TY - GEN
T1 - Software protection against illegal copy using software watermarking
AU - Sotelo-Garrido, Mario
AU - Nakano-Miyatake, Mariko
AU - Sanchez-Perez, Gabriel
AU - Cedillo-Hernamdez, Manuel
AU - Perez-Meana, Hector
N1 - Publisher Copyright:
© 2017 The authors and IOS Press. All rights reserved.
PY - 2017
Y1 - 2017
N2 - In this paper, we propose software protection algorithm against illegal copy by unauthorized persons using software watermarking. In the proposed scheme, the software license information, related to the media access control (MAC) address and software product-key, is embedded into the software logotype image as a watermark sequence. At the first stage of the software execution, the watermark sequence is extracted from the logotype and compared with the current MAC address of the hardware devise. If the extracted MAC address differs from the hardware's MAC address, then the software displays a warning message related to the invalid license and finalizes its execution, otherwise the software continues its normal operation. The performance of the proposed scheme is analyzed from the difficulty of software piracy and reverse engineering points of view, and the evaluation results show the effectiveness of the proposed algorithm.
AB - In this paper, we propose software protection algorithm against illegal copy by unauthorized persons using software watermarking. In the proposed scheme, the software license information, related to the media access control (MAC) address and software product-key, is embedded into the software logotype image as a watermark sequence. At the first stage of the software execution, the watermark sequence is extracted from the logotype and compared with the current MAC address of the hardware devise. If the extracted MAC address differs from the hardware's MAC address, then the software displays a warning message related to the invalid license and finalizes its execution, otherwise the software continues its normal operation. The performance of the proposed scheme is analyzed from the difficulty of software piracy and reverse engineering points of view, and the evaluation results show the effectiveness of the proposed algorithm.
KW - LSB-Matching steganography
KW - License verification
KW - Media Access Control (MAC)
KW - Reverse engineering
KW - Software piracy
KW - Software watermarking
UR - http://www.scopus.com/inward/record.url?scp=85029215215&partnerID=8YFLogxK
U2 - 10.3233/978-1-61499-800-6-503
DO - 10.3233/978-1-61499-800-6-503
M3 - Contribución a la conferencia
T3 - Frontiers in Artificial Intelligence and Applications
SP - 503
EP - 511
BT - New Trends in Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 16th International Conference, SoMeT 2017
A2 - Fujita, Hamido
A2 - Selamat, Ali
A2 - Omatu, Sigeru
PB - IOS Press BV
T2 - 16th International Conference on New Trends in Intelligent Software Methodology Tools, and Techniques, SoMeT 2017
Y2 - 26 September 2017 through 28 September 2017
ER -