Java']Java applets copy protection by steganography

被引:0
|
作者
Shirali-Shahreza, Mohammad [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Sci, Tehran, Iran
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Following the expansion of Internet, many software were produced that could launch through Internet without prior installation on computers. This included game software and software that deal with financial affairs. These softwares are mainly in Java language and can be found on web pages as Java Applets. Some software owners want that their products only able to execute through their own web pages so that no one could put them on other web pages. In this paper, a new method has been presented to protect Java Applets from copying by using "Steganography in HTML web pages" method. In this method, a special 8-character string is hidden in the HTML page by a secret key. The string and the secret key are put within the Java Applet. After execution, the Java Applet extracts data from the HTML page by using the secret key. If the extracted data is the same as the 8-letter string, we can be sure that the Java Applet lies in its original web page and no copying is taken place. This project is implemented by Java programming language.
引用
收藏
页码:388 / 391
页数:4
相关论文
共 50 条
  • [41] Spout: A transparent proxy for safe execution of Java']Java applets
    Chiueh, TC
    Sankaran, H
    Neogi, A
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2002, 20 (07) : 1426 - 1433
  • [42] Secure execution of Java']Java applets using a remote playground
    Malkhi, D
    Reiter, MK
    Rubin, AD
    1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 40 - 51
  • [43] Coping with denial of service due to malicious Java']Java applets
    Florio, MF
    Gorrieri, R
    Marchetti, G
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1645 - 1654
  • [44] A WWW environment for visualizing user interactions with Java']Java applets
    Stelovsky, J
    Crosby, ME
    DESIGN OF COMPUTING SYSTEMS: SOCIAL AND ERGONOMIC CONSIDERATIONS, 1997, 21 : 755 - 758
  • [45] Secure JAVA']JAVA applets and applications: Guidelines and lessons learnt from the JAVA']JAVA security model
    Bichindaritz, I
    Siadak, MF
    Jocom, J
    Moinpour, C
    Donaldson, G
    Bush, N
    Chapko, M
    Sullivan, KM
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 1999, : 1028 - 1028
  • [46] HoneyAgent: Detecting Malicious Java']Java Applets by Using Dynamic Analysis
    Gassen, Jan
    Chapman, Jonathan P.
    PROCEEDINGS OF THE 2014 9TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE), 2014, : 109 - 117
  • [47] Java applets for chemical reaction engineering
    Universidade Federal de Santa, Catarina, Florianopolis, Brazil
    Comput Appl Eng Educ, 2 (67-77):
  • [48] The WWWinda Orchestrator: A mechanism for coordinating distributed flocks of Java']Java applets
    Gutfreund, YS
    Nicol, JR
    MULTIMEDIA COMPUTING AND NETWORKING 1997, 1997, 3020 : 295 - 302
  • [49] Chromatic Patterns of Sounds Waves in Java']Java Applets Coloured Sounds
    Dragulin, Stela
    Sangeorzan, Livia
    Parpalea, Mircea
    RECENT ADVANCES IN ACOUSTICS & MUSIC, 2010, : 92 - +
  • [50] Developing Java']Java applets for Electrical Machine using beans technology
    Ho, W
    Banh, L
    Jeong, KY
    ICEMS 2003: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON ELECTRICAL MACHINES AND SYSTEMS, VOLS 1 AND 2, 2003, : 947 - 950