{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:31:05Z","timestamp":1755999065481,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,17]],"date-time":"2010-06-17T00:00:00Z","timestamp":1276732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,17]]},"DOI":"10.1145\/1839379.1839402","type":"proceedings-article","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T12:57:24Z","timestamp":1281531444000},"page":"125-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Encoding watermark integers as self-inverting permutations"],"prefix":"10.1145","author":[{"given":"Maria","family":"Chroni","sequence":"first","affiliation":[{"name":"University of Ioannina"}]},{"given":"Stavros D.","family":"Nikolopoulos","sequence":"additional","affiliation":[{"name":"University of Ioannina"}]}],"member":"320","published-online":{"date-parts":[[2010,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Principles, Techniques, and Tools","author":"Aho A. V.","year":"1986","unstructured":"A. V. Aho , R. Sethi , J. D. Ullman , Compilers , Principles, Techniques, and Tools , Addison-Wesley , 1986 . A. V. Aho, R. Sethi, J. D. Ullman, Compilers, Principles, Techniques, and Tools, Addison-Wesley, 1986."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.016"},{"key":"e_1_3_2_1_3_1","volume-title":"Error-correction graphs,\" Workshop on Graphs in Computer Science (WG'03)","author":"Collberg C.","year":"2003","unstructured":"C. Collberg , E. Carter , S. Kobourov , and C. Thomborson , \" Error-correction graphs,\" Workshop on Graphs in Computer Science (WG'03) , 2003 . C. Collberg, E. Carter, S. Kobourov, and C. Thomborson, \"Error-correction graphs,\" Workshop on Graphs in Computer Science (WG'03), 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292569"},{"key":"e_1_3_2_1_6_1","first-page":"317","article-title":"A secure, robust watermark for multimedia","volume":"1174","author":"Cox I.","year":"1996","unstructured":"I. Cox , J. Kilian , T. Leighton , and T. Shamoon , \" A secure, robust watermark for multimedia ,\" LNCS 1174 , 1996 , pp. 317 -- 333 . I. Cox, J. Kilian, T. Leighton, and T. Shamoon, \"A secure, robust watermark for multimedia,\" LNCS 1174, 1996, pp. 317--333.","journal-title":"LNCS"},{"key":"e_1_3_2_1_7_1","volume-title":"Method and system for generating and auditing a signature for a computer program,\" US Patent 5.559.884","author":"Davidson R. L.","year":"1996","unstructured":"R. L. Davidson and N. Myhrvold , \" Method and system for generating and auditing a signature for a computer program,\" US Patent 5.559.884 , Microsoft Corporation , Sep 1996 . R. L. Davidson and N. Myhrvold, \"Method and system for generating and auditing a signature for a computer program,\" US Patent 5.559.884, Microsoft Corporation, Sep 1996."},{"key":"e_1_3_2_1_8_1","volume-title":"The Protection of Computer Software - Its Technology and Applications","author":"Grover D.","year":"1997","unstructured":"D. Grover , The Protection of Computer Software - Its Technology and Applications , Cambridge University Press New York , 1997 . D. Grover, The Protection of Computer Software - Its Technology and Applications, Cambridge University Press New York, 1997."},{"key":"e_1_3_2_1_9_1","volume-title":"Method for stegacipher protection of computer code,\" US Patent 5.745.569","author":"Moskowitz S. A.","year":"1996","unstructured":"S. A. Moskowitz and M. Cooperman , \" Method for stegacipher protection of computer code,\" US Patent 5.745.569 , The Dice Company , Jan 1996 . S. A. Moskowitz and M. Cooperman, \"Method for stegacipher protection of computer code,\" US Patent 5.745.569, The Dice Company, Jan 1996."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-006-6955-z"},{"key":"e_1_3_2_1_11_1","unstructured":"P. Samson \"Apparatus and method for serializing and validating copies of computer software \" US Patent 5.287.408 1994.  P. Samson \"Apparatus and method for serializing and validating copies of computer software \" US Patent 5.287.408 1994."},{"key":"e_1_3_2_1_12_1","first-page":"569","volume-title":"Design and evaluation of birthmarks for detecting theft of java programs,\" International Conference on Software Engineering (IASTED SE'04)","author":"Tamada H.","year":"2004","unstructured":"H. Tamada , M. Nakamura , A. Monden , and K. Matsumoto , \" Design and evaluation of birthmarks for detecting theft of java programs,\" International Conference on Software Engineering (IASTED SE'04) , 2004 , pp. 569 -- 575 . H. Tamada, M. Nakamura, A. Monden, and K. Matsumoto, \"Design and evaluation of birthmarks for detecting theft of java programs,\" International Conference on Software Engineering (IASTED SE'04), 2004, pp. 569--575."},{"key":"e_1_3_2_1_13_1","first-page":"157","volume-title":"LNCS 2137","author":"Venkatesan R.","year":"2001","unstructured":"R. Venkatesan , V. Vazirani , and S. Sinha , \" A graph theoretic approach to software watermarking,\" 4th International Information Hiding Workshop (IH'01) , LNCS 2137 , 2001 , pp. 157 -- 168 . R. Venkatesan, V. Vazirani, and S. Sinha, \"A graph theoretic approach to software watermarking,\" 4th International Information Hiding Workshop (IH'01), LNCS 2137, 2001, pp. 157--168."},{"key":"e_1_3_2_1_14_1","first-page":"268","article-title":"A survey on software watermarking","volume":"14","author":"Zhang L.","year":"2003","unstructured":"L. Zhang , Y. Yang , X. Niu , and S. Niu , \" A survey on software watermarking ,\" Journal of Software 14 ( 2003 ) 268 -- 277 . L. Zhang, Y. Yang, X. Niu, and S. Niu, \"A survey on software watermarking,\" Journal of Software 14 (2003) 268--277.","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_42"}],"event":{"name":"CompSysTech '10: Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing","acronym":"CompSysTech '10","location":"Sofia Bulgaria"},"container-title":["Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1839379.1839402","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1839379.1839402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:23:29Z","timestamp":1750245809000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1839379.1839402"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,17]]},"references-count":14,"alternative-id":["10.1145\/1839379.1839402","10.1145\/1839379"],"URL":"https:\/\/doi.org\/10.1145\/1839379.1839402","relation":{},"subject":[],"published":{"date-parts":[[2010,6,17]]},"assertion":[{"value":"2010-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}