software watermarking
Recently Published Documents


TOTAL DOCUMENTS

114
(FIVE YEARS 11)

H-INDEX

13
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Honggoo Kang ◽  
Yonghwi Kwon ◽  
Sangjin Lee ◽  
Hyungjoon Koo

2021 ◽  
Vol 8 (4) ◽  
pp. 831
Author(s):  
Togu Novriansyah Turnip ◽  
William Suarez Lumbantobing ◽  
David Christian Sitorus ◽  
Friska Laurenzia Sianturi

<p class="15"><em>Smartphone</em> merupakan alat umum yang digunakan masyarakat dalam kehidupan sehari-hari. Sistem operasi yang paling banyak digunakan pada smartphone adalah Android. Aplikasi pada Android dapat diperoleh tidak hanya di Play Store saja, namun juga dapat ditemukan secara bebas di <em>website-website</em> yang berada di internet. Oleh karena itu aplikasi Android rentan terhadap pembajakan.<em> Software watermarking</em> merupakan metode umum yang biasanya digunakan untuk mengantisipasi pembajakan perangkat lunak dengan menyisipkan informasi pengenal ke dalam suatu program. Tujuan dari <em>software watermarking</em> adalah untuk membuktikan kepemilikan dari sebuah program. Salah satu teknik watermarking adalah <em>dynamic watermarking. </em>Teknik ini akan men-<em>generate</em> <em>watermark</em> ketika program dieksekusi. <em>Dynamic Graph Watermarking</em> (DGW) merupakan salah satu metode dalam <em>software watermarking</em>. Dalam penyisipan <em>watermark, </em>metode ini menggunakan struktur graf yang dibuat berdasarkan enumerasi graf. Salah satu algoritma dalam DGW adalah Colberg-Thomborson (CT) <em>algorithm. </em>Algoritma tersebut menggunakan <em>code</em> yang dapat membentuk <em>watermark </em>saat <em>runtime program</em><em>.</em> Pemberian <em>watermark</em> terhadap sebuah aplikasi dilakukan dengan menggunakan CT <em>algorithm</em> dan enumerasi <em>Parent Pointer Graph (PPG).</em> Untuk menyisipkan watermark terhadap aplikasi Android, dibuat sebuah <em>library</em> Java dan sebuah simulator berbasis desktop untuk mengekstrak <em>watermark</em>. Dari hasil pengujian dapat disimpulkan bahwa PPG dapat digunakan sebagai enumerasi pada metode DGW dan memiliki tingkat ketahanan yang tinggi terhadap <em>distortive</em><em> attack </em>namun tidak pada <em>subtractive </em>dan<em> additive attack</em>. Dari penelitian juga diperoleh hasil bahwa pemberian <em>watermark</em> memberikan penambahan <em>size</em> pada apk Android namun tidak mempengaruhi peningkatan penggunaan <em>memory</em> dan <em>processor</em> aplikasi.</p><p class="15"> </p><p class="15"><em><strong>Abstract </strong></em></p><p class="15"><em>Smartphones are common tools in people’s daily life. The most common operating in smartphone is Android. Our android application can be obtained not only in the Play Store, but also free websites on the internet. Therefore, Android applications are vulnerable to piracy. Software watermarking is a common method used to anticipate software piracy by inserting identifying information into a program. The purpose of software watermarking is to prove ownership of a program. One of the watermarking techniques is dynamic watermarking that generates watermarks when the program is executed. Dynamic Graph Watermarking (DGW) is one of the software watermarking methods. This method uses a graph structure which created based on graph enumeration in inserting the watermark. One of the DGW algorithm is Colberg-Thomborson (CT) which use code that can form a watermark at program run time. For watermarking an application, we use CT algorithm and Parent Pointer Graph (PPG) enumeration.   To embed watermark to the android application we create a Java library and a desktop-based simulator to extract watermark from android application. Our result shows that PPG can be used as an enumeration and has robustness in defending against distortive attack but not to subtractive and additive attacks. we also get that watermark gives an additional size to an android apk but it does not affect the increase in memory and processor usage.</em></p><p align="justify"> </p>


2021 ◽  
pp. 250-280
Author(s):  
Rishab Goyal ◽  
Sam Kim ◽  
Brent Waters ◽  
David J. Wu

2020 ◽  
pp. 2740-2750
Author(s):  
Sarah H. Mnkash ◽  
Matheel E. Abdulmunem

The Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software, as an indicator of copyright ownership for this software. In this paper, the watermarked software will be explained in detail by defining the classification of watermarks software, models of attack, and methods used in software watermarking carried out by several researchers. It seems clearly that the method of ROP algorithm has given the highest accuracy results up to 100%


2019 ◽  
Vol 79 (3-4) ◽  
pp. 2555-2576 ◽  
Author(s):  
Ayan Dey ◽  
Shibashis Ghosh ◽  
Sukriti Bhattacharya ◽  
Nabendu Chaki

2019 ◽  
Vol 14 (11) ◽  
pp. 2859-2874
Author(s):  
Haoyu Ma ◽  
Chunfu Jia ◽  
Shijia Li ◽  
Wantong Zheng ◽  
Dinghao Wu

Algorithmica ◽  
2019 ◽  
Vol 81 (7) ◽  
pp. 2899-2916
Author(s):  
Lucila M. S. Bento ◽  
Davidson R. Boccardo ◽  
Raphael C. S. Machado ◽  
Vinícius G. Pereira de Sá ◽  
Jayme L. Szwarcfiter

Sign in / Sign up

Export Citation Format

Share Document