Journal of Jilin University(Engineering and Technology Edition) ›› 2024, Vol. 54 ›› Issue (10): 3000-3008.doi: 10.13229/j.cnki.jdxbgxb.20230890

Previous Articles    

Chaos theory to PE and improving method of watermark data rate

Yang-xia LUO(),Yan-ling WU   

  1. School of Information,Xi'an University of Finance and Economics,Xi'an 710100,China
  • Received:2023-08-22 Online:2024-10-01 Published:2024-11-22

Abstract:

In view of the deficiencies of poor watermark robustness and low data rate in PE files, this paper encrypts the sub-watermark information based on chaotic perturbation, which improves the robustness of the watermark; disperses and encodes the watermark information into the whole code segment based on chaotic hashing, which improves the hiddenness of the watermark; and applies the dynamic graph structure of MPPCT_DF, which increases the amount of the node encoding of the graph, and at the same time, increases a static data field in each node, which enlarges the information storage capacity. Based on this, a chaotic loading PE file dynamic graph watermarking (CBDW_PE) technology scheme is proposed, and gives the main component modules, key algorithms, shows the system implementation and conceptual data model, and finally compares and analyzes the algorithms. After comparison, the technology has better effect on shearing, tampering and reverse attack, improves the security and concealment of watermark, effectively improves the problem of low data rate of PE files, and facilitates the loading of meaningful watermark.

Key words: software watermarking, chaos encryption, chaos disruption, data embedding rate

CLC Number: 

  • TP309

Table1

Comparison of research related to this article"

年份/[文献]作者主要技术加载对象提取方式需再编译
2007[16芦斌等混沌+Easter Egg水印PE文件全部
2008[18]陈刚表生成树+多个PE文件PE文件全部
2009[17Ke-xin等Shamir阈值+混沌加密源码部分
2012[19罗养霞等混沌加密+CT+PPCT图源码全部
2019[6]苏庆等Petri 动态图源码全部
2022[12]王巍等PPCT+数据域类文件全部
本文罗养霞等混沌加密\\置乱+MPPCT_DFPE文件部分

Fig.1

CBDW_PE module composition and relationship schematic"

Fig.2

CBWD_PE embedding process"

Fig.3

Comparison of code segment before and after watermark embedding"

Fig.4

Key generator structure diagram"

Fig.5

Schematic diagram of m-sequence perturbation chaos"

Fig.6

Keystream generation process diagram"

Fig.7

Comparison of PPCT, MPPCT, and MPPCT-DF"

Fig.8

CBDW_PE system implementation CDM diagram"

Table 2

Comparison of data embedding rates among three structures"

所使用的叶结点数PPCT数据率MPPCT数据率MPPCT DF数据率
x[log2(2×Cx-2x/2-1)]/2xy=[xlog2x/2+1)]/4xy+10.6×log2x/2)
20.250 00.250 010.850 0
500.458 71.175 150.400 0
1000.476 81.418 261.243 0

Table 3

Watermark embedding before and after the program running time change"

测试程序

初始运行

时间/ms

代码转移

数目/个

水印嵌入后运行时间/ms增长率/%
n=4n=10n=4n=10
Notepad++15316.917.612.717.3
517.218.114.720.7
Vodplayer20322.122.310.511.5
522.823.214.016.0
Uedit_32321040.541.526.629.7
1541.742.430.332.5

Table 4

Performance comparison of watermarking algorithms"

水印算法主要技术剪切攻击篡改攻击逆向攻击生成最大节点数嵌入数据率
文献[12PPCT+数据域+++1.086 1E+2040.476 8
文献[16混沌+Easter Egg水印+++++1E+1983.288 7
文献[18表生成树+多个PE文件+++
文献[19混沌加密+CT+PPCT++++++2.275 1E+560.476 8
本文混沌加密+混沌置乱+MPPCT_DF+++++++++7.679 1E+22961.243 0
1 Business Software Alliance(BSA). Software management: security imperative, business opportunity[R]. BSA Global Software Survey: Software Management: Security Imperative, Business Opportunity, Washington,USA, 2018.
2 产业调研网. 2023—2029年中国软件行业研究与趋势预测报告[EB/OL]. [2023-08-20]..
3 Kadian P, Arora S M, Arora N. Robust digital watermarking techniques for copyright protection of digital data: a survey[J]. Wireless Personal Communications, 2021, 118: 3225-3249.
4 Collberg C, Nagra J. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection[M]. London:Pearson Education, 2009.
5 Ayan D, Skiti B, Nabenku C.Software watermarking: progress and challenges[J]. INAE Letters, 2019, 4(1): 65-75.
6 苏庆, 林昊, 黄剑锋, 等. 基于Petri网编码的动态图水印技术研究[J]. 计算机科学, 2019, 46(7): 120-125.
Su Qing, Lin Hao, Huang Jian-feng, et al. Study on dynamic-graph watermarking based on petri net coding[J]. Computer Science, 2019, 46(7): 120-125.
7 Dey A, Ghosh S, Bhattacharya S, et al. A robust software watermarking framework using shellcode[J]. Multimedia Tools and Applications, 2020, 79: 2555-2576.
8 Chen Z, Li D. A software watermarking algorithm based on instruction encoding and resource section format[C]∥Proceedings of Advances in 3D Image and Graphics Representation, Analysis, Computing and Information Technology: Methods and Algorithms, Singapore, 2020: 359-367.
9 张颖君, 陈恺, 鲍旭华. 一种基于程序执行时间量化分析的软件水印方法[J]. 电子与信息学报, 2020, 42(8): 1811-1819.
Zhang Ying-jun, Chen Kai, Bao Xu-hua. A software watermarking method based on program execution time[J]. Journal of Electronics & Information Technology, 2020, 42(8): 1811-1819.
10 Aiswarya K K, Praveen K, Amritha P P, et al. Application of secret sharing scheme in software watermarking[C]∥Information and Communication Technology for Intelligent Systems, Singapore, 2021: 345-353.
11 Goyal R, Kim S, Waters B, et al. Beyond software watermarking: traitor-tracing for pseudorandom functions[C]∥Proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 2021: 250-280.
12 王巍, 何颖, 谭永坤, 等. 一种增强型动态图的软件水印算法[J]. 吉林大学学报:理学版, 2022, 60(5): 1161-1166.
Wang Wei, He Ying, Tan Yong-kun, et al. A software watermarking algorithm for enhanced dynamic graph[J]. Journal of Jilin University(Science Edition), 2022, 60(5): 1161-1166.
13 李凌俐, 王春东, 张清华. 一种基于自修改的动态耦合水印方法[J]. 天津理工大学学报, 2023, 39(1): 29-34.
Li Ling-li, Wang Chun-dong, Zhang Qing-hua. Dynamic coupled watermark method based on self-modifying code[J]. Journal of Tianjin University of Technology, 2023, 39(1): 29-34.
14 Dridi F, El A S, El H Y W, et al. Design, hardware implementation on FPGA and performance analysis of three chaos-based stream ciphers[J]. Fractal and Fractional, 2023, 7(2): 197-203.
15 Chen B, Yu S, Li D D U, et al. Cryptanalysis of some self-synchronous chaotic stream ciphers and their improved schemes[J]. International Journal of Bifurcation and Chaos, 2021, 31(8): 215-242.
16 芦斌, 罗向阳, 刘粉林. 一种基于混沌的软件水印算法框架及实现[J]. 软件学报, 2007(2): 351-360.
Lu Bin, Luo Xiang-yang, Liu Fen-lin. A chaos-based framework and implementation for software watermarking algorithm[J]. Journal of Software, 2007(2): 351-360.
17 Ke-xin Y, Ke Y, Jian-qi Z. A robust dynamic software watermarking[C]∥International Conference on Information Technology and Computer Science. Kiev,Ukraine,2009: 15-18.
18 陈刚. 基于PE文件的软件水印研究[D]. 长沙: 湖南大学计算机与通信学院, 2008.
Chen Gang. Research on software watermark based on PE file[D]. Changsha: School of Computer and Communication, Hunan University, 2008.
19 罗养霞, 房鼎益. 基于混沌优化的动态水印算法研究[J].中国科学技术大学学报, 2012, 42(1): 77-84.
Luo Yang-xia, Fang Ding-yi. Dynamic watermarking algorithm based on chaptic optimization[J]. Journal of University of Science and Technology of China, 2012, 42(1): 77-84.
20 Barbora H, Sascha W. Confidential quantum computing[C]∥Proceedings of the 18th International Conference on Availability, Reliability and Security, New York,USA, 2023, 46: 1-10.
[1] Han-chi YAN,Chun-lin SU. Hybrid encryption method for biological information database based on AES and hash algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2024, 54(10): 2994-2999.
[2] Wei-wei LUO,Shao-wei LIU,Bing-tao ZHANG,Meng LI,Hai-luan LIU,Ling-yan FAN. Steganalysis of spatial image combining fusion features and feature mapping [J]. Journal of Jilin University(Engineering and Technology Edition), 2023, 53(11): 3260-3267.
[3] Xian-feng GUO,Hao-hua LI,Jin-yu WEI. Image encryption scheme based on Fibonacci transform and improved Logistic-Tent chaotic map [J]. Journal of Jilin University(Engineering and Technology Edition), 2023, 53(7): 2115-2120.
[4] Xi-yan LI,Xia-bing ZHOU,Zheng LIU. High-capacity and robust image watermarking algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2022, 52(1): 174-179.
[5] Guang-song LI,Wen-qing LI,Qing LI. Encrypted and compressed traffic classification based on random feature set [J]. Journal of Jilin University(Engineering and Technology Edition), 2021, 51(4): 1375-1386.
[6] Chun-bo WANG,Xiao-qiang DI. Cloud storage integrity verification audit scheme based on label classification [J]. Journal of Jilin University(Engineering and Technology Edition), 2021, 51(4): 1364-1369.
[7] Yi-cheng YU,Liang HU,Ling CHI,Jian-feng CHU. An anonymous authentication protocol for single⁃server architectures [J]. Journal of Jilin University(Engineering and Technology Edition), 2021, 51(2): 659-666.
[8] Yuan SONG,Dan-yuan ZHOU,Wen-chang SHI. Method to enhance security function of OpenStack Swift cloud storage system [J]. Journal of Jilin University(Engineering and Technology Edition), 2021, 51(1): 314-322.
[9] Hong-song CHEN,Jing-jiu CHEN. Statistical based distributed denial of service attack detection research in internet of things [J]. Journal of Jilin University(Engineering and Technology Edition), 2020, 50(5): 1894-1904.
[10] YU Yi-cheng, HU Liang, CHI Ling, CHU Jian-feng. Improved anonymous authentication protocol for multi-server architectures [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1586-1592.
[11] YANG Hong-yu, XU Jin. An Android malware static detection model [J]. 吉林大学学报(工学版), 2018, 48(2): 564-570.
[12] ZHAO Bo, QIN Gui-He, ZHAO Yong-Zhe, YANG Wen-Di. Public key cryptosystem based on semi-trapdoor one-way function [J]. 吉林大学学报(工学版), 2018, 48(1): 259-267.
[13] LUO Yang-xia, GUO Ye. Software recognition based on features of data dependency [J]. 吉林大学学报(工学版), 2017, 47(6): 1894-1902.
[14] HAN Jia-ling, ZHAO Xiao-hui. Adjustable reversible data hiding algorithm with large embedded capacity based on image gradient prediction [J]. 吉林大学学报(工学版), 2016, 46(6): 2074-2079.
[15] REN Wei-wu, HU Liang, ZHAO Kuo. Intrusion alert correlation model based on data mining and ontology [J]. 吉林大学学报(工学版), 2015, 45(3): 899-906.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!