{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:45:14Z","timestamp":1755999914616},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540330523"},{"type":"electronic","value":"9783540330585"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11689522_33","type":"book-chapter","created":{"date-parts":[[2006,2,25]],"date-time":"2006-02-25T06:47:58Z","timestamp":1140850078000},"page":"355-366","source":"Crossref","is-referenced-by-count":12,"title":["A Chaos-Based Robust Software Watermarking"],"prefix":"10.1007","author":[{"given":"Fenlin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Bin","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Trans. Software Engineering\u00a028(8), 735\u2013746","DOI":"10.1109\/TSE.2002.1027797"},{"key":"33_CR2","unstructured":"Lihe, Z., YiXian, Y., Xinxin, N., Shaozhang, N.: A Survey on Software Watermarking. Journal of Software\u00a014(2), 268\u2013277 (in Chinese)"},{"key":"33_CR3","unstructured":"Business Software Alliance. Eighth annual BSA global software piracy study: Trends in software piracy 1994-2002 (June 2003)"},{"key":"33_CR4","unstructured":"Kan, X.: Encryption and Decryption. In: Software Protection Technique and Complete Resolvent. Electronic Engineering Publishing Company, Beijing (2001) (in Chinese)"},{"key":"33_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-30114-1_15","volume-title":"Information Hiding","author":"J. Nagra","year":"2004","unstructured":"Nagra, J., Thomborson, C.: Threading software watermarks. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 208\u2013223. Springer, Heidelberg (2004)"},{"key":"33_CR6","unstructured":"Davidson, R.L., Myhrvold, N.: Davidson and Nathan Myhrvold. Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884. Microsoft Corporation, Assignee (September 1996)"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.-J.: Robust object watermarking: Application to code. In: 3rd International Information Hiding Workshop, pp. 368\u2013378 (1999)","DOI":"10.1007\/10719724_25"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: Proceedings of POPL 1999 of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 311\u2013324 (1999)","DOI":"10.1145\/292540.292569"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: An abstract interpretation-based framework for software watermarking. In: ACM Principles of Programming Languages(POPL 2004), Venice, Italy, pp. 173\u2013185 (2004)","DOI":"10.1145\/964001.964016"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Collberg, C., Huntwork, A., Carter, E., Townsend, G.: Graph theoretic software watermarks: Implementation, analysis, and attacks. In: 6th Workshop on Information Hiding, pp. 192\u2013207 (2004)","DOI":"10.1007\/978-3-540-30114-1_14"},{"issue":"4","key":"33_CR11","first-page":"71","volume":"32","author":"L. Bin","year":"2005","unstructured":"Bin, L., Yongqiang, Z., Fenlin, L.: A New Scheme on Perturbing Digital Chaotic Systems. Computer Science\u00a032(4), 71\u201374 (2005) (in Chinese)","journal-title":"Computer Science"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11689522_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:18:00Z","timestamp":1619507880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11689522_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540330523","9783540330585"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11689522_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}