Open Access   Article Go Back

Development of an expected model for the protection of Copyright of software code using digital watermarking

H. Rastogi1 , B.K. Sharma2

  1. Research Scholar, Mewar University, Chittorgarh, Rajasthan, India.
  2. Department of MCA, AKG Engineering College, Ghaziabad, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 378-382, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.378382

Online published on May 31, 2018

Copyright © H. Rastogi, B.K. Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: H. Rastogi, B.K. Sharma, “Development of an expected model for the protection of Copyright of software code using digital watermarking,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.378-382, 2018.

MLA Style Citation: H. Rastogi, B.K. Sharma "Development of an expected model for the protection of Copyright of software code using digital watermarking." International Journal of Computer Sciences and Engineering 6.5 (2018): 378-382.

APA Style Citation: H. Rastogi, B.K. Sharma, (2018). Development of an expected model for the protection of Copyright of software code using digital watermarking. International Journal of Computer Sciences and Engineering, 6(5), 378-382.

BibTex Style Citation:
@article{Rastogi_2018,
author = {H. Rastogi, B.K. Sharma},
title = {Development of an expected model for the protection of Copyright of software code using digital watermarking},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {378-382},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1989},
doi = {https://doi.org/10.26438/ijcse/v6i5.378382}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.378382}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1989
TI - Development of an expected model for the protection of Copyright of software code using digital watermarking
T2 - International Journal of Computer Sciences and Engineering
AU - H. Rastogi, B.K. Sharma
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 378-382
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
874 398 downloads 274 downloads
  
  
           

Abstract

The research done in this paper aimed to develop a model for the protection of copyright of software using Digital Watermarking by providing a proper way for designing the software. Digital watermarking has now become the research area for the protection of intellectual property right. In this research paper, the technique of cryptography with a assigned key is implemented for the development of the model. This paper gives the procedure of the implementation of the technique.

Key-Words / Index Term

Copyright, Digital Watermarking, Algorithm, Encryption, Embedding, Detection

References

[1] S. E. Tsai, K. C. Liu, and S. M. Yang, “An Efficient Image Watermarking Method Based on Fast Discrete Cosine Transform Algorithm”, Hindwani-Mathematical Problems in Engineering, Volume 2017.
[2] Nisha, “Digital Watermarking Techniques: Review”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 7, Issue 1, 2017.
[3] Himanshu Rastogi, Dr. B.K.Sharma “A Study on Intellectual Property Right and Digital Watermarking”, International Journal of Advanced Research in Computer Science, Volume 8, No. 7, Page No 368-371, 2017.
[4] M. Jamal, S. Mudassar, F. S. Mehmood, M. R. Rehman, "Improved Consistency of Digital Image Watermarking Using RDWT and SVD", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.104-106, 2017
[5] S. Mudassar, M. Jamal, F. S. Mehmood, M. R. Rehman, "Resistance of Watermarked Image against Solidity Attacks", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.31-35, 2017
[6] Rajiv Vasudev,“A Review on Digital Image Watermarking and Its Techniques”, Journal of Image and Graphics, Vol. 4, No. 2, page no 150-153, 2016.[4]
[7] Maninder Kaur and Nirvair Neeru. “Digital Image Watermarking using New Combined Technique”, International Journal of Computer Applications, 145(2), page no 26-30, 2016.[5]
[8] Seizing Opportunity Through License Compliance: BSA Global Software Survey, MAY 2016[6]
[9] J. K. Ravan, T.C.Thanuja “Watermarking Technique for security”, International Conference on Recent Innovations in Engineering and Management, page no 721-725, 2016.[7]
[10] Sumedh P. Ingale et al, “Digital Watermarking Algorithm using DWT Technique”, International Journal of Computer Science and Mobile Computing, Vol.5 Issue.5, page no 01-09, 2016[8]
[11] Anuj Kumar Dwivedi, Dr. B. K. Sharma, Dr. A. K. Vyas,“Watermarking Techniques for Ownership Protection of Relational Databases”, International Journal of Emerging Technology and Advanced Engineering; ISSN 2250-2459 (Online), Volume 4, Special Issue 1, 2014 International Conference on Advanced Developments in Engineering and Technology (ICADET-14), INDIA. [9]
[12] Yogesh Awasthi, R.P.Agarwal, B.K. Sharma, “Intellectual Property Right Protection of Browser based Software through Watermarking Technique”, International Journal of Computer Application(IJCA), Volume 97– No.12, page no 32-36, 2014. [10]
[13] V. Kapoor, "A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013.
[14] Dr. B. K. Sharma, Dr. R. P. Agarwal, Dr. Raghuraj Singh, “An IPR of software codes using watermarking For Modular Programming”, ISST Journal of Mathematics & Computing System, Vol. 1 No.1, page no 55-58, 2010.[11]