Java']Java applets copy protection by steganography

被引:0
|
作者
Shirali-Shahreza, Mohammad [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Sci, Tehran, Iran
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Following the expansion of Internet, many software were produced that could launch through Internet without prior installation on computers. This included game software and software that deal with financial affairs. These softwares are mainly in Java language and can be found on web pages as Java Applets. Some software owners want that their products only able to execute through their own web pages so that no one could put them on other web pages. In this paper, a new method has been presented to protect Java Applets from copying by using "Steganography in HTML web pages" method. In this method, a special 8-character string is hidden in the HTML page by a secret key. The string and the secret key are put within the Java Applet. After execution, the Java Applet extracts data from the HTML page by using the secret key. If the extracted data is the same as the 8-letter string, we can be sure that the Java Applet lies in its original web page and no copying is taken place. This project is implemented by Java programming language.
引用
收藏
页码:388 / 391
页数:4
相关论文
共 50 条
  • [1] Java applets copy protection by steganography
    Shirali-Shahreza, Mohammad
    [J]. Proc. Int. Conf. Intell. Inf. Hiding Multimedia Signal Process. IIH-MSP, 1600, (388-391):
  • [2] Java']Java applets in Ada
    Riehle, R
    [J]. JOURNAL OF OBJECT-ORIENTED PROGRAMMING, 1998, 11 (03): : 72 - 75
  • [3] Blocking Java']Java applets at the firewall
    Martin, DM
    Rajagopalan, S
    Rubin, AD
    [J]. 1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, PROCEEDINGS, 1997, : 16 - 26
  • [4] Web applets: Java']Java Java']JavaScript and ActiveX
    Stein, L
    [J]. TRENDS IN GENETICS, 1996, 12 (11) : 484 - 485
  • [5] Are Java']Java applets independent programs?
    Ball, S
    Crawford, JM
    [J]. DR DOBBS JOURNAL, 1999, 24 (04): : 101 - +
  • [6] Analysis of JAVA']JAVA security and hostile applets
    Brunnstein, K
    [J]. INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 293 - 295
  • [7] An infrastructure for network computing with Java']Java applets
    Baratloo, A
    Karaul, M
    Karl, H
    Kedem, ZM
    [J]. CONCURRENCY-PRACTICE AND EXPERIENCE, 1998, 10 (11-13): : 1029 - 1041
  • [8] Application of Java']Java applets in environmental engineering
    Kumar, A
    Kulkarni, A
    [J]. ENVIRONMENTAL PROGRESS, 1999, 18 (01): : A12 - A15
  • [9] Static Analysis of Malicious Java']Java Applets
    Ganesh, Nikitha
    Di Troia, Fabio
    Corrado, Visaggio Aaron
    Austin, Thomas H.
    Stamp, Mark
    [J]. IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, : 58 - 63
  • [10] Creating signed, persistent Java']Java Applets
    Brigner, P
    [J]. DR DOBBS JOURNAL, 1999, 24 (02): : 82 - +