{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:33:18Z","timestamp":1762867998546,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T00:00:00Z","timestamp":1574467200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T00:00:00Z","timestamp":1574467200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11042-019-08372-9","type":"journal-article","created":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T06:02:52Z","timestamp":1574488972000},"page":"2555-2576","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A robust software watermarking framework using shellcode"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9823-7465","authenticated-orcid":false,"given":"Ayan","family":"Dey","sequence":"first","affiliation":[]},{"given":"Shibashis","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Sukriti","family":"Bhattacharya","sequence":"additional","affiliation":[]},{"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,23]]},"reference":[{"key":"8372_CR1","unstructured":"Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on rgb indicator. Int J Signal Image Process 1(3)"},{"key":"8372_CR2","doi-asserted-by":"crossref","unstructured":"Ahmadoh E, Gutub AA-A (2015) Utilization of two diacritics for arabic text steganography to enhance performance. vol 3","DOI":"10.18178\/lnit.3.1.42-47"},{"key":"8372_CR3","unstructured":"Al-Nofaie S, Fattani M, Gutub A (2016) Capacity improved arabic text steganography technique utilizing \u2018kashida\u2019with whitespaces. In: The 3rd international conference on mathematical sciences and computer engineering (ICMSCE2016), pp 38\u201344"},{"issue":"3","key":"8372_CR4","doi-asserted-by":"publisher","first-page":"59","DOI":"10.20967\/jcscm.2016.03.004","volume":"6","author":"SM Al-Nofaie","year":"2016","unstructured":"Al-Nofaie SM, Fattani MM, Gutub AA-A (2016) Merging two steganography techniques adjusted to improve arabic text data security. Journal of Computer Science & Computational Mathematics (JCSCM) 6(3):59\u201365","journal-title":"Journal of Computer Science & Computational Mathematics (JCSCM)"},{"key":"8372_CR5","first-page":"118","volume":"3","author":"N Alanazi","year":"2018","unstructured":"Alanazi N, Alanizy A, Baghoza N, AlGhamdi M, Gutub A (2018) 3-layer pc text security via combining compression, aes cryptography 2lsb image steganography. J Res Eng Appl Sci 3:118\u2013124, 11","journal-title":"J Res Eng Appl Sci"},{"key":"8372_CR6","unstructured":"Aljuaid N, Gutub A (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory, (2): 151\u2013157, 06"},{"key":"8372_CR7","unstructured":"Aljuaid N, Gutub A (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. In: Proceedings of 2014 international conference on advanced engineering technologies, p 12"},{"key":"8372_CR8","unstructured":"Almazrooie M, Samsudin A, Gutub AA-A, Salleh MS, Omar MA, Hassan SA (2018) Integrity verification for digital holy quran verses using cryptographic hash function and compression. Journal of King Saud University - Computer and Information Sciences"},{"issue":"5","key":"8372_CR9","first-page":"28","volume":"10","author":"A Alrehily","year":"2018","unstructured":"Alrehily A, Thayananthan V (2018) Computer security and software watermarking based on return-oriented programming. Int J Comput Net Inf Secur (IJCNIS) 10 (5):28\u201336","journal-title":"Int J Comput Net Inf Secur (IJCNIS)"},{"key":"8372_CR10","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1016\/j.procs.2015.10.114","volume":"70","author":"CK Behera","year":"2015","unstructured":"Behera CK, Bhaskari DL (2015) Different obfuscation techniques for code protection. Procedia Comput Sci 70:757\u2013763","journal-title":"Procedia Comput Sci"},{"key":"8372_CR11","unstructured":"Chen Z, Wang Z, Jia C (2017) Semantic-integrated software watermarking with tamper-proofing. Multimed Tools Appl: 1\u201320"},{"key":"8372_CR12","doi-asserted-by":"crossref","unstructured":"Collberg C, Thomborson C (1999) Software watermarking: models and dynamic embeddings. In: Principles of programming lang. ACM, pp 311\u2013324","DOI":"10.1145\/292540.292569"},{"key":"8372_CR13","doi-asserted-by":"crossref","unstructured":"Cox IJ, Miller ML, Bloom JA (2000) Watermarking applications and their properties. In: Information technology: coding and computing. IEEE, pp 6\u201310","DOI":"10.1109\/ITCC.2000.844175"},{"key":"8372_CR14","unstructured":"Dey A, Bhattacharya S, Chaki N (2018) Software watermarking: progress and challenges. INAE Lett: 1\u201311"},{"key":"8372_CR15","doi-asserted-by":"crossref","unstructured":"Dey A, Dutta R, Bhattacharya S, Chaki Ns (2019) Shellmark: a robust software watermarking tool. In: Proceedings of the ACM India joint international conference on data science and management of data, CoDS-COMAD \u201919. New York, New York, pp 260\u2013264","DOI":"10.1145\/3297001.3297036"},{"issue":"2","key":"8372_CR16","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.jsis.2007.05.005","volume":"16","author":"P Djekic","year":"2007","unstructured":"Djekic P, Loebbecke C (2007) Preventing application software piracy: an empirical investigation of technical copy protections. J Strategic Inf Sys 16(2):173\u2013186","journal-title":"J Strategic Inf Sys"},{"key":"8372_CR17","unstructured":"Eight annual bsa and idc global software. http:\/\/globalstudy.bsa.org\/2010\/. (2010)"},{"key":"8372_CR18","doi-asserted-by":"crossref","unstructured":"Fratantonio Y, Kruegel C, Vigna G (2011) Shellzer: a tool for the dynamic analysis of malicious shellcode. In: International workshop on recent advances in intrusion detection. Springer, pp 61\u201380","DOI":"10.1007\/978-3-642-23644-0_4"},{"key":"8372_CR19","doi-asserted-by":"crossref","unstructured":"Gupta G, Pieprzyk J (2006) A low-cost attack on branch-based software watermarking schemes. In: Digital watermarking. Springer, pp 282\u2013293","DOI":"10.1007\/11922841_23"},{"key":"8372_CR20","first-page":"02","volume":"2","author":"A Gutub","year":"2010","unstructured":"Gutub A (2010) Pixel indicator technique for rgb image steganography. Journal of Emerging Technologies in Web Intelligence 2:02","journal-title":"Journal of Emerging Technologies in Web Intelligence"},{"key":"8372_CR21","first-page":"502","volume":"1","author":"A Gutub","year":"2007","unstructured":"Gutub A, Mohammad Fattani M (2007) A novel arabic text steganography method using letter points and extensions. International Journal of Computer, Electrical, Automation, Control and Information Engineering 1:502\u2013505, 01","journal-title":"International Journal of Computer, Electrical, Automation, Control and Information Engineering"},{"key":"8372_CR22","doi-asserted-by":"crossref","unstructured":"Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-a: secure rgb image steganography based on randomization. In: 2009 IEEE\/ACS international conference on computer systems and applications, pp 400\u2013403","DOI":"10.1109\/AICCSA.2009.5069356"},{"key":"8372_CR23","first-page":"48","volume":"2","author":"A Gutub","year":"2010","unstructured":"Gutub A, Al-Haidari F, Al-Kahsah KM, Hamodi J (2010) E-text watermarking: utilizing \u2019kashida\u2019 extensions in arabic language electronic writing. Journal of Emerging Technologies in Web Intelligence 2:48\u201355, 02","journal-title":"Journal of Emerging Technologies in Web Intelligence"},{"issue":"1","key":"8372_CR24","first-page":"89","volume":"37","author":"AA Gutub","year":"2010","unstructured":"Gutub AA, Ghouti LM, Elarian YS, Awaideh SM, Alvi AK (2010) Utilizing diacritic marks for arabic text steganography. Kuwait Journal of Science & Engineering (KJSE) 37(1):89\u2013109","journal-title":"Kuwait Journal of Science & Engineering (KJSE)"},{"issue":"1","key":"8372_CR25","first-page":"68","volume":"3","author":"AA-A Gutub","year":"2010","unstructured":"Gutub AA-A, Al-Alwani W, Mahfoodh AB (2010) Improved method of arabic text steganography using the extension \u2019kashida\u2019character. Bahria University Journal of Information & Communication Technology 3(1):68\u201372","journal-title":"Bahria University Journal of Information & Communication Technology"},{"key":"8372_CR26","doi-asserted-by":"crossref","unstructured":"Hamilton J, Danicic S (2011) A survey of static software watermarking. In: World congress on internet security. IEEE, pp 100\u2013107","DOI":"10.1109\/WorldCIS17046.2011.5749891"},{"key":"8372_CR27","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.infsof.2018.07.007","volume":"104","author":"S Hosseinzadeh","year":"2018","unstructured":"Hosseinzadeh S, Rauti S, Laur\u00e9n S, M\u00e4kel\u00e4 J-M, Holvitie J, Hyrynsalmi S, Lepp\u00e4nen V (2018) Diversification and obfuscation techniques for software security: a systematic literature review. Inf Softw Technol 104:72\u201393","journal-title":"Inf Softw Technol"},{"key":"8372_CR28","unstructured":"Khan F, Gutub A (2007) Message concealment techniques using image based steganography"},{"issue":"12","key":"8372_CR29","doi-asserted-by":"publisher","first-page":"3250","DOI":"10.1109\/TIT.2004.838101","volume":"50","author":"M Li","year":"2004","unstructured":"Li M, Chen X, Li X, Ma B, Vitanyi PMB (2004) The similarity metric. IEEE Trans Inf Theory 50(12):3250\u20133264","journal-title":"IEEE Trans Inf Theory"},{"issue":"9","key":"8372_CR30","doi-asserted-by":"publisher","first-page":"2323","DOI":"10.1093\/ietisy\/e91-d.9.2323","volume":"E91.D","author":"H-I Lim","year":"2008","unstructured":"Lim H-I, Park H, Choi S, Han T (2008) Detecting theft of java applications via a static birthmark based on weighted stack patterns. IEICE Trans Inf Sys E91.D (9):2323\u20132332","journal-title":"IEICE Trans Inf Sys"},{"issue":"9","key":"8372_CR31","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1016\/j.infsof.2009.04.011","volume":"51","author":"H-I Lim","year":"2009","unstructured":"Lim H-I, Park H, Choi S, Han T (2009) A method for detecting the theft of java programs through analysis of the control flow information. Inf Softw Technol 51 (9):1338\u20131350","journal-title":"Inf Softw Technol"},{"key":"8372_CR32","unstructured":"Mishra A, Kumar R, Chakrabarti P (2008) A method-based whole-program watermarking scheme for java class files. J Article"},{"key":"8372_CR33","doi-asserted-by":"crossref","unstructured":"Myles G, Collberg C (2005) K-gram based software birthmarks. In: Proceedings of the 2005 ACM symposium on applied computing, SAC \u201905. ACM, New York, pp 314\u2013318","DOI":"10.1145\/1066677.1066753"},{"key":"8372_CR34","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.cose.2017.06.003","volume":"74","author":"R Pizzolante","year":"2018","unstructured":"Pizzolante R, Castiglione A, Carpentieri B, De Santis A, Palmieri F, Castiglione A (2018) On the protection of consumer genomic data in the internet of living things. Comput Secur 74:384\u2013400","journal-title":"Comput Secur"},{"key":"8372_CR35","unstructured":"Seizing opportunity through license compliance. http:\/\/globalstudy.bsa.org\/2016\/. (2015)"},{"key":"8372_CR36","doi-asserted-by":"crossref","unstructured":"Sha Z, Jiang H, Xuan A (2009) Software watermarking algorithm by coefficients of equation. In: Genetic and evolutionary computing. Springer, pp 410\u2013413","DOI":"10.1109\/WGEC.2009.18"},{"key":"8372_CR37","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza M, Shirali-Shahreza S (2008) Software watermarking by equation reordering. In: Information and communication technologies: from theory to applications, (ICTTA 2008). IEEE","DOI":"10.1109\/ICTTA.2008.4530357"},{"key":"8372_CR38","unstructured":"Sion R, Atallah M, Prabhakar S (2002) On watermarking numeric sets. In: Digital watermarking. Springer, pp 130\u2013146"},{"key":"8372_CR39","doi-asserted-by":"crossref","unstructured":"Stern JP, Hachez G, Koeune F, Quisquater J-J (2000) Robust object watermarking: application to code. In: Information hiding. Springer, pp 368\u2013378","DOI":"10.1007\/10719724_25"},{"key":"8372_CR40","unstructured":"Tamada H, Okamoto K, Nakamura M, Monden A, Matsumoto K-I (2004) Dynamic software birthmarks to detect the theft of windows applications. In: Future software technology, vol 20"},{"issue":"9","key":"8372_CR41","doi-asserted-by":"publisher","first-page":"2148","DOI":"10.1093\/ietisy\/e88-d.9.2148","volume":"E88-D","author":"H Tamada","year":"2005","unstructured":"Tamada H, Nakamura M, Monden A, Matsumoto K-I (2005) Java birthmarks - detecting the software theft. IEICE Trans Inf Syst E88-D(9):2148\u20132158","journal-title":"IEICE Trans Inf Syst"},{"key":"8372_CR42","doi-asserted-by":"publisher","first-page":"8882","DOI":"10.1109\/ACCESS.2018.2810058","volume":"6","author":"Y Wang","year":"2018","unstructured":"Wang Y, Gong D, Lu B, Xiang F, Liu F (2018) Exception handling-based dynamic software watermarking. IEEE Access 6:8882\u20138889","journal-title":"IEEE Access"},{"key":"8372_CR43","doi-asserted-by":"crossref","unstructured":"Willison R, Siponen MT (2008) Software piracy: original insights from a criminological perspective. In: 41st Hawaii international conference on systems science (HICSS-41), p 266","DOI":"10.1109\/HICSS.2008.407"},{"key":"8372_CR44","doi-asserted-by":"crossref","unstructured":"Yong-Xia Z, Ge Z (2010) Md5 research. In: 2010 second international conference on multimedia and information technology, vol 2, pp 271\u2013273","DOI":"10.1109\/MMIT.2010.186"},{"key":"8372_CR45","unstructured":"Zhu WF (2007) Concepts and techniques in software watermarking and obfuscation. PhD thesis, ResearchSpace@ Auckland"},{"key":"8372_CR46","doi-asserted-by":"crossref","unstructured":"Zhu W, Thomborson C, Wang F-Y (2005) A survey of software watermarking. In: Intelligence and security informatics. Springer, pp 454\u2013458","DOI":"10.1007\/11427995_42"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08372-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08372-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08372-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,22]],"date-time":"2020-11-22T00:45:21Z","timestamp":1606005921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08372-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,23]]},"references-count":46,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["8372"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08372-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,11,23]]},"assertion":[{"value":"22 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}