CFP last date
20 June 2024
Reseach Article

Intellectual Property Right Protection of Browser based Software through Watermarking Technique

by Yogesh Awasthi, R. P. Agarwal, B. K. Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 12
Year of Publication: 2014
Authors: Yogesh Awasthi, R. P. Agarwal, B. K. Sharma
10.5120/17061-7468

Yogesh Awasthi, R. P. Agarwal, B. K. Sharma . Intellectual Property Right Protection of Browser based Software through Watermarking Technique. International Journal of Computer Applications. 97, 12 ( July 2014), 32-36. DOI=10.5120/17061-7468

@article{ 10.5120/17061-7468,
author = { Yogesh Awasthi, R. P. Agarwal, B. K. Sharma },
title = { Intellectual Property Right Protection of Browser based Software through Watermarking Technique },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 12 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 32-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number12/17061-7468/ },
doi = { 10.5120/17061-7468 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:23:57.420468+05:30
%A Yogesh Awasthi
%A R. P. Agarwal
%A B. K. Sharma
%T Intellectual Property Right Protection of Browser based Software through Watermarking Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 12
%P 32-36
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the explosive growth of internet technology, many innovative web applications have been launched. For designing web applications Java has become a very popular programming language. Java bytecode technique makes it with high portability. However, it also poses large dangers to malicious users. Many techniques have been proposed for software copyright protection. They are useful for stand-alone Java applications. Due to special characteristics of Java web applications, copyright protection faces new challenge. In this paper, a copyright protection scheme for browser based Java applications have been introduced. The core of this scheme is a software watermarking algorithm. Code tamper-proofing and code obfuscation are also applied to watermarked Java code for better protection. The experimental results demonstrate the feasibility of the scheme.

References
  1. Business software alliance. http://www. bsa. org/.
  2. A. Monden, H. Iida, K. Matsumoto, K. Inoue, and K. Torii. A practical method for watermarking java programs. In Proceedings of the 24th Annual International Computer Software and Applications Conference, pages 191–197, Taipei, Taiwan, October 2000.
  3. C. Collberg and C. Thomborson. On the limits of software watermarking. Technical Report 164, August 1998.
  4. M. Atallah, H. Chang, T. Korb, and J. Rice. Software tamperproofing. CERIAS Conference, April 2001.
  5. D. Curran, N. J. Hurley, and M. O'Cinneide. Securing java through software watermarking. In Proceedings of the 2nd International Conference on Principles and Practice of Programming in Java, volume 42, pages 145 – 148, Kilkenny City, Ireland, 2003.
  6. C. Collberg, C. Thomborson, and D. Low. Breaking abstractions and unstructuring data structures. In Proceedings of 1998 International Conference on Computer Languages, pages 28–38, Chicago, IL, USA, may 1998.
  7. G. Naumovich and N. Memon. Preventing piracy, reverse engineering, and tampering. Computer, 36(7):6471, 2003. ISSN 0018-9162.
  8. B. K. Sharma, R. P. Agarwal & R. Singh "An IPR of software codes using Watermarking for Modular Programming", IJMCS, January- June -2010, PP 55 - 58
  9. R. Davidson and N. Myhrvold, "Method and system for generating and auditing a signature for a computer program," Jun. 1996, Microsoft Corporation, US Patent 5559884.
  10. P. R. Samson, "Apparatus and method for serializing and validating copies of computer software - US patent 5287408 full text," 1994. [Online]. Available: http://www. patentstorm. us/patents/5287408/fulltext. html
  11. C. Collberg and C. Thomborson, "On the limits of software watermarking," Tech. Rep. 164, Aug. 1998.
  12. A. kalinovsky, Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, Sams Publishing, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

web applications watermarking code obfuscation temper proofing bytecode.