Download PDFOpen PDF in browserReview of digital data protection using the traditional methods, steganography and cryptographyEasyChair Preprint 16768 pages•Date: October 16, 2019AbstractThe following paper reviews software protection methods using the methods of steganography, cryptography to safeguard the running applications on pc as well as mobile applications. The software applications these days gets most of the work done for professional use as well as other purposes. The major issues faced by the software developer or publisher are of software piracy. All the major software these days are circulated and pirated through the internet. Thus using steganography other techniques the goal is to solve the problem of software piracy. The solutions for protecting software from getting pirated are stated in this paper. Keyphrases: Blowfish, Ciphertext, HDD, JSON, LSB(Least Significant Bit), MAC address, Steganography, Stego image, StegoDB, XOR, data protection, database, edge detection, software developer
|