{"id":"https://openalex.org/W1986455346","doi":"https://doi.org/10.1145/2480362.2480673","title":"Protecting Android applications with steganography-based software watermarking","display_name":"Protecting Android applications with steganography-based software watermarking","publication_year":2013,"publication_date":"2013-03-18","ids":{"openalex":"https://openalex.org/W1986455346","doi":"https://doi.org/10.1145/2480362.2480673","mag":"1986455346"},"language":"en","primary_location":{"id":"doi:10.1145/2480362.2480673","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2480362.2480673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100831851","display_name":"Joonhyouk Jang","orcid":null},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Joonhyouk Jang","raw_affiliation_strings":["Seoul National University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Seoul National University, Seoul, Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040922425","display_name":"Hyunho Ji","orcid":null},"institutions":[{"id":"https://openalex.org/I141371507","display_name":"Soongsil University","ror":"https://ror.org/017xnm587","country_code":"KR","type":"education","lineage":["https://openalex.org/I141371507"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyunho Ji","raw_affiliation_strings":["Soongsil University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Soongsil University, Seoul, Korea","institution_ids":["https://openalex.org/I141371507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101602196","display_name":"Jiman Hong","orcid":"https://orcid.org/0000-0001-7937-6358"},"institutions":[{"id":"https://openalex.org/I141371507","display_name":"Soongsil University","ror":"https://ror.org/017xnm587","country_code":"KR","type":"education","lineage":["https://openalex.org/I141371507"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jiman Hong","raw_affiliation_strings":["Soongsil University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Soongsil University, Seoul, Korea","institution_ids":["https://openalex.org/I141371507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078529197","display_name":"Jinman Jung","orcid":"https://orcid.org/0000-0001-7818-9622"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jinman Jung","raw_affiliation_strings":["Seoul National University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Seoul National University, Seoul, Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100655990","display_name":"Dongkyun Kim","orcid":"https://orcid.org/0000-0002-1995-378X"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Dongkyun Kim","raw_affiliation_strings":["Kyungpook National University, Daegu, Korea","[Kyungpook National University, Daegu, Korea]"],"affiliations":[{"raw_affiliation_string":"Kyungpook National University, Daegu, Korea","institution_ids":["https://openalex.org/I31419693"]},{"raw_affiliation_string":"[Kyungpook National University, Daegu, Korea]","institution_ids":["https://openalex.org/I31419693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077603212","display_name":"Soon Ki Jung","orcid":"https://orcid.org/0000-0003-0239-6785"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Soon Ki Jung","raw_affiliation_strings":["Kyungpook National University, Daegu, Korea","[Kyungpook National University, Daegu, Korea]"],"affiliations":[{"raw_affiliation_string":"Kyungpook National University, Daegu, Korea","institution_ids":["https://openalex.org/I31419693"]},{"raw_affiliation_string":"[Kyungpook National University, Daegu, Korea]","institution_ids":["https://openalex.org/I31419693"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100831851"],"corresponding_institution_ids":["https://openalex.org/I139264467"],"apc_list":null,"apc_paid":null,"fwci":1.596,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.82669556,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1657","last_page":"1658"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.898412823677063},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8292118310928345},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7357680797576904},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7261099219322205},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6144540905952454},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.601608395576477},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5859910249710083},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5217472314834595},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.5146742463111877},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5108692049980164},{"id":"https://openalex.org/keywords/digital-watermarking-alliance","display_name":"Digital Watermarking Alliance","score":0.4530184268951416},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4384310841560364},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.43623360991477966},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4106205701828003},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3063845634460449},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16491875052452087}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.898412823677063},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8292118310928345},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7357680797576904},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7261099219322205},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6144540905952454},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.601608395576477},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5859910249710083},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5217472314834595},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.5146742463111877},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5108692049980164},{"id":"https://openalex.org/C193470923","wikidata":"https://www.wikidata.org/wiki/Q5276026","display_name":"Digital Watermarking Alliance","level":4,"score":0.4530184268951416},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4384310841560364},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43623360991477966},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4106205701828003},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3063845634460449},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16491875052452087},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2480362.2480673","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2480362.2480673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1489356009","https://openalex.org/W1520409399","https://openalex.org/W1538670717","https://openalex.org/W2086968222"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W2804412098","https://openalex.org/W2186632617","https://openalex.org/W2548321233","https://openalex.org/W2188948172","https://openalex.org/W2154118756"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,58],"propose":[4],"a":[5,42,47,56,60],"steganography-based":[6,65],"software":[7,15,30,68],"watermarking":[8,31,39,43],"scheme":[9,72],"to":[10,27],"protect":[11],"Android":[12],"applications":[13,53],"from":[14],"piracy.":[16],"Considering":[17],"the":[18,38,50,77,82],"resource":[19],"limitations":[20],"in":[21,33,41,49,67,81,85],"mobile":[22,34],"devices,":[23],"it":[24],"is":[25],"difficult":[26],"apply":[28],"previous":[29],"schemes":[32],"applications.":[35],"To":[36],"decrease":[37],"overhead":[40],"scheme,":[44],"such":[45],"as":[46],"slowdown":[48],"execution":[51],"of":[52,79],"after":[54],"embedding":[55],"watermark,":[57],"proposed":[59,71],"different":[61],"approach":[62],"that":[63],"applies":[64],"techniques":[66],"watermarking.":[69],"The":[70],"embeds":[73],"watermarks":[74],"by":[75],"reordering":[76],"sequence":[78],"instructions":[80],"basic":[83],"blocks":[84],"Dalvik":[86],"executable":[87],"files.":[88]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
