Server side algorithms for WHLK (Watermark, Hardware Parameters and License Key) framework

نویسندگان

  • Nishant Gupta
  • Shubhnandan S. Jamwal
چکیده

Software piracy is the most significant and burning issue in the age of the internet. Software piracy has been a direct threat for software vendors in terms of revenue and, therefore, a number of effective and efficient techniques were employed for detection and prevention of software piracy. One of very important technique is software watermarking and using registration keys. This paper proposes the Server-side algorithms for registration and embedding the watermark into the software. We have tested the algorithms and the analysis of the proposed algorithms proves that these registration algorithms are more reliable and efficient in comparison to other techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

WHLK: Framework for Software Authentication and Protection

In the last decade, numbers of algorithms were developed to control the piracy. In most of the existing algorithms and software registration schemes, the identity of users and software is not taken into account. After identifying the fundamental weakness of existing piracy control measures, this paper proposes the implementation and testing of WHLK Model [1] in which we introduced an integratio...

متن کامل

Investigating the Effects of Hardware Parameters on Power Consumptions in SPMV Algorithms on Graphics Processing Units (GPUs)

Although Sparse matrix-vector multiplication (SPMVs) algorithms are simple, they include important parts of Linear Algebra algorithms in Mathematics and Physics areas. As these algorithms can be run in parallel, Graphics Processing Units (GPUs) has been considered as one of the best candidates to run these algorithms. In the recent years, power consumption has been considered as one of the metr...

متن کامل

Two Novel Chaos-Based Algorithms for Image and Video Watermarking

In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...

متن کامل

Keyless Public Watermarking for Intellectual Property Authentication

A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard problems. It provides desirable proof of authorship without rendering the intellectual properties useless. However, it makes the watermark detection, which is as important as watermarking, a NP-hard problem. We propose a keyles...

متن کامل

Securing Android Code Using White Box Cryptography and Obfuscation Techniques

Code obfuscation is a set of program transformations that make program code and program execution difficult to analyze. First of all, obfuscation hinders manual inspection of program internals. By renaming variables and functions, and breaking down structures, it protects against reverse-engineering. It protects both storage and usage of keys, and it can hide certain properties such as a softwa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • PeerJ PrePrints

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2015