Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD)
These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scal...
Gespeichert in:
Veröffentlicht in: | International journal of computer applications 2012-01, Vol.38 (7) |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 7 |
container_start_page | |
container_title | International journal of computer applications |
container_volume | 38 |
creator | Srinivas, B Rao, Koduganti Venkata Varma, P Suresh |
description | These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scale, violating software license and leading to copyright infringement. Almost 50% software licenses are pirated accounting over 51.4 billion dollars loss globally. Piracy is killing many software businesses leading to drastic loss for software developers. Under these circumstances there is a need for anti-piracy methods. This paper discuss about a robust yet efficient method for avoiding software piracy. After introducing software piracy methods and general piracy activities carried out by pirates, a mechanism to validate authorized user using face identity is described. A vector based algorithm is explained which detects Facial features of authorized user and generates a user authentication key, which is used for validation during product activation. |
doi_str_mv | 10.5120/4702-6859 |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1019640668</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1019640668</sourcerecordid><originalsourceid>FETCH-LOGICAL-p608-f603b6bd0bea90d2d081bc584c75a68177889555954e05fe63233964e0b09f653</originalsourceid><addsrcrecordid>eNpdjk1Lw0AQhhdRsNQe_AeLF-shOpvNfh2lSbXQYsDcwyaZaErc1GxS6L83qAdxLjPPy8PwEnLN4F6wEB4iBWEgtTBnZAZGiUBrrc7_3Jdk4f0epuEmlCaakTRtelueaIwDlkPTOWpdRdMej-i-cfSNe6Ovm3VGC-uxolOW2H54p7vuiP2tp3HjB-tKpMtkF99dkYvath4Xv3tOsnWSrZ6D7cvTZvW4DQ4SdFBL4IUsKijQGqjCCjQrSqGjUgkrNVNKayOEMCJCEDVKHnJu5AQFmFoKPifLn7eHvvsc0Q_5R-NLbFvrsBt9zoBNOkipJ_Xmn7rvxt5N5XLDtDKRUIZ_AdjFWqU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>918794579</pqid></control><display><type>article</type><title>Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD)</title><source>EZB Electronic Journals Library</source><creator>Srinivas, B ; Rao, Koduganti Venkata ; Varma, P Suresh</creator><creatorcontrib>Srinivas, B ; Rao, Koduganti Venkata ; Varma, P Suresh</creatorcontrib><description>These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scale, violating software license and leading to copyright infringement. Almost 50% software licenses are pirated accounting over 51.4 billion dollars loss globally. Piracy is killing many software businesses leading to drastic loss for software developers. Under these circumstances there is a need for anti-piracy methods. This paper discuss about a robust yet efficient method for avoiding software piracy. After introducing software piracy methods and general piracy activities carried out by pirates, a mechanism to validate authorized user using face identity is described. A vector based algorithm is explained which detects Facial features of authorized user and generates a user authentication key, which is used for validation during product activation.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/4702-6859</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Activation ; Algorithms ; Business ; Computer programs ; Facial ; Licenses ; Logic ; Software</subject><ispartof>International journal of computer applications, 2012-01, Vol.38 (7)</ispartof><rights>Copyright Foundation of Computer Science 2012</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Srinivas, B</creatorcontrib><creatorcontrib>Rao, Koduganti Venkata</creatorcontrib><creatorcontrib>Varma, P Suresh</creatorcontrib><title>Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD)</title><title>International journal of computer applications</title><description>These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scale, violating software license and leading to copyright infringement. Almost 50% software licenses are pirated accounting over 51.4 billion dollars loss globally. Piracy is killing many software businesses leading to drastic loss for software developers. Under these circumstances there is a need for anti-piracy methods. This paper discuss about a robust yet efficient method for avoiding software piracy. After introducing software piracy methods and general piracy activities carried out by pirates, a mechanism to validate authorized user using face identity is described. A vector based algorithm is explained which detects Facial features of authorized user and generates a user authentication key, which is used for validation during product activation.</description><subject>Activation</subject><subject>Algorithms</subject><subject>Business</subject><subject>Computer programs</subject><subject>Facial</subject><subject>Licenses</subject><subject>Logic</subject><subject>Software</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNpdjk1Lw0AQhhdRsNQe_AeLF-shOpvNfh2lSbXQYsDcwyaZaErc1GxS6L83qAdxLjPPy8PwEnLN4F6wEB4iBWEgtTBnZAZGiUBrrc7_3Jdk4f0epuEmlCaakTRtelueaIwDlkPTOWpdRdMej-i-cfSNe6Ovm3VGC-uxolOW2H54p7vuiP2tp3HjB-tKpMtkF99dkYvath4Xv3tOsnWSrZ6D7cvTZvW4DQ4SdFBL4IUsKijQGqjCCjQrSqGjUgkrNVNKayOEMCJCEDVKHnJu5AQFmFoKPifLn7eHvvsc0Q_5R-NLbFvrsBt9zoBNOkipJ_Xmn7rvxt5N5XLDtDKRUIZ_AdjFWqU</recordid><startdate>20120101</startdate><enddate>20120101</enddate><creator>Srinivas, B</creator><creator>Rao, Koduganti Venkata</creator><creator>Varma, P Suresh</creator><general>Foundation of Computer Science</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20120101</creationdate><title>Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD)</title><author>Srinivas, B ; Rao, Koduganti Venkata ; Varma, P Suresh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p608-f603b6bd0bea90d2d081bc584c75a68177889555954e05fe63233964e0b09f653</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Activation</topic><topic>Algorithms</topic><topic>Business</topic><topic>Computer programs</topic><topic>Facial</topic><topic>Licenses</topic><topic>Logic</topic><topic>Software</topic><toplevel>online_resources</toplevel><creatorcontrib>Srinivas, B</creatorcontrib><creatorcontrib>Rao, Koduganti Venkata</creatorcontrib><creatorcontrib>Varma, P Suresh</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Srinivas, B</au><au>Rao, Koduganti Venkata</au><au>Varma, P Suresh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD)</atitle><jtitle>International journal of computer applications</jtitle><date>2012-01-01</date><risdate>2012</risdate><volume>38</volume><issue>7</issue><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scale, violating software license and leading to copyright infringement. Almost 50% software licenses are pirated accounting over 51.4 billion dollars loss globally. Piracy is killing many software businesses leading to drastic loss for software developers. Under these circumstances there is a need for anti-piracy methods. This paper discuss about a robust yet efficient method for avoiding software piracy. After introducing software piracy methods and general piracy activities carried out by pirates, a mechanism to validate authorized user using face identity is described. A vector based algorithm is explained which detects Facial features of authorized user and generates a user authentication key, which is used for validation during product activation.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/4702-6859</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0975-8887 |
ispartof | International journal of computer applications, 2012-01, Vol.38 (7) |
issn | 0975-8887 0975-8887 |
language | eng |
recordid | cdi_proquest_miscellaneous_1019640668 |
source | EZB Electronic Journals Library |
subjects | Activation Algorithms Business Computer programs Facial Licenses Logic Software |
title | Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD) |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T21%3A57%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Piracy%20Detection%20and%20Prevention%20using%20SIFT%20based%20on%20Earth%20Mover's%20Distance%20(EMD)&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Srinivas,%20B&rft.date=2012-01-01&rft.volume=38&rft.issue=7&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/4702-6859&rft_dat=%3Cproquest%3E1019640668%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=918794579&rft_id=info:pmid/&rfr_iscdi=true |