Two obfuscation methods by controlling calculation amounts and by table function for watermark

Yuan Yu Wei, Kazuo Ohzeki

Research output: Contribution to journalArticle

1 Citation (Scopus)


This paper describes new two obfuscation methods the fist method can control computational complexity and the second method can achieve semantic obfuscation. The computational complexity can be strictly controlled by using the technique of RSA encryption. The computational complexity can be arbitrarily specified by the impossibility of factorization of prime number in RSA encryption method. Semantic obfuscation is achieved by transforming a function into a table function. The table function method only shows input data and output data .It hides all the intermediate processing data. Because the explicit function form is hidden, it is thought that analysis takes time. The computational complexity technique and semantic technique can be used at the same time, by embedding the table function into the program with computational complexity method.

Original languageEnglish
Pages (from-to)110-122
Number of pages13
JournalInternational Journal of Computer Science and Applications
Issue number1
Publication statusPublished - 2011 Aug 29



  • Complexity
  • JPEG semantic
  • Prime number
  • RSA cipher

ASJC Scopus subject areas

  • Computer Science Applications

Cite this