Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD)

These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scal...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of computer applications 2012-01, Vol.38 (7)
Hauptverfasser: Srinivas, B, Rao, Koduganti Venkata, Varma, P Suresh
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 7
container_start_page
container_title International journal of computer applications
container_volume 38
creator Srinivas, B
Rao, Koduganti Venkata
Varma, P Suresh
description These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scale, violating software license and leading to copyright infringement. Almost 50% software licenses are pirated accounting over 51.4 billion dollars loss globally. Piracy is killing many software businesses leading to drastic loss for software developers. Under these circumstances there is a need for anti-piracy methods. This paper discuss about a robust yet efficient method for avoiding software piracy. After introducing software piracy methods and general piracy activities carried out by pirates, a mechanism to validate authorized user using face identity is described. A vector based algorithm is explained which detects Facial features of authorized user and generates a user authentication key, which is used for validation during product activation.
doi_str_mv 10.5120/4702-6859
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1019640668</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1019640668</sourcerecordid><originalsourceid>FETCH-LOGICAL-p608-f603b6bd0bea90d2d081bc584c75a68177889555954e05fe63233964e0b09f653</originalsourceid><addsrcrecordid>eNpdjk1Lw0AQhhdRsNQe_AeLF-shOpvNfh2lSbXQYsDcwyaZaErc1GxS6L83qAdxLjPPy8PwEnLN4F6wEB4iBWEgtTBnZAZGiUBrrc7_3Jdk4f0epuEmlCaakTRtelueaIwDlkPTOWpdRdMej-i-cfSNe6Ovm3VGC-uxolOW2H54p7vuiP2tp3HjB-tKpMtkF99dkYvath4Xv3tOsnWSrZ6D7cvTZvW4DQ4SdFBL4IUsKijQGqjCCjQrSqGjUgkrNVNKayOEMCJCEDVKHnJu5AQFmFoKPifLn7eHvvsc0Q_5R-NLbFvrsBt9zoBNOkipJ_Xmn7rvxt5N5XLDtDKRUIZ_AdjFWqU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>918794579</pqid></control><display><type>article</type><title>Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD)</title><source>EZB Electronic Journals Library</source><creator>Srinivas, B ; Rao, Koduganti Venkata ; Varma, P Suresh</creator><creatorcontrib>Srinivas, B ; Rao, Koduganti Venkata ; Varma, P Suresh</creatorcontrib><description>These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scale, violating software license and leading to copyright infringement. Almost 50% software licenses are pirated accounting over 51.4 billion dollars loss globally. Piracy is killing many software businesses leading to drastic loss for software developers. Under these circumstances there is a need for anti-piracy methods. This paper discuss about a robust yet efficient method for avoiding software piracy. After introducing software piracy methods and general piracy activities carried out by pirates, a mechanism to validate authorized user using face identity is described. A vector based algorithm is explained which detects Facial features of authorized user and generates a user authentication key, which is used for validation during product activation.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/4702-6859</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Activation ; Algorithms ; Business ; Computer programs ; Facial ; Licenses ; Logic ; Software</subject><ispartof>International journal of computer applications, 2012-01, Vol.38 (7)</ispartof><rights>Copyright Foundation of Computer Science 2012</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Srinivas, B</creatorcontrib><creatorcontrib>Rao, Koduganti Venkata</creatorcontrib><creatorcontrib>Varma, P Suresh</creatorcontrib><title>Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD)</title><title>International journal of computer applications</title><description>These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scale, violating software license and leading to copyright infringement. Almost 50% software licenses are pirated accounting over 51.4 billion dollars loss globally. Piracy is killing many software businesses leading to drastic loss for software developers. Under these circumstances there is a need for anti-piracy methods. This paper discuss about a robust yet efficient method for avoiding software piracy. After introducing software piracy methods and general piracy activities carried out by pirates, a mechanism to validate authorized user using face identity is described. A vector based algorithm is explained which detects Facial features of authorized user and generates a user authentication key, which is used for validation during product activation.</description><subject>Activation</subject><subject>Algorithms</subject><subject>Business</subject><subject>Computer programs</subject><subject>Facial</subject><subject>Licenses</subject><subject>Logic</subject><subject>Software</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNpdjk1Lw0AQhhdRsNQe_AeLF-shOpvNfh2lSbXQYsDcwyaZaErc1GxS6L83qAdxLjPPy8PwEnLN4F6wEB4iBWEgtTBnZAZGiUBrrc7_3Jdk4f0epuEmlCaakTRtelueaIwDlkPTOWpdRdMej-i-cfSNe6Ovm3VGC-uxolOW2H54p7vuiP2tp3HjB-tKpMtkF99dkYvath4Xv3tOsnWSrZ6D7cvTZvW4DQ4SdFBL4IUsKijQGqjCCjQrSqGjUgkrNVNKayOEMCJCEDVKHnJu5AQFmFoKPifLn7eHvvsc0Q_5R-NLbFvrsBt9zoBNOkipJ_Xmn7rvxt5N5XLDtDKRUIZ_AdjFWqU</recordid><startdate>20120101</startdate><enddate>20120101</enddate><creator>Srinivas, B</creator><creator>Rao, Koduganti Venkata</creator><creator>Varma, P Suresh</creator><general>Foundation of Computer Science</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20120101</creationdate><title>Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD)</title><author>Srinivas, B ; Rao, Koduganti Venkata ; Varma, P Suresh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p608-f603b6bd0bea90d2d081bc584c75a68177889555954e05fe63233964e0b09f653</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Activation</topic><topic>Algorithms</topic><topic>Business</topic><topic>Computer programs</topic><topic>Facial</topic><topic>Licenses</topic><topic>Logic</topic><topic>Software</topic><toplevel>online_resources</toplevel><creatorcontrib>Srinivas, B</creatorcontrib><creatorcontrib>Rao, Koduganti Venkata</creatorcontrib><creatorcontrib>Varma, P Suresh</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Srinivas, B</au><au>Rao, Koduganti Venkata</au><au>Varma, P Suresh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD)</atitle><jtitle>International journal of computer applications</jtitle><date>2012-01-01</date><risdate>2012</risdate><volume>38</volume><issue>7</issue><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scale, violating software license and leading to copyright infringement. Almost 50% software licenses are pirated accounting over 51.4 billion dollars loss globally. Piracy is killing many software businesses leading to drastic loss for software developers. Under these circumstances there is a need for anti-piracy methods. This paper discuss about a robust yet efficient method for avoiding software piracy. After introducing software piracy methods and general piracy activities carried out by pirates, a mechanism to validate authorized user using face identity is described. A vector based algorithm is explained which detects Facial features of authorized user and generates a user authentication key, which is used for validation during product activation.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/4702-6859</doi></addata></record>
fulltext fulltext
identifier ISSN: 0975-8887
ispartof International journal of computer applications, 2012-01, Vol.38 (7)
issn 0975-8887
0975-8887
language eng
recordid cdi_proquest_miscellaneous_1019640668
source EZB Electronic Journals Library
subjects Activation
Algorithms
Business
Computer programs
Facial
Licenses
Logic
Software
title Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD)
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T21%3A57%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Piracy%20Detection%20and%20Prevention%20using%20SIFT%20based%20on%20Earth%20Mover's%20Distance%20(EMD)&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Srinivas,%20B&rft.date=2012-01-01&rft.volume=38&rft.issue=7&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/4702-6859&rft_dat=%3Cproquest%3E1019640668%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=918794579&rft_id=info:pmid/&rfr_iscdi=true