A Review of Software Watermarking

  • Sarah H. Mnkash Department of Computer Science, University of Technology, Baghdad, Iraq
  • Matheel E. Abdulmunem Department of Computer Science, University of Technology, Baghdad, Iraq
Keywords: Software Watermarking, Attack of software watermarking, ROP algorithm

Abstract

The Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software, as an indicator of copyright ownership for this software. In this paper, the watermarked software will be explained in detail by defining the classification of watermarks software, models of attack, and methods used in software watermarking carried out by several researchers. It seems clearly that the method of ROP algorithm has given the highest accuracy results up to 100%

Published
2020-10-28
How to Cite
Mnkash, S. H., & Abdulmunem, M. E. (2020). A Review of Software Watermarking. Iraqi Journal of Science, 61(10), 2740-2750. https://doi.org/10.24996/ijs.2020.61.10.30
Section
Computer Science