Server side algorithms for WHLK (Watermark, Hardware Parameters and License Key) framework
نویسندگان
چکیده
Software piracy is the most significant and burning issue in the age of the internet. Software piracy has been a direct threat for software vendors in terms of revenue and, therefore, a number of effective and efficient techniques were employed for detection and prevention of software piracy. One of very important technique is software watermarking and using registration keys. This paper proposes the Server-side algorithms for registration and embedding the watermark into the software. We have tested the algorithms and the analysis of the proposed algorithms proves that these registration algorithms are more reliable and efficient in comparison to other techniques.
منابع مشابه
WHLK: Framework for Software Authentication and Protection
In the last decade, numbers of algorithms were developed to control the piracy. In most of the existing algorithms and software registration schemes, the identity of users and software is not taken into account. After identifying the fundamental weakness of existing piracy control measures, this paper proposes the implementation and testing of WHLK Model [1] in which we introduced an integratio...
متن کاملInvestigating the Effects of Hardware Parameters on Power Consumptions in SPMV Algorithms on Graphics Processing Units (GPUs)
Although Sparse matrix-vector multiplication (SPMVs) algorithms are simple, they include important parts of Linear Algebra algorithms in Mathematics and Physics areas. As these algorithms can be run in parallel, Graphics Processing Units (GPUs) has been considered as one of the best candidates to run these algorithms. In the recent years, power consumption has been considered as one of the metr...
متن کاملTwo Novel Chaos-Based Algorithms for Image and Video Watermarking
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...
متن کاملKeyless Public Watermarking for Intellectual Property Authentication
A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard problems. It provides desirable proof of authorship without rendering the intellectual properties useless. However, it makes the watermark detection, which is as important as watermarking, a NP-hard problem. We propose a keyles...
متن کاملSecuring Android Code Using White Box Cryptography and Obfuscation Techniques
Code obfuscation is a set of program transformations that make program code and program execution difficult to analyze. First of all, obfuscation hinders manual inspection of program internals. By renaming variables and functions, and breaking down structures, it protects against reverse-engineering. It protects both storage and usage of keys, and it can hide certain properties such as a softwa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- PeerJ PrePrints
دوره 3 شماره
صفحات -
تاریخ انتشار 2015