##plugins.themes.academic_pro.article.main##

Abstract

The rise  in use  of Internet  and  byte  code  languages such  as Java byte  code  and  Microsoft’s  Common Intermediate language have  made copying, decompiling  and disassembling software easier with the rapid development of Internet  and Software Industry. The issue of software piracy and security is of great concern. Software watermarking is a new technique appeared in recent years for software copyright protection. It embeds some secret information (watermark) into software as an identifier of the ownership of copyright for the software. We are going to implement a software watermarking algorithm that is effective for the copyright protection of java program, especially for java class files.

Index Terms—software watermarking, byte code, software copyright, protection, java program, class files.

##plugins.themes.academic_pro.article.details##

Author Biographies

Dnyaneshwar Damodhar Karale, Sandip Institute of Technology and Research Centre Nashik, Maharashtra

Department of Information Technology Engineering

Archana Avinash Tapase, Sandip Institute of Technology and Research Centre Nashik, Maharashtra

Department of Information Technology Engineering

Prof.Bhushan S. Chaudhari, Sandip Institute of Technology and Research Centre Nashik, Maharashtra

Department of Information Technology Engineering
How to Cite
Karale, D. D., Tapase, A. A., & Chaudhari, P. S. (2014). Software Protection against Piracy and Reverse Engineering using Software Watermarking Technique. International Journal of Emerging Trends in Science and Technology, 1(07). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/347

References

[1] Guangxing Xu and Guangli Xiang ”A Method of Software
Watermarking”, 2012 International Conference on Systems
and Informatics (ICSAI 2012).
[2] James Hamilton and Sebastian Danicic ”An Evaluation of
the Resilience of Static Java Bytecode Watermarks Against Distortive
Attacks”,IAENG International Journal of Computer
Science, 38:1, 2011.
[3] Christian S. Collberg and Clark Thomborson ”Watermarking,
Tamper- Proofing, and Obfuscation Tools for Software
Protection”, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
VOL. 28, NO. 8, AUGUST 2002.
[4] William Feng Zhu ”Concepts and Techniques in Software
Watermarking and Obfuscation”, A thesis on Doctor of Philosophy
in Computer Science, August 2007.
[5] H. Tamada, M. Nakamura, A. Monden, and K. Matsumoto
”Design and evaluation of birthmarks for detecting theft of java
programs”, in Proc. IASTED International Conference on
Software Engineering (IASTED SE2004), Feb 2004, pp. 569-
57.
[6] D. Grover ”The Protection of Computer Software - Its Technology
and Applications”, 2nd ed. Cambridge University Press,
1997.
[7] J. Nagra, C. Thomborson, and C. Collberg A functional
taxonomy for software watermarking, in Twenty-Fifth Australasian
Computer Science Conference (ACSC2002), M. J.
Oudshoorn, Ed. Melbourne, Australia: ACS, 2002.
[8] Y. He Tamperproofing a software watermark by encoding constants,
Masters thesis, University of Auckland, Mar 2002.
[9] C. Collberg and C. Thomborson Software watermarking:
Models and dynamic embeddings, in Proceedings of Symposium
on Principles of Programming Lan- guages, POPL99,
1999, pp. 311324.
[10] L. Zhang, Y. Yang, , X. Niu, and S. Niu, ”A survey on
software watermarking”,Journal of Software, vol. 14, no. 2,
pp. 268-277, 2003.
[11] R. El-Khalil and A. Keromytis,”Hydan: Embedding secrets
in program binaries”,Aug. 14 2004.
[12] C. Collberg, S. Jha, D. Tomko, and H. Wang, ”Uwstego:
A general architecture for software watermarking”, Technical
Report TR04-11, Aug. 31 2001.
[13] C. Collberg, G. Myles, and A. Huntwork, ”Sandmark-a tool
for software protection research”, IEEE Security and Privacy,
vol. 1, no. 4, pp. 40-49, 2003.