Software Investigate

Revolutionary Approach for Protecting the Software

Download now Free registration required

Executive Summary

In this paper a revolutionary approach to protect the software were discussed. Software watermarking techniques was discussed. The various types of watermarking techniques such as static software watermarking and dynamic software watermarking were given. At the end, a more mathematical approach fro embedding a given watermark into software using logical inference were briefed. In the advanced development of Internet, the software program can be transmitted from one location to another location. While the program is transmitted the attacker tries to conceal the contents of the program. A software program can migrate from machine to machine in a heterogeneous network.

  • Format: PDF
  • Size: 64.3 KB