Modern text hiding, text steganalysis, and applications: a comparative analysis

M Taleby Ahvanooey, Q Li, J Hou, AR Rajput, Y Chen - Entropy, 2019 - mdpi.com
Modern text hiding is an intelligent programming technique which embeds a secret
message/watermark into a cover text message/file in a hidden way to protect confidential …

Keysplitwatermark: Zero watermarking algorithm for software protection against cyber-attacks

C Iwendi, Z Jalil, AR Javed, T Reddy, R Kaluri… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-
jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the …

A comparative analysis of information hiding techniques for copyright protection of text documents

M Taleby Ahvanooey, Q Li, HJ Shim… - Security and …, 2018 - Wiley Online Library
With the ceaseless usage of web and other online services, it has turned out that copying,
sharing, and transmitting digital media over the Internet are amazingly simple. Since the text …

Software watermarking: Progress and challenges

A Dey, S Bhattacharya, N Chaki - INAE Letters, 2019 - Springer
In this paper, we present a brief survey on software watermarking methods that explains the
prospects and constraints of most software watermarking algorithms. We introduce a …

Text data security and privacy in the internet of things: threats, challenges, and future directions

U Khadam, MM Iqbal, M Alruily… - Wireless …, 2020 - Wiley Online Library
In our daily life, Internet‐of‐Things (IoT) is everywhere and used in many more beneficial
functionalities. It is used in our homes, hospitals, fire prevention, and reporting and …

Smartmark: Software watermarking scheme for smart contracts

T Kim, Y Jang, C Lee, H Koo… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
A smart contract is a self-executing program on a blockchain to ensure an immutable and
transparent agreement without the involvement of intermediaries. Despite its growing …

Softmark: software watermarking via a binary function relocation

H Kang, Y Kwon, S Lee, H Koo - … of the 37th Annual Computer Security …, 2021 - dl.acm.org
The ease of reproducibility of digital artifacts raises a growing concern in copyright
infringement; in particular, for a software product. Software watermarking is one of the …

CodeWMBench: An Automated Benchmark for Code Watermarking Evaluation

BL Wu, K Chen, Y He, G Chen, W Zhang… - Proceedings of the ACM …, 2024 - dl.acm.org
As deep learning progresses, programming language generation models such as
CodeLlama, GitHub Copilot, and ChatGPT have been widely applied to intelligent code …

Securing future autonomous applications using cyber-physical systems and the Internet of Things

S Sobana, SK Prabha, T Seerangurayar… - … of Research of …, 2022 - taylorfrancis.com
The application of internet of things (IoT) is not only in mobile devices and computer
applications but it also plays a virtual role in the industrial automations to interconnect smart …

Obfuscation-based watermarking for mobile service application copyright protection in the cloud

S Guang, F **, J Wangdong, L Fenghua… - IEEE …, 2019 - ieeexplore.ieee.org
The contributions of cloud computing in the prevention of software piracy are inadequate,
and there are still rampant piratical mobile service applications in the cloud. This paper …