Introduction to Water Marking and Tamper Proofing Tools for Software Protection Seminar Topic:
A defense against software piracy is watermarking, a process that helps to determine the origin of software. A defense against tampering is tamper-proofing, so that unauthorized modifications to software will result in nonfunctional code.
WATER MARKING GOALS:
– verify the owner of a digital image.
– detect forgeries of an original image.
– identify illegal copies of the image.
– Prevent unauthorized distribution.
BACKGROUND–MALICIOUS CLIENTS VS. MALICIOUS HOSTS
Computer security research was more concerned of protecting the benign host and its data from attacks of malicious client programs where job of security expert is to design and administer computer systems that will fulfill certain security requirements most of the time.
To defend itself and its data against a malicious client, a host will typically restrict the actions that the client is allowed to perform.
A benign client code may contain trade secrets or copyrighted material being threatened by the host on which it has been downloaded or installed. A malicious host attack typically takes the form of intellectual property violations. If the integrity of the client is violated, may lead financial losses to the owner of the client. Three types of attacks include software piracy, malicious reverse engineering, and tampering.
Software Piracy: It includes buying the software application making copies and selling illegally to unsuspecting customers.
Malicious Reverse Engineering: Decompilation and reusing of copies in his own application.
Tampering: With the digital container media content can be extracted. In the latter case, he can continue to enjoy the content for free or even resell it to a third party.
Download Latest CSE Seminar Topic on Water Marking and Tamper Proofing Tools for Software Protection .