A public-key watermarking technique for IP designs

被引:45
|
作者
Abdel-Hamid, AT [1 ]
Tahar, S [1 ]
Aboulhamid, EM [1 ]
机构
[1] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
来源
DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS | 2005年
关键词
D O I
10.1109/DATE.2005.32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Sharing IP blocks in today's competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illegally redistributed by consumers, and consumers want assurances that the content they buy is legitimate. Recently, digital watermarking emerged as a candidate solution for copyright protection of IP blocks. In this paper, we propose a new approach for watermarking IP designs based on the embedding of the ownership proof as part of the IP design's FSM. The approach utilizes coinciding as well as, un-used transitions in the state transition graph of the design. Our approach increases the robustness of the watermark and allows a secure implementation, hence enabling the development of the first public-key IP watermarking scheme at the FSM level. We also defin evaluation criteria for our approach, and us experimental measures to prove its robustness.
引用
收藏
页码:330 / 335
页数:6
相关论文
共 50 条
  • [21] Physical unclonable functions and public-key CRYPTO for FPGA IP protection
    Guajardo, Jorge
    Kumar, Sandeep S.
    Schrijen, Geert-Jan
    Tuyls, Pim
    2007 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, VOLS 1 AND 2, 2007, : 189 - 195
  • [22] Application of Robust Public-key Watermarking in Coal Mining Information Construction Process
    Hu Yan-Jun
    Cao Xin-De
    Li Peng
    Li Fu-Gui
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL II, 2009, : 210 - 213
  • [23] A robust public-key watermarking algorithm based on contourlet transform and its application
    Hu Y.
    Wang G.
    Cao X.
    Yang L.
    Journal of Software, 2011, 6 (11 SPEC. ISSUE) : 2247 - 2254
  • [24] Applying public-key watermarking techniques in forensic imaging to preserve the authenticity of the evidence
    Yang, Wen-Chao
    Wen, Che-Yen
    Chen, Chung-Hao
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 278 - +
  • [25] Applying public-key watermarking techniques in forensic imaging to preserve the authenticity of the evidence
    National Central Police University, No. 56, Shujen Rd., Takang Village, Kueishan Hsiang, Taoyuan County
    33304, Taiwan
    不详
    TN
    37996, United States
    Lect. Notes Comput. Sci., 2008, (278-287):
  • [26] Public-Key Cryptanalysis
    Nguyen, Phong Q.
    RECENT TRENDS IN CRYPTOGRAPHY, 2009, 477 : 67 - 119
  • [27] PUBLIC-KEY SYSTEMS
    BRASSARD, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 325 : 20 - 39
  • [28] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [29] PUBLIC-KEY PATENT
    BENNETT, R
    BYTE, 1985, 10 (07): : 16 - 16
  • [30] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23