Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark | IEEE Conference Publication | IEEE Xplore