Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Secured and Authenticated Sharing of Software Program

Print
PDF
IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012)
© 2012 by IJCA Journal
icwet2012 - Number 12
Year of Publication: 2012
Authors:
Madhavi Gangurde
Umashankar prasad
Ranvir Kumar
Prashant Prajapati

Madhavi Gangurde, Umashankar prasad, Ranvir Kumar and Prashant Prajapati. Article: Secured and Authenticated Sharing of Software Program. IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012) icwet(12):22-27, March 2012. Full text available. BibTeX

@article{key:article,
	author = {Madhavi Gangurde and Umashankar prasad and Ranvir Kumar and Prashant Prajapati},
	title = {Article: Secured and Authenticated Sharing of Software Program},
	journal = {IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012)},
	year = {2012},
	volume = {icwet},
	number = {12},
	pages = {22-27},
	month = {March},
	note = {Full text available}
}

Abstract

A new method for software program protection by information sharing & authentication technique is proposed. In this scheme we will share a secret source program among a group of participants. Each of them holds a camouflage programs to hide a share. Each camouflage program will hold a secret source program, thus resulting in stego-program. Each stego-program will still be compiled and executed to perform its original functionality. The security will be further enhanced by encrypting source program with secret key which not only can prevent the secret program from being recovered illegally but also can authenticate the stego -program provided by each participant. The secret program will only be recovered when all the participant supplies correct stego-program and correct key. During the recovery process we can check the stego-program have been tempered or not incidentally/ intentionally. This scheme can be applied to software programs for copyright protection, secret hiding in software program for covert channel, etc.

References

  • S. Lee, and W. H. Tsai, “Data hiding in emails and applications by unused ASCII control codes," Proceedings of 2007 National Computer Symposium, vol. 4, pp. 414-422, Taichung, Taiwan, Dec. 2007.
  • S. Lee, and W. H. Tsai, “Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes"
  • A. Shamir, “How to share a secret," Communications of the Association for Computing Machinery, vol. 22, no. 11, pp. 612-613, 1979.
  • S. Lee, and W. H. Tsai, “Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes," International Journal of Network Security, Vol.10, No.1, PP.1–10, Jan. 2010.
  • The IEEE website. [Online]. Available: http://www.ieee.org/