Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6871704 | Discrete Applied Mathematics | 2018 | 15 Pages |
Abstract
An ingenious graph-based watermarking scheme recently proposed by Chroni and Nikolopoulos encodes integers as a special type of reducible permutation graphs. It was claimed without proof that those graphs can withstand attacks in the form of a single edge removal. We introduce a linear-time algorithm which restores the original graph after removals of kâ¤2 edges, therefore proving an even stronger result. Furthermore, we prove that kâ¤5 general edge modifications (removals/insertions) can always be detected in polynomial time. Both bounds are tight. Our results reinforce the interest in regarding Chroni and Nikolopoulos's scheme as a possible software watermarking solution for numerous applications.
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics
Authors
Lucila M.S. Bento, Davidson R. Boccardo, Raphael C.S. Machado, VinÃcius G. Pereira de Sá, Jayme Luiz Szwarcfiter,