Development of an expected model for the protection of Copyright of software code using digital watermarking
DOI:
https://doi.org/10.26438/ijcse/v6i5.378382Keywords:
Copyright, Digital Watermarking, Algorithm, Encryption, Embedding, DetectionAbstract
The research done in this paper aimed to develop a model for the protection of copyright of software using Digital Watermarking by providing a proper way for designing the software. Digital watermarking has now become the research area for the protection of intellectual property right. In this research paper, the technique of cryptography with a assigned key is implemented for the development of the model. This paper gives the procedure of the implementation of the technique.
References
S. E. Tsai, K. C. Liu, and S. M. Yang, “An Efficient Image Watermarking Method Based on Fast Discrete Cosine Transform Algorithm”, Hindwani-Mathematical Problems in Engineering, Volume 2017.
Nisha, “Digital Watermarking Techniques: Review”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 7, Issue 1, 2017.
Himanshu Rastogi, Dr. B.K.Sharma “A Study on Intellectual Property Right and Digital Watermarking”, International Journal of Advanced Research in Computer Science, Volume 8, No. 7, Page No 368-371, 2017.
M. Jamal, S. Mudassar, F. S. Mehmood, M. R. Rehman, "Improved Consistency of Digital Image Watermarking Using RDWT and SVD", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.104-106, 2017
S. Mudassar, M. Jamal, F. S. Mehmood, M. R. Rehman, "Resistance of Watermarked Image against Solidity Attacks", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.31-35, 2017
Rajiv Vasudev,“A Review on Digital Image Watermarking and Its Techniques”, Journal of Image and Graphics, Vol. 4, No. 2, page no 150-153, 2016.[4]
Maninder Kaur and Nirvair Neeru. “Digital Image Watermarking using New Combined Technique”, International Journal of Computer Applications, 145(2), page no 26-30, 2016.[5]
Seizing Opportunity Through License Compliance: BSA Global Software Survey, MAY 2016[6]
J. K. Ravan, T.C.Thanuja “Watermarking Technique for security”, International Conference on Recent Innovations in Engineering and Management, page no 721-725, 2016.[7]
Sumedh P. Ingale et al, “Digital Watermarking Algorithm using DWT Technique”, International Journal of Computer Science and Mobile Computing, Vol.5 Issue.5, page no 01-09, 2016[8]
Anuj Kumar Dwivedi, Dr. B. K. Sharma, Dr. A. K. Vyas,“Watermarking Techniques for Ownership Protection of Relational Databases”, International Journal of Emerging Technology and Advanced Engineering; ISSN 2250-2459 (Online), Volume 4, Special Issue 1, 2014 International Conference on Advanced Developments in Engineering and Technology (ICADET-14), INDIA. [9]
Yogesh Awasthi, R.P.Agarwal, B.K. Sharma, “Intellectual Property Right Protection of Browser based Software through Watermarking Technique”, International Journal of Computer Application(IJCA), Volume 97– No.12, page no 32-36, 2014. [10]
V. Kapoor, "A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013.
Dr. B. K. Sharma, Dr. R. P. Agarwal, Dr. Raghuraj Singh, “An IPR of software codes using watermarking For Modular Programming”, ISST Journal of Mathematics & Computing System, Vol. 1 No.1, page no 55-58, 2010.[11]
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
