Home
Author Guide
Editor Guide
Reviewer Guide
Published Issues
Special Issue
Introduction
Special Issues List
Sections and Topics
Sections
Topics
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access
Copyright and Licensing
Preservation and Repository Policy
Publication Ethics
Editorial Process
Contact Us
General Information
ISSN:
1798-2340 (Online)
Frequency:
Monthly
DOI:
10.12720/jait
Indexing:
ESCI (Web of Science)
,
Scopus
,
CNKI
,
etc
.
Acceptance Rate:
19%
APC:
500 USD
Average Days to Accept:
135 days
Journal Metrics:
Impact Factor 2022: 1.0
3.1
2022
CiteScore
49th percentile
Powered by
Editor-in-Chief
Prof. Kin C. Yow
University of Regina, Saskatchewan, Canada
I'm delighted to serve as the Editor-in-Chief of
Journal of Advances in Information Technology
.
JAIT
is intended to reflect new directions of research and report latest advances in information technology. I will do my best to increase the prestige of the journal.
What's New
2024-03-28
Vol. 15, No. 3 has been published online!
2024-02-26
The papers published in Vol. 15, Nos. 1&2 have been registered with Crossref.
2024-02-26
Vol. 15, No. 2 has been published online!
Home
>
Published Issues
>
2019
>
Volume 10, No. 4, November 2019
>
Static Software Watermarking Using Graph-Reckoning: Piracy Control for Information Systems
Sohail Sarwar
1
, Muhammad Safyan
2
, Zia Ul Qayyum
1
, Muddassir Iqbal
3
, Yasir
4
, and Farrukh Latif
5
1. University of Gujrat, Pakistan
2. GC University Lahore, Pakistan
3. London South Bank University, England
4. Iqra University
5. Bahria University
Abstract
—Information Systems, as intellectual property, ensures potential earning of businesses that have been affected badly by software piracy. The impact of software piracy can be languished through different techniques such as obfuscation, birthmarks and watermarks etc. used to counter pirated software. A watermarking approach has been presented using data mining techniques. The watermark generation exploits the program constructs (as properties and their relations) in flow graphs. The watermarks generated are embedded in methods for keeping track of actual program ownership. The major advantage of proposed technique is its improved degree for piracy detection (at method level granularity). Also, the technique presented is more resilient to major attacks such as additive, distortive and removal attacks when compared with prevalent watermarking techniques.
Index Terms
—piracy, watermarking, graph mining, resilience
Cite: Sohail Sarwar, Muhammad Safyan, Zia Ul Qayyum, Muddassir Iqbal, Yasir, and Farrukh Latif, "Static Software Watermarking Using Graph-Reckoning: Piracy Control for Information Systems," Journal of Advances in Information Technology, Vol. 10, No. 4, pp. 165-168, November 2019. doi: 10.12720/jait.10.4.165-168
8-LC0026-巴基斯坦
PREVIOUS PAPER
Numerically Simulating the Solar System in Mathematica
NEXT PAPER
Last page