Research Article

Piracy Detection and Prevention using SIFT based on Earth Moverís Distance (EMD).

by  B.Srinivas, Dr.Koduganti Venkata Rao, Dr. P.Suresh Varma
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 38 - Issue 7
Published: January 2012
Authors: B.Srinivas, Dr.Koduganti Venkata Rao, Dr. P.Suresh Varma
10.5120/4702-6859
PDF

B.Srinivas, Dr.Koduganti Venkata Rao, Dr. P.Suresh Varma . Piracy Detection and Prevention using SIFT based on Earth Moverís Distance (EMD).. International Journal of Computer Applications. 38, 7 (January 2012), 35-41. DOI=10.5120/4702-6859

                        @article{ 10.5120/4702-6859,
                        author  = { B.Srinivas,Dr.Koduganti Venkata Rao,Dr. P.Suresh Varma },
                        title   = { Piracy Detection and Prevention using SIFT based on Earth Moverís Distance (EMD). },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 38 },
                        number  = { 7 },
                        pages   = { 35-41 },
                        doi     = { 10.5120/4702-6859 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A B.Srinivas
                        %A Dr.Koduganti Venkata Rao
                        %A Dr. P.Suresh Varma
                        %T Piracy Detection and Prevention using SIFT based on Earth Moverís Distance (EMD).%T 
                        %J International Journal of Computer Applications
                        %V 38
                        %N 7
                        %P 35-41
                        %R 10.5120/4702-6859
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scale, violating software license and leading to copyright infringement. Almost 50% software licenses are pirated accounting over 51.4 billion dollars loss globally. Piracy is killing many software businesses leading to drastic loss for software developers. Under these circumstances there is a need for anti-piracy methods. This paper discuss about a robust yet efficient method for avoiding software piracy. After introducing software piracy methods and general piracy activities carried out by pirates, a mechanism to validate authorized user using face identity is described. A vector based algorithm is explained which detects Facial features of authorized user and generates a user authentication key, which is used for validation during product activation.

References
  • Yawei Zhang, Lei Jin, Xiaojun Ye, ‚ÄúSoftware Piracy Prevention: Splitting on Client‚Äù, IEEE International Conference on Security Technology, December 13-15, 2008
  • Sivasubramanyam Y, Deepak RanjanShenoy, ‚ÄúComputer Hardware and System Software Concepts‚Äù Vol -1, Version 1.0, March 2007
  • Mikko T. Siponen, TeroVartiainen, ‚ÄúUnauthorized Copying of Software - An Empirical Study of Reasons For and Against‚Äù, SIGCAS Computers and Society, Volume 37, No. 1, June 2007, PP 30 -43
  • Petar Djekic, Claudia Loebbecke, ‚ÄúPreventing application software piracy: An empirical investigation of technical copy protections‚Äù, The Journal of Strategic Information System, Volume 16, Issue,June 2007, PP 173-186
  • B. Fu, G. Richard III and Y. Chen. Some New Approaches for Preventing Software tampering. In ACM SE, 06, Melbourne Florida, USA. 2006
  • Q. Yang and X.O. Tang, ‚ÄúRecent advances in subspace analysis for face recognition,‚Äù in Advances in Biometric Person Authentication, pp. 275‚Äì287. 2005
  • David G. Lowe. Distinctive image features from scale-invariant keypoints. International journal of computer vision, 60, 2004
  • Business Software Alliance. http://www.bsa.org
  • Ginger Myles, Christian Collberg. ‚ÄúDetecting Software Theft via Whole Program path Birthmarks.‚ÄùLNCS 3225, pp. 404-415, ISC 2004
  • Joshphberg, K., Pollack, J., Victoriano, J., &Gitig, O. (2003). Software piracy carries heavy cost for US. Intellectual Property & Technology Law Journal, 15(5), 22-23
  • E. Levina and P. Bickel, ‚ÄúThe Earth Mover‚Äôs Distance is the Mallows Distance: Some Insights from Statistics,‚Äù Proc. IEEE Int‚Äôl Conf. Computer Vision, vol. 2, 2001
  • S. Cohen and L. Guibas, ‚ÄúThe Earth Mover‚Äôs Distance under Transformation Sets,‚Äù Proc. IEEE Int‚Äôl Conf. Computer Vision, vol. 2, pp. 1076-1083, 1999
  • ‚ÄúInternational software piracy: Analysis of key issues and impacts,‚Äù Inform. Syst. Res., vol. 9, no. 4, pp. 380‚Äì397, Dec. 1998
  • I. Al-Jabri and A. Abdul-Gader, ‚ÄúSoftware copyright infringements: An exploratory study of the effects of individual and peer beliefs,‚Äù Omega, Int. J. Manage. Sci., vol. 25, no. 3, pp. 335‚Äì344, June 1997
  • R. D. Gopal and G. L. Sanders, ‚ÄúPreventive and deterrent controls for software piracy,‚Äù J. Manage. Inform. Syst., vol. 13, no. 4, pp. 29‚Äì47, Spring 1997
  • Cheng, H. K., Sims, R. R., &Teegen, H. (1997). To purchase or to pirate software: an empirical study. Journal of Management Information Systems, 13(4), 49-60
  • M. Givon, V. Mahajan, and E. Muller, ‚ÄúSoftware piracy: Estimation of lost sales and the impact on software diffusion,‚Äù J. Marketing, vol. 59, no. 1, pp. 29‚Äì37, January 1995
  • M. Fleming and G. Cottrell, ‚ÄúCategorization of faces using unsupervised feature extraction,‚Äù Proc. IJCNN-90, Vol. 2
  • Yu Meng and Bernard Tiddeman, ‚ÄúImplementing the Scale Invariant Feature Transform (SIFT) Method‚Äù, Department of Computer Science University of St. Andrews
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Piracy facial authentication face recognition anti-piracy key generation.

Powered by PhDFocusTM