A Review of Software Watermarking

Authors

  • Sarah H. Mnkash Department of Computer Science, University of Technology, Baghdad, Iraq
  • Matheel E. Abdulmunem Department of Computer Science, University of Technology, Baghdad, Iraq

DOI:

https://doi.org/10.24996/ijs.2020.61.10.30

Keywords:

Software Watermarking, Attack of software watermarking, ROP algorithm

Abstract

The Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software, as an indicator of copyright ownership for this software. In this paper, the watermarked software will be explained in detail by defining the classification of watermarks software, models of attack, and methods used in software watermarking carried out by several researchers. It seems clearly that the method of ROP algorithm has given the highest accuracy results up to 100%

Downloads

Download data is not yet available.

Downloads

Published

2020-10-28

Issue

Section

Computer Science

How to Cite

A Review of Software Watermarking. (2020). Iraqi Journal of Science, 61(10), 2740-2750. https://doi.org/10.24996/ijs.2020.61.10.30

Similar Articles

1-10 of 794

You may also start an advanced similarity search for this article.