Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Steganography-based code protecting and restoring method

A steganography and code technology, applied in the field of information hiding, can solve the problem of low concealment of extraction operations, and achieve high security, good code concealment, and high concealment

Inactive Publication Date: 2015-07-08
INST OF INFORMATION ENG CAS
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] Aiming at the problem that the concealment of the extraction operation in the existing code hiding protection method is not strong, the present invention provides a code protection method based on steganography, which further strengthens the protection of the extraction operation by using an image to hide the important code of the software. The extraction operation is mixed with the normal operations such as the reading of the carrier media, without encryption and decryption of hidden codes, and avoid writing programs for such operations in scripting languages, making it harder for the results of decompilation to reflect the basic intentions of the program and protect the concealment of the code security and the concealment of code extraction operations to protect the security of the software to meet the software's requirements for important code protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Steganography-based code protecting and restoring method
  • Steganography-based code protecting and restoring method
  • Steganography-based code protecting and restoring method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0036] Such as figure 2 As shown, it is a schematic diagram of the realization function module of the method of the present invention, and the code protection method can be expressed as a five-tuple, that is, Σ=k ,D k 〉, where C is the carrier image set, M is the protection code set, C′ is the code-carrying image set obtained after the carrier image hides the protection code, E k is the code-behind algorithm, D k Restore the algorithm for the code. In the code protection method Σ, there are two main algorithm modules: a code hiding algorithm module and a code restoration algorithm module. The functional requirements of each module are as follows:

[0037] 1. Code-behind algorithm module

[0038] Under the control of the steganography key k, the module embeds the code M to be protected into the carrier image C, and outputs the code-carrying image C′. Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a steganography-based code protecting and restoring method. The method comprises the following steps: 1) embedding a procedure to be protected in the important software to an image carrier by using a selected steganography algorithm, and generating a code carrying image; 2) searching the position of every embedded procedure code in the important software, and then inserting an image reading operation and a code extracting and restoring operation at the corresponding position; 3) re-coding the processed code in step 2) and writing a steganography secrete key of the selected steganography algorithm, and obtaining a safety software which provides the procedure code protection; running the safety software at a restoring terminal, and extracting the steganography secrete key; when the image reading operation and a code extracting and restoring operation are executed, restoring the hidden procedure code from the code carrying mage by using the code extracting method and the steganography secrete key corresponding to the steganography algorithm. According to the steganography-based code protecting and restoring method, the safety of the important software is improved.

Description

technical field [0001] The invention relates to a code protection and restoration method based on steganography, which belongs to the technical field of information hiding, in particular to a method for protection and restoration of important software codes. Background technique [0002] With the increasing popularity of computer software technology, pirated software has caused huge losses to enterprises, and software copyright protection has attracted the attention of the industry. According to a new study conducted by International Data Corporation (IDC) and National University of Singapore, software piracy may cause global enterprises to lose nearly US$500 billion in 2014; according to the latest Business Software Alliance (BSA) According to a global survey conducted by China, the software piracy rate in the Asia-Pacific region has climbed to 62%, among which my country suffered the largest commercial losses, as high as 8.76 billion US dollars. Therefore, protecting the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12
Inventor 易小伟李金才赵险峰
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products