• 沒有找到結果。

Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes

N/A
N/A
Protected

Academic year: 2022

Share "Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes

作者: I. S. Lee;W. H. Tsai

貢獻者: Department of Information Communication

關鍵詞: Authentication;camouflage program;information sharing;invisible ASCII control codes;program sharing;secret program;security protection;software

program;source program;stego-program 日期: 2010-01

上傳時間: 2009-11-25T02:31:18Z 出版者: Asia University

摘要: A new method for software program protection by information sharing and authentication techniques using invisible ASCII control codes is proposed. A scheme for sharing a secret source program written in Visual C++ among a group of participants, each holding a camouflage program to hide a share, is first proposed for safe keeping of the secret program. Only when all the shares hidden in the camouflage programs are collected can the secret program be recovered.

The secret program, after being exclusive-ORed with all the camouflage programs, is divided into shares. Each share is encoded next into a sequence of special ASCII control codes which are invisible when the codes are inserted in the comment of the Visual C++ program and viewed in the window of the Microsoft VC++ editor. These invisible codes then are hidden in the camouflage program, resulting in a stegoprogram for a participant to keep. Each stego-program can still be compiled and executed to perform the original function of the camouflage program. A secret program recovery scheme is also proposed. To enhance security under the assumption that the sharing and recovery algorithms are known to the public, three security measures via the use of a secret random key are also proposed,

which not only can prevent the secret program from being recovered illegally without providing the secret key, but also can authenticate the stego-program provided by each participant, during the recovery process, by checking whether the share or the camouflage program content in the stego-program have been

tampered with incidentally or intentionally. Experimental results show the feasibility of the proposed method.

參考文獻

相關文件

 Create and present information and ideas for the purpose of sharing and exchanging by using information from different sources, in view of the needs of the audience. 

 Create and present information and ideas for the purpose of sharing and exchanging by using information from different sources, in view of the needs of the audience. 

• Nokia has been using Socialtext wiki software for a year and a half to facilitate information exchange within its Insight &

The MTMH problem is divided into three subproblems which are separately solved in the following three stages: (1) find a minimum set of tag SNPs based on pairwise perfect LD

The angle descriptor is proposed as the exterior feature of 3D model by using the angle information on the surface of the 3D model.. First, a 3D model is represented

“A Comprehensive Model for Assessing the Quality and Productivity of the Information System Function Toward a Theory for Information System Assessment.”,

Narasimhan, Ram, and Anand Nair (2005), “The Antecedent Role of Quality, Information Sharing and Supply Chain Proximity on Strategic Alliance Formation and Performance,”

Since visible light is not capable of detecting interior defects of a solar cell; it is not easy to reveal invisible micro cracks.. At present it is most common to detect