A public-key watermarking technique for IP designs

被引:45
|
作者
Abdel-Hamid, AT [1 ]
Tahar, S [1 ]
Aboulhamid, EM [1 ]
机构
[1] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
来源
DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS | 2005年
关键词
D O I
10.1109/DATE.2005.32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Sharing IP blocks in today's competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illegally redistributed by consumers, and consumers want assurances that the content they buy is legitimate. Recently, digital watermarking emerged as a candidate solution for copyright protection of IP blocks. In this paper, we propose a new approach for watermarking IP designs based on the embedding of the ownership proof as part of the IP design's FSM. The approach utilizes coinciding as well as, un-used transitions in the state transition graph of the design. Our approach increases the robustness of the watermark and allows a secure implementation, hence enabling the development of the first public-key IP watermarking scheme at the FSM level. We also defin evaluation criteria for our approach, and us experimental measures to prove its robustness.
引用
收藏
页码:330 / 335
页数:6
相关论文
共 50 条
  • [31] Public-key steganography
    von Ahn, L
    Hopper, NJ
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 323 - 341
  • [32] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [33] A new public-key authentication watermarking for binary document images resistant to parity attacks
    Kim, HY
    2005 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), VOLS 1-5, 2005, : 1321 - 1324
  • [34] On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking
    Katzenbeisser, S
    12TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2001, : 815 - 819
  • [35] New public-key authentication watermarking for JBIG2 resistant to parity attacks
    Pamboukian, SVD
    Kim, HY
    DIGITAL WATERMARKING, PROCEEDINGS, 2005, 3710 : 286 - 298
  • [36] An efficient public-key framework
    Zhou, JY
    Bao, F
    Deng, R
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 88 - 99
  • [37] A Complete Public-Key Cryptosystem
    Grigoriev, Diva
    Hirsch, Edward A.
    Pervyshev, Konstantin
    GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (01) : 1 - 12
  • [38] The cubic public-key transformation
    Kak, Subhash
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2007, 26 (03) : 353 - 359
  • [39] Coalition public-key cryptosystems
    Anisimov A.V.
    Cybernetics and Systems Analysis, 2001, 37 (1) : 1 - 12
  • [40] THE ADOLESCENCE OF PUBLIC-KEY CRYPTOGRAPHY
    DIFFIE, W
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 2 - 2