APPLICATION OF WATERMARKING TO SOFTWARE PIRACY

Authors

  • Ekene Frank Ozioko Enugu State University of Science and Technology,

DOI:

https://doi.org/10.53555/cse.v2i2.552

Keywords:

APPLICATION, WATERMARKING, SOFTWARE, PIRACY

Abstract

Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on how a software watermark is applied it can be used to discourage piracy; as proof of authorship or purchase; or to track the source of the illegal
redistribution. Software watermarks, which can be used to identify the intellectual property owner of a piece software, are broadly divided into two categories: static and dynamic. Static watermarks are embedded in the code and/or data of a computer program, whereas dynamic watermarking techniques store a watermark in a
program’s execution state. In particular we analyze an algorithm originally proposed by Genevie`ve Arboitin. A Method for Watermarking Java Programs via Opaque Predicates. This watermarking technique embeds the watermark by adding opaque predicates to the application.We have found that the Arboit technique does withstand some forms of attack and has a respectable data-rate. However, it is susceptible to a variety of distortive attacks.One unanswered question in the area of software watermarking is whether dynamic algorithms are inherently more resilient to attacks than static algorithms. We have implemented and  mpirically evaluated both static and dynamic versions within 

Downloads

Download data is not yet available.

Author Biography

Ekene Frank Ozioko, Enugu State University of Science and Technology,

Department of Computer and Information Science,

References

Business software alliance, http://www.bsa.org.

Sandmark. http://www.cs.arizona.edu/sandmark/.

Specjvm98 v1.04. http://www.specbench.org/osg/jvm98/.

Aho, A. V., Sethi, R., & Ullman, J. D. (1988). Compilers: Principles, Techniques, and Tools. Addison- Wesley.

Arboit, G. (2002). A method for watermarking java programs via opaque predicates. In The Fifth Inter- national Conference on Electronic Commerce Research (ICECR-5).

Downloads

Published

2016-02-29

How to Cite

Ozioko, E. F. (2016). APPLICATION OF WATERMARKING TO SOFTWARE PIRACY. International Journal For Research In Advanced Computer Science And Engineering, 2(2), 52–65. https://doi.org/10.53555/cse.v2i2.552