Research Article

Modelling Features-Based Birthmarks for Security of End-to-End Communication System

Figure 2

Case study for feature extractions and comparisons process of actual (original) and pirated software.