Download PDFOpen PDF in browser

Review of digital data protection using the traditional methods, steganography and cryptography

EasyChair Preprint no. 1676

8 pagesDate: October 16, 2019

Abstract

The following paper reviews software protection methods using the methods of steganography, cryptography to  safeguard  the running applications on pc  as well as mobile applications. The software applications these days gets most of the work done for professional use  as well as other purposes. The major issues faced by the software developer or publisher are of software piracy. All the major software these days are circulated and pirated through the internet. Thus using steganography other techniques the goal is to solve the problem of software piracy. The solutions for protecting software from getting pirated are stated in this paper.

Keyphrases: Blowfish, Ciphertext, data protection, database, edge detection, HDD, JSON, LSB(Least Significant Bit), MAC address, software developer, Steganography, Stego image, StegoDB, XOR

BibTeX entry
BibTeX does not have the right entry for preprints. This is a hack for producing the correct reference:
@Booklet{EasyChair:1676,
  author = {Chinmaya Dharmadhikari and Rejo Mathew},
  title = {Review of digital  data protection using the traditional methods, steganography and cryptography},
  howpublished = {EasyChair Preprint no. 1676},

  year = {EasyChair, 2019}}
Download PDFOpen PDF in browser