2019
DOI: 10.1016/j.matcom.2019.04.010
|View full text |Cite
|
Sign up to set email alerts
|

Birthmark based identification of software piracy using Haar wavelet

Abstract: Piracy of software is an increasing problem of modern day software industry. Piracy of software is the unlawful use of software or part of it without proper permission as described in license agreement. Software piracy is a serious crime but not taken seriously by most people. Preventing software piracy is very important for the growing software industry. Efforts are being made to prevent and detect software piracy. Several techniques have been developed most important of which is software birthmark. The birth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

6
3

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 28 publications
0
17
0
Order By: Relevance
“…Recent developments in this area have lead to HWM being treated for multidimensional case [3,4,6] as well an adaptive wavelet method [23]. Other devolopments include nonuniform HWM [48], application in inverse problems [21], identification of software piracy [47], etc.…”
Section: Introductionmentioning
confidence: 99%
“…Recent developments in this area have lead to HWM being treated for multidimensional case [3,4,6] as well an adaptive wavelet method [23]. Other devolopments include nonuniform HWM [48], application in inverse problems [21], identification of software piracy [47], etc.…”
Section: Introductionmentioning
confidence: 99%
“…Source code transformation is done for various purposes such as to optimize the efficiency of the source code, minimize the source code, and mostly to hide the identity of source code. Various preservation techniques are used for changing or modifying the source code [18][19][20][21][22]. Practitioners are mostly embedding the watermark or digital signature for protecting the identity and ownership of the source code.…”
Section: Introductionmentioning
confidence: 99%
“…ese methods include techniques of fingerprinting [1,2], watermarking [3][4][5], and software birthmarks [6][7][8][9][10][11]. e watermark has the weaknesses as it can be removed by approaches of code obfuscations and semantic preserving transformation.…”
Section: Introductionmentioning
confidence: 99%
“…More features of a software birthmark can eventually present the robustness and effectiveness which will further show the precise detection of transformations or theft made in the software or program. Birthmark of software is established on imperative properties, resilience, and credibility [6]. Credibility depicts that the birthmark of software entails that two programs, which is written independently, should be different.…”
Section: Introductionmentioning
confidence: 99%