If you are able to obtain a copy of your program that you believe has been illegally copied, you run a watermark recognizer to extract the watermark/fingerprint from the program.
WILDCATS
in the TTT application shown in here :
Note that the graphs that SandMark generates can be viewed by clicking
on the Graphs
button:
Graph Type
Select the type of watermark graph we look for.
|
Numeric Watermark
Pure numeric watermarks are encoded more efficiently than watermarks that can be arbitrary strings. NOTE: If you check this you must also have checked the same box during embedding. |
Use Cycle Graph
To protect against node-splitting attacks, the underlying graph has been expanded such that every node becomes a 3-cycle. Any node split will just expand the length of the cycle. During recognition, the cycles are contracted to generate the original graph. |