=10
Notepad++15316.917.612.717.3
517.218.114.720.7
Vodplayer20322.122.310.511.5
522.823.214.016.0
Uedit_32321040.541.526.629.7
1541.742.430.332.5

表4

各水印算法性能对比"

水印算法主要技术剪切攻击篡改攻击逆向攻击生成最大节点数嵌入数据率
文献[12PPCT+数据域+++1.086 1E+2040.476 8
文献[16混沌+Easter Egg水印+++++1E+1983.288 7
文献[18表生成树+多个PE文件+++
文献[19混沌加密+CT+PPCT++++++2.275 1E+560.476 8
本文混沌加密+混沌置乱+MPPCT_DF+++++++++7.679 1E+22961.243 0
1 Business Software Alliance(BSA). Software management: security imperative, business opportunity[R]. BSA Global Software Survey: Software Management: Security Imperative, Business Opportunity, Washington,USA, 2018.
2 产业调研网. 2023—2029年中国软件行业研究与趋势预测报告[EB/OL]. [2023-08-20]..
3 Kadian P, Arora S M, Arora N. Robust digital watermarking techniques for copyright protection of digital data: a survey[J]. Wireless Personal Communications, 2021, 118: 3225-3249.
4 Collberg C, Nagra J. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection[M]. London:Pearson Education, 2009.
5 Ayan D, Skiti B, Nabenku C.Software watermarking: progress and challenges[J]. INAE Letters, 2019, 4(1): 65-75.
6 苏庆, 林昊, 黄剑锋, 等. 基于Petri网编码的动态图水印技术研究[J]. 计算机科学, 2019, 46(7): 120-125.
Su Qing, Lin Hao, Huang Jian-feng, et al. Study on dynamic-graph watermarking based on petri net coding[J]. Computer Science, 2019, 46(7): 120-125.
7 Dey A, Ghosh S, Bhattacharya S, et al. A robust software watermarking framework using shellcode[J]. Multimedia Tools and Applications, 2020, 79: 2555-2576.
8 Chen Z, Li D. A software watermarking algorithm based on instruction encoding and resource section format[C]∥Proceedings of Advances in 3D Image and Graphics Representation, Analysis, Computing and Information Technology: Methods and Algorithms, Singapore, 2020: 359-367.
9 张颖君, 陈恺, 鲍旭华. 一种基于程序执行时间量化分析的软件水印方法[J]. 电子与信息学报, 2020, 42(8): 1811-1819.
Zhang Ying-jun, Chen Kai, Bao Xu-hua. A software watermarking method based on program execution time[J]. Journal of Electronics & Information Technology, 2020, 42(8): 1811-1819.
10 Aiswarya K K, Praveen K, Amritha P P, et al. Application of secret sharing scheme in software watermarking[C]∥Information and Communication Technology for Intelligent Systems, Singapore, 2021: 345-353.
11 Goyal R, Kim S, Waters B, et al. Beyond software watermarking: traitor-tracing for pseudorandom functions[C]∥Proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 2021: 250-280.
12 王巍, 何颖, 谭永坤, 等. 一种增强型动态图的软件水印算法[J]. 吉林大学学报:理学版, 2022, 60(5): 1161-1166.
Wang Wei, He Ying, Tan Yong-kun, et al. A software watermarking algorithm for enhanced dynamic graph[J]. Journal of Jilin University(Science Edition), 2022, 60(5): 1161-1166.
13 李凌俐, 王春东, 张清华. 一种基于自修改的动态耦合水印方法[J]. 天津理工大学学报, 2023, 39(1): 29-34.
Li Ling-li, Wang Chun-dong, Zhang Qing-hua. Dynamic coupled watermark method based on self-modifying code[J]. Journal of Tianjin University of Technology, 2023, 39(1): 29-34.
14 Dridi F, El A S, El H Y W, et al. Design, hardware implementation on FPGA and performance analysis of three chaos-based stream ciphers[J]. Fractal and Fractional, 2023, 7(2): 197-203.
15 Chen B, Yu S, Li D D U, et al. Cryptanalysis of some self-synchronous chaotic stream ciphers and their improved schemes[J]. International Journal of Bifurcation and Chaos, 2021, 31(8): 215-242.
16 芦斌, 罗向阳, 刘粉林. 一种基于混沌的软件水印算法框架及实现[J]. 软件学报, 2007(2): 351-360.
Lu Bin, Luo Xiang-yang, Liu Fen-lin. A chaos-based framework and implementation for software watermarking algorithm[J]. Journal of Software, 2007(2): 351-360.
17 Ke-xin Y, Ke Y, Jian-qi Z. A robust dynamic software watermarking[C]∥International Conference on Information Technology and Computer Science. Kiev,Ukraine,2009: 15-18.
18 陈刚. 基于PE文件的软件水印研究[D]. 长沙: 湖南大学计算机与通信学院, 2008.
Chen Gang. Research on software watermark based on PE file[D]. Changsha: School of Computer and Communication, Hunan University, 2008.
19 罗养霞, 房鼎益. 基于混沌优化的动态水印算法研究[J].中国科学技术大学学报, 2012, 42(1): 77-84.
Luo Yang-xia, Fang Ding-yi. Dynamic watermarking algorithm based on chaptic optimization[J]. Journal of University of Science and Technology of China, 2012, 42(1): 77-84.
20 Barbora H, Sascha W. Confidential quantum computing[C]∥Proceedings of the 18th International Conference on Availability, Reliability and Security, New York,USA, 2023, 46: 1-10.
[1] 汪波, 冯久超 . 基于H.264标准的视频混沌密写算法[J]. 吉林大学学报(工学版), 2008, 38(04): 960-965.
[2] 张雪松,李昕,崔维力,赫枫龄,左万利 . 动态自我验证的软件水印防篡改技术[J]. 吉林大学学报(工学版), 2007, 37(05): 1148-1153.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!