CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Piracy Detection and Prevention using SIFT based on Earth Moverís Distance (EMD).

by B.Srinivas, Dr.Koduganti Venkata Rao, Dr. P.Suresh Varma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 38 - Number 7
Year of Publication: 2012
Authors: B.Srinivas, Dr.Koduganti Venkata Rao, Dr. P.Suresh Varma
10.5120/4702-6859

B.Srinivas, Dr.Koduganti Venkata Rao, Dr. P.Suresh Varma . Piracy Detection and Prevention using SIFT based on Earth Moverís Distance (EMD).. International Journal of Computer Applications. 38, 7 ( January 2012), 35-41. DOI=10.5120/4702-6859

@article{ 10.5120/4702-6859,
author = { B.Srinivas, Dr.Koduganti Venkata Rao, Dr. P.Suresh Varma },
title = { Piracy Detection and Prevention using SIFT based on Earth Moverís Distance (EMD). },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 38 },
number = { 7 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 35-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume38/number7/4702-6859/ },
doi = { 10.5120/4702-6859 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:24:17.303473+05:30
%A B.Srinivas
%A Dr.Koduganti Venkata Rao
%A Dr. P.Suresh Varma
%T Piracy Detection and Prevention using SIFT based on Earth Moverís Distance (EMD).
%J International Journal of Computer Applications
%@ 0975-8887
%V 38
%N 7
%P 35-41
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scale, violating software license and leading to copyright infringement. Almost 50% software licenses are pirated accounting over 51.4 billion dollars loss globally. Piracy is killing many software businesses leading to drastic loss for software developers. Under these circumstances there is a need for anti-piracy methods. This paper discuss about a robust yet efficient method for avoiding software piracy. After introducing software piracy methods and general piracy activities carried out by pirates, a mechanism to validate authorized user using face identity is described. A vector based algorithm is explained which detects Facial features of authorized user and generates a user authentication key, which is used for validation during product activation.

References
  1. Yawei Zhang, Lei Jin, Xiaojun Ye, “Software Piracy Prevention: Splitting on Client”, IEEE International Conference on Security Technology, December 13-15, 2008
  2. Sivasubramanyam Y, Deepak RanjanShenoy, “Computer Hardware and System Software Concepts” Vol -1, Version 1.0, March 2007
  3. Mikko T. Siponen, TeroVartiainen, “Unauthorized Copying of Software - An Empirical Study of Reasons For and Against”, SIGCAS Computers and Society, Volume 37, No. 1, June 2007, PP 30 -43
  4. Petar Djekic, Claudia Loebbecke, “Preventing application software piracy: An empirical investigation of technical copy protections”, The Journal of Strategic Information System, Volume 16, Issue,June 2007, PP 173-186
  5. B. Fu, G. Richard III and Y. Chen. Some New Approaches for Preventing Software tampering. In ACM SE, 06, Melbourne Florida, USA. 2006
  6. Q. Yang and X.O. Tang, “Recent advances in subspace analysis for face recognition,” in Advances in Biometric Person Authentication, pp. 275–287. 2005
  7. David G. Lowe. Distinctive image features from scale-invariant keypoints. International journal of computer vision, 60, 2004
  8. Business Software Alliance. http://www.bsa.org
  9. Ginger Myles, Christian Collberg. “Detecting Software Theft via Whole Program path Birthmarks.”LNCS 3225, pp. 404-415, ISC 2004
  10. Joshphberg, K., Pollack, J., Victoriano, J., &Gitig, O. (2003). Software piracy carries heavy cost for US. Intellectual Property & Technology Law Journal, 15(5), 22-23
  11. E. Levina and P. Bickel, “The Earth Mover’s Distance is the Mallows Distance: Some Insights from Statistics,” Proc. IEEE Int’l Conf. Computer Vision, vol. 2, 2001
  12. S. Cohen and L. Guibas, “The Earth Mover’s Distance under Transformation Sets,” Proc. IEEE Int’l Conf. Computer Vision, vol. 2, pp. 1076-1083, 1999
  13. “International software piracy: Analysis of key issues and impacts,” Inform. Syst. Res., vol. 9, no. 4, pp. 380–397, Dec. 1998
  14. I. Al-Jabri and A. Abdul-Gader, “Software copyright infringements: An exploratory study of the effects of individual and peer beliefs,” Omega, Int. J. Manage. Sci., vol. 25, no. 3, pp. 335–344, June 1997
  15. R. D. Gopal and G. L. Sanders, “Preventive and deterrent controls for software piracy,” J. Manage. Inform. Syst., vol. 13, no. 4, pp. 29–47, Spring 1997
  16. Cheng, H. K., Sims, R. R., &Teegen, H. (1997). To purchase or to pirate software: an empirical study. Journal of Management Information Systems, 13(4), 49-60
  17. M. Givon, V. Mahajan, and E. Muller, “Software piracy: Estimation of lost sales and the impact on software diffusion,” J. Marketing, vol. 59, no. 1, pp. 29–37, January 1995
  18. M. Fleming and G. Cottrell, “Categorization of faces using unsupervised feature extraction,” Proc. IJCNN-90, Vol. 2
  19. Yu Meng and Bernard Tiddeman, “Implementing the Scale Invariant Feature Transform (SIFT) Method”, Department of Computer Science University of St. Andrews
Index Terms

Computer Science
Information Sciences

Keywords

Piracy facial authentication face recognition anti-piracy key generation.