KEMBAR78
"Software Piracy Protection Using Machine Learning": Bachelor of Engineering | PDF | Copyright Infringement | Malware
0% found this document useful (0 votes)
149 views19 pages

"Software Piracy Protection Using Machine Learning": Bachelor of Engineering

Uploaded by

Janhavi Meshram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views19 pages

"Software Piracy Protection Using Machine Learning": Bachelor of Engineering

Uploaded by

Janhavi Meshram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

“Software Piracy Protection Using Machine Learning”

Report Submitted in partial fulfillment of the award of degree of


Bachelor of Engineering
(Computer Science & Engineering)

Submitted by:
Mansi Vikas Mate
Prachi Devaji Ghugal
Esha Anil Sangode
Nitu Ganesh Tembhare
B.E.VII sem Computer Science & Engineering
JIT, Nagpur

Guided by:
Ms. Priyanka Dudhe
Asst Prof. Computer Science & Engineering
JIT, Nagpur

Department of Computer Science & Engineering


Jhulelal Institute of Technology 2021-2022
CERTIFICATE
This is to certify that the report entitled “Software Piracy protection using machine learning” submitted to
the Rashtrasant Tukdoji Maharaj Nagpur University, Nagpur in partial fulfillment of the requirement for the
award of a degree of Bachelor of Engineering in Computer Science & Engineering. The record of the candidates
own work carried out under our supervision at the Department of computer Science and Engineering, Jhulelal
Institute of Technology, Nagpur during the academic year 2021-22. The matter embodied in this report is
original and has not been submitted for the award of any other degree.

Ms. Priyanka Dudhe


Asst Prof,CSE JIT
Project Guide

Mrs. Mona Mulchandani Dr. Narendra Bawane


HOD, CSE Principal
JIT, Nagpur JIT, Nagpur

Department of Computer Science & Engineering


Jhulelal Institute of Technology
Session 2021-22
DECLARATION

We hereby declare that the report titled “Software Piracy protection using machine learning” submitted
herein has been carried by us in the Department of Computer Science Engineering, Jhulelal Institute of
Technology, Nagpur. The work is original and has not been submitted earlier as a whole or in part for the award
of any degree / diploma at this or any other Institution / University.

Date:
Mansi Vikas Mate
Prachi Devaji Ghugal
Esha Anil Sangode
Nitu Ganesh Tembhare

B.E, Computer Science Engineering


JIT, Nagpur, India.

Department of Computer Science & Engineering


Jhulelal Institute of Technology
Session 2020-21
ACKNOWLEDGEMENT

We would like to take this opportunity to acknowledge our profound indebtedness and extend our deep sense
of gratitude to our respected guide Ms. Priyanka Dudhe, Department of Computer Science & Engg. For their
valuable guidance, profound advice and encouragement that has led to the successful completion of this project.
We are grateful to our respected HOD Ms. Mona Mulchandani, Department of Computer Science & Engg.
for her full cooperation and help. We also thank the staff members of the CSE department.
Our sincere thanks to respected Dr. Narendra Bawane, Principal, JIT, for providing the necessary facility to
carry out the work.
We would like to thank all the people who have directly and indirectly help us in the completion of project.
Finally we would like to express our deepest gratitude to our parents for encouraging through the progress in
the work.
INDEX
Title Page no
Certificate
Declaration
Acknowledgement
Abstract i
List of figures ii

CHAPTERS

1. INTRODUCTION………………………………………………….. 1
2. Literature survey………………………………………………. 2
3. PROBLEM STATEMENT AND OBJECTIVE …………………. 3
3.1 Problem Statement
3.2 Objectives
4. PROPOSED SYSTEM…………………………………………….. 4
5. FLOW CHART/DATA FLOW DIAGRAM……………………... 5
6. SOFTWARE & HARWARE REQUIREMENT………………… 7
7. IMPLEMENTATION …………………………………………….. 8
8. RESULTS ANALYSIS AND DISCUSSION…………………….. 10
9. CONCLUSION AND FUTURE SCOPE…………………………. 11
9.1 Conclusion
9.2 Scope for future work
10. REFERENCE ..………………..………………..…………….. 12
ABSTRACT

Software piracy has been major issue for software industries. Piracy has become so prevalent over the Internet
that poses a major threat to software product companies. With the help of malicious codes and programs,
hackers or an intruder can gain access to the system and steal the information. Software piracy by users is
generally believed to harm both software firms (through lower profits) and buying customers (through higher
prices). This project is intended to maintain software piracy protection and assures that it is being accessed only
by the authenticated users.

Now a day’s more number of users download the software without have the permission for the owner of the
software, however the software have the product key the unknown person also find the key and it’s used that
software. Our approach will use "MAC based authentication” and generate product key, It checks the product
key is corresponded MAC address which is unique on every machine. If it is correct the software is installing,
else the software is not installed to the system. In this system it only allows the authorized person.

i
LIST OF FIGURES

Figure number Figure name Page number


5.1 Data flow diagram 5
5.2 Procedural flow chart 6
7.1 User Registration page 8
7.2 User Login page 9

ii
1. INTRODUCTION

Software is a necessary requirement in today’s world of technological development. Software piracy becomes
major economic concern in today’s life hence software anti-piracy is important. Most of the computer users
today are aware that unauthorized use and duplication of software is illegal, many users show negligence
towards the importance of treating software as valuable Intellectual Property. [4] Piracy has become so
prevalent over the Internet that poses a major threat to software product companies. [1]
Pirated software being available on the Internet and economically weak people not being able to afford
software were the major reasons behind the increasing software piracy issue.[5]
Software piracy continues to gr o w g lo ba l l y because it is cheap and easy to copy. The effects of this
grew are devastating. With the help of malicious codes and programs, hackers or an intruder can gain access
to the system and steal the information. Software piracy involves the use or distribution of information
without having received expressed permission of the software author. Hence there arises a need to protect the
information and products from being plagiarized. [2]

This project is intended to maintain software copyright protection and assured that it is being accessed only
by the authenticated users. The major problems of software piracy are high risk of virus and malware
infection to the computer system which may results to harmful system security and data corruption among
others. The effect of piracy in software development industries has greatly increased which reduced it
efficacy. [3]

1
2. LITERATURE SURVEY
SR.NO TITLE REMARKS AUTHOR JOURNAL YEAR
NAME

1. Software Piracy: This finds out that awareness is the Afsana Applied 2020
Factors and most influential factor among Hossain Information
Profiling ethical standard, financial status and Technology and
payment method for involving into Innovation
piracy.

2. "Software Piracy This presented techniques involved Mrs. D. International 2019


Protection" protection of software piracy, Seema Dev Journal of Trend
Which leads to access software Aksatha in Scientific
only authorized person and prevent Research and
unauthorized access, This system Development
provides more security of the (ijtsrd)
software.
3. Software Piracy The main objective of this study is Rizuddin Journal of 2017
Detection Model to develop a classification model for sain Physics:
Using Ant Colony detecting software piracy tendency Conference
Optimization using a variant of ACO algorithm Series
Algorithm called the Ant-Miner.

4. Hidden Markov A hidden Markov model is trained Shabana Information 2015


Models for on the opcode sequences extracted Kazi Security Journal:
Software Piracy from these morphed copies and the A Global
Detection resulting trained model is used to Perspective
score suspect software to determine
its similarity to the base software

5. The impact of This studies that the impact of Salim ahemd The impact of 2014
piracy on software piracy on prominent and piracy on
prominent and non- non-prominent software developers prominent and
prominent software in markets based on a two-sided non-prominent
developers platform business. software
developers

2
3. PROBLEM STATEMENT AND OBJECTIVE
3.1 Problem Statement:

 Anyone could copy and distribute the software information if there software is not protected and thus
hackers can steal the copyright ownership.

 Pirated software often includes incomplete or damaged programs, which can function incorrectly and can
hurt the productivity of an organization.

3.2 Objectives:

 To protect the software’s ownership of copyrights.

 To prevent the information and product from being imitated.

 To prevent the software and source code being stealed by unauthorized user.

 To provide protection to the software from malicious codes which can implement virus in the system.

3
4. PROPOSED SYSTEM

The proposed system will be implemented with the help of machine learning algorithms which will give the
access to the software to only authorized users by checking product Id and browser Id. If unauthorized user try
to install the software then the software will crash and show the error on the landing page. It has the browser
ID concept in this system so that any other device cannot use the software without the proper authentication.
No other device can run the software because every device have different browser Id so their is no risk to the
software getting pirate.[1]

The owner of the software generates the product key of the corresponding downloaded software and it’s send
to the user. After receive the key, when the user installs the software to the system it asks the product key, the
user type that product key. It checks the product key is correct. If it is correct the software is installing, else
the software is not installed to the system. [3]

Two results are possible out of this situation:-

1) Valid : When the user install the software on his machine the PC Id reader will check the browser or MAC
id of that machine if it matches then the software will generate the unique user id. After that the software will
check the data if it matches then the software will install successfully.

2) Not valid : Without registration if a user try to install the same software on another machine then the values will
not match because the browser id of that machine is different for which the user is not registered and it will show an
error on landing page.

4
5. FLOW CHART / DATA FLOW DIAGRAM

5.1 Data flow diagram

As shown in fig. 5.1, the program will start after user registration. User have to register from the particular
machine on which the user want to install the software. After registration process machine will generate keys
and check for the required data which is necessary for the device. If the data matches all the required
conditions the machine will allow the authenticated user to install the software and if not then the software
will crash down and show an error as invalid device and come back on the landing page.

5
5.2 Procedural flow chart

As shown in fig 5.2, the user have to register on the device. After that the device will read the browser id and
generate unique user id. After that step the user have to login again with the same id and request for a serial
key which is provided by the device itself. Device will match all the required information and if all the
information is correct then it allows the user to use the software, and if any of the information or any key is
not getting matched then it will show an error message to the user.

6
6. SOFTWARE & HARDWARE REQUIREMENTS

6.1 Software Requirement:

 Windows Xp, Windows 7(ultimate, enterprise)

 Mysql 2005 , PHP

 Virtual studio 2008 , Sublime

 Bootstrap

6.2 Hardware requirements:

 Processor – i3

 Hard Disk – 5 GB

 Memory – 1GB RAM

7
7. IMPLEMENTATION

Module:

User Module :

In user Module the user first registers and fill all the required information like name, address, username,
and password to the web server.

Fig. 7.1 User Registration page

8
After completing the registration process the user can now login to the system with the correct
authentication.

Fig. 7.2 User Login page

9
8. RESULT ANALYSIS & DISCUSSION

Present study shows that 67.3% of people do use pirated software. The activation of the software is done by
using fake (illegal) cracks and other activation methods. Software companies are confronted with extremely
high losses due to the piracy of software. But with the help of piracy protection system they can prevent their
intellectual information and software ownership as well as copyrights.

This software piracy protection system will help the organizations to prevent their source codes, programs and
many more which results in reducing the number of crimes which were happened intentionally or
unintentionally by their employees or malicious insiders .

10
9. CONCLUSION AND FUTURE SCOPE

9.1 Conclusion:

Software Piracy Protection system give access to the software for only authorized person and prevent
unauthorized access, this system provides more security of the software. By implementing a security plan for
software protection, software developers gain the benefits of protection from piracy.

9.2 Future Scope:

 Tamper-proofing:

Some software programs have built-in protocols that cause the program to shut down and stop working if the
source code is tampered with or modified. Tamper-proofing prevents people from pirating the software
through the manipulation of the program’s code.

 Watermarking:

Watermarks, company logos or names are often placed on the software interfaces to indicate that products are
legitimately obtained and are not illegal copies.

11
10. REFERENCES

1) T. T. Moores and J. Dhaliwal, “A reversed context analysis of software piracy issues in


Singapore,” Information & Management, vol. 41, no. 8, pp. 1037–1042, 2004.

2) D. Curtis, “Software piracy and copyright protection,” in Proceedings of Wescon/94:


Idea/Microelectronics, pp. 199–203, New York, NY, USA, September 1994.

3) Mrs. D. Seema and Dev Aksatha, “Software piracy protection”, in International Journal of Trend in
Scientific Research and Development (IJTSRD), vol.3, April 2019

4) R. C. Rife, “Software piracy,” in Proceedings of Northcon/94 Conference Record, pp. 364–366, Seattle,
WA, USA, October 1994.

5) D. Banerjee, “Effect of piracy on innovation in the presence of network externalities,” Economic


Modelling, vol. 33, pp. 526–532, 2013.

12

You might also like