ABSTRACT
We can see in the present grown up information technology a large number of attacks have been created by the attackers. In this paper a brief discussion of various attacks on software were given finally we are given an introduction to the attacks that are possible on software watermarking, such as additive attack, subtractive attack, distortive attack, and recognition attack.
File
Version