2019
DOI: 10.1109/tifs.2019.2908071
|View full text |Cite
|
Sign up to set email alerts
|

Xmark: Dynamic Software Watermarking Using Collatz Conjecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 37 publications
0
16
0
Order By: Relevance
“…if right parent exists for m � n − 1/3 then (11) Output m − 1/3 (12) end if (13) end for (14) end if (15) Enter a new value n for a child node (16) end while ALGORITHM 3: Inverse binary tree generation. 8 International Journal of Mathematics and Mathematical Sciences For example, the sequence starting with n � 15 has a maximum value (or peak) of 160 before it reaches 1 on its 17th iteration.…”
Section: Determining Peaks In Collatzmentioning
confidence: 99%
See 3 more Smart Citations
“…if right parent exists for m � n − 1/3 then (11) Output m − 1/3 (12) end if (13) end for (14) end if (15) Enter a new value n for a child node (16) end while ALGORITHM 3: Inverse binary tree generation. 8 International Journal of Mathematics and Mathematical Sciences For example, the sequence starting with n � 15 has a maximum value (or peak) of 160 before it reaches 1 on its 17th iteration.…”
Section: Determining Peaks In Collatzmentioning
confidence: 99%
“…Perhaps the proof of this mesmerizing conjecture is so desired because the conjecture itself finds use in various applications. e Collatz conjecture is used in high-uncertainty audio signal encryption [13], image encryption [14], dynamic software watermarking [15], and information discovery [16]. Although the lack of a proof does not preclude applications of the Collatz conjecture, mathematical phenomenon related to the conjecture may be of interest in other applications, such as cryptography or information theory.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Digital property management and especially counterfeit protection mostly depend on watermarking in a variety of environments [37][38][39]. Digital watermarking has been finding its applications in digital cinema in recent years [40,41].…”
Section: Introductionmentioning
confidence: 99%