Review of Digital Data Protection Using the Traditional Methods, Steganography and Cryptography

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The following paper reviews software protection methods by using the methods of steganography, cryptography to safeguard the running applications on pc as well as mobile applications. The software applications these days gets most of the work done for professional use as well as other purposes. The major issues faced by the software developer or publisher are of software piracy. All the major software these days are circulated and pirated through the internet. Thus using steganography and other techniques the goal is to solve the problem of software piracy. The solutions for protecting software from getting pirated are stated in this paper.

Cite

CITATION STYLE

APA

Dharmadhikari, C. M., & Mathew, R. (2020). Review of Digital Data Protection Using the Traditional Methods, Steganography and Cryptography. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 49, pp. 474–483). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-43192-1_54

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free