300 research outputs found

    Hashing Based Software Watermarking for Source Code Files

    Get PDF
    Software is developed and delivered to clients as a routine part of software engineering life cycle . Software is quite an expensive entity. However various attacks are possible on software to make its illegal use. Different solutions are there to prevent piracy. Software watermarking embeds a watermark in the source code so that it is undetectable yet it proves the ownership of the developer. The technique has been tested for C++ source code files, however, it can be applicable on any other language. The proposed techniques scans the code for all possible constants, forms a hash sequence using MD5 algorithm that calculates the watermark and stores in Date & Watermark Value Repository (DWVR)

    Computer Methods and Programs in Biomedicine XXX (2013) XXX‐XXX 1 Effective Management of Medical Information through ROI-Lossless Fragile Image Watermarking Technique

    Get PDF
    In this article, we have proposed a blind, fragile and Region of Interest (ROI) lossless medical image watermarking (MIW) technique, providing an all-in-one solution tool to various medical data distribution and management issues like security, content authentication, safe archiving, controlled access retrieval and captioning etc. The proposed scheme combines lossless data compression and encryption technique to embed electronic health record (EHR)/DICOM metadata, image hash, indexing keyword, doctor identification code and tamper localization information in the medical images. Extensive experiments (both subjective and objective) were carried out to evaluate performance of the proposed MIW technique. The findings offer suggestive evidence that the proposed MIW scheme is an effective all-in-one solution tool to various issues of medical information management domain. Moreover, given its relative simplicity, the proposed scheme can be applied to the medical images to serve in many medical applications concerned with privacy protection, safety, and management etc. Keywords

    Multi Factor Authentication and IP Address Restriction based Question Paper Delivery System for Indian Universities

    Get PDF
    The traditional question paper delivery (QPD) procedure in Indian institutions is discussed in this paper with a focus on its downsides, including complexity, time requirements, security issues, environmental impact, and cost. This method is manual, which makes it prone to mistakes, rigid, and open to leaks and tampering, especially when it comes to the security of the exam questions. It also looks at security issues involving question paper leaks, highlighting ongoing difficulties in preserving the integrity and confidentiality of the Indian educational system. These occurrences highlight the requirement for a more reliable and secure QPD system.  In this paper workflow of the cloud-based software system is described in detail, with examples showing how it makes it easier to distribute safe exam papers and assures stakeholder accountability. Barcodes are integrated into the system, and their improved tracking, processing, and distribution of exam papers is highlighted. A cutting-edge cloud-based Question Paper Delivery System (OQPDS), which automates and streamlines the process of generating, distributing, and giving exams for Indian colleges, is the suggested cure. Modern security elements are used by the system, including two-step authentication, barcode-based data storage, data encryption during data transfer, IP address-based access restrictions, and time-based content delivery. The incorporation of these security elements enhances the overall security and efficiency of the QPD system. The proposed system's workflow is discussed in detail along with examples that demonstrate how it facilitates the distribution of secure exam papers and ensures stakeholder responsibility. The system incorporates barcodes, and its better distribution, processing, and tracking of exam papers is praised. The system's capacity to limit access based on IP addresses is described, along with how it might help with traceability and prevent unwanted access.  Additionally, the paper proposes watermarking to label test papers with the IP address of the testing facility, offering benefits including improved security, tamper detection, and traceability. It is highlighted that encryption is a key security tool for preserving data integrity, maintaining secrecy, and protecting against online dangers. Finally, the cloud-based Question Paper Delivery System is a solution to the security issues and inefficiencies of the current QPD system. This system intends to transform the examination procedure in Indian institutions by offering a more safe, effective, and transparent approach to question paper administration. It does this through contemporary security provisions and cutting-edge technology. This paper also discusses comparative analysis between traditional and proposed automated Question paper delivery system with respect to efficiency, security, cost reduction and flexibility

    Tamper detection in RFID tags, using, fragile watermarking

    Get PDF
    Security and privacy are one of the two primary concerns with RFID (Radio Frequency Identification) adoption. While the mainstream RFID research is focused on solving the privacy issues, this paper focuses on security issues in general and data tampering in particular. We specifically consider the issue of detecting data tampering on the RFID tags for applications such as data integrity management. To address this issue, we present a novel fragile watermarking scheme, which embeds a fragile watermark (or pattern) in the serial number partition of the RFID tag. This pattern is verified to identify whether or not the data on the RFID tags has been tampered with. The novelty of this watermarking scheme lies in the fact that we have applied watermarking technology to RFID tags; in comparison, most of the existing watermarking schemes are limited to images, or audio or video applications. We term this scheme TamDetect because it is a tamper detection solution. TamDetect is designed such that it can be easily plugged into existing RFID middleware applications. This proposal is one of the first works that integrates watermarking and RFID technologies together. This paper provides a detailed theoretical foundation for the TamDetect solution

    Online Software Copyright Protection Using Trust Platform Module and Database Watermarking

    Get PDF
    As the digital information can be copied and transmitted easily, new and novel methods for the investment safeguarding are highly important. Many software companies developed several ways to prevent their software from piracy but hackers are still working. Other companies have their own techniques, but they keep them for confidential. This paper utilizes the digital watermarking and the Trust Platform Module (TPM) to enhance software piracy protection and decrease the efforts costs to protect software copyrights. The paper conducts a new approach called Trust Platform Module and Database Watermarking (TPMDWM) which is developed to enhance the software copyright protection. The proposed approach combines the new technologies of Trust Platform Module with database watermarking, hash function, and advanced encryption standard to enhance software copyright protection and decrease the cost and loose of software revenues. As shown by results, TPMDWM can effectively prevent illegal copying, getting the software at installation or updating license. The results also show that TPMDWM approach does not affect the software code and control. In addition, TPMDWM decreases dongle cost and it can also be used for client identification
    corecore