Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/11423
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Anshul, Aditya | en_US |
dc.contributor.author | Sengupta, Anirban | en_US |
dc.date.accessioned | 2023-03-07T11:45:31Z | - |
dc.date.available | 2023-03-07T11:45:31Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | Anshul, A., & Sengupta, A. (2022). IP core protection of image processing filters with multi-level encryption and covert steganographic security constraints. Paper presented at the Proceedings - 2022 IEEE International Symposium on Smart Electronic Systems, iSES 2022, 83-88. doi:10.1109/iSES54909.2022.00028 Retrieved from www.scopus.com | en_US |
dc.identifier.isbn | 979-8350399226 | - |
dc.identifier.other | EID(2-s2.0-85148090304) | - |
dc.identifier.uri | https://doi.org/10.1109/iSES54909.2022.00028 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/11423 | - |
dc.description.abstract | Image processing-based hardware accelerators are extensively used in consumer electronics devices and applications. Image processing intellectual property (IP) cores such as blur filter, sharpening filter, laplace edge detection filter, etc., are some essential IP cores used in these image processing-based hardware accelerators. Security of these image processing IP cores is crucial as they perform critical real-world functions such as medical imagining, character recognition, etc. This paper presents a novel hardware security technique for IP core protection of image processing filters with multi-level encryption and steganographic security constraints. This paper presents signature-based hardware security methodology on image processing IP cores for the first time. Further, the paper presents embedding hardware security constraints generated with multi-level encryption and steganographic constraints on blur filter application using a high-level synthesis framework. The article also reports the design cost (in terms of delay and area) of the proposed methodology corresponding to different filters and a lower probability of coincidence, indicating the robustness of the proposed approach. © 2022 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | Proceedings - 2022 IEEE International Symposium on Smart Electronic Systems, iSES 2022 | en_US |
dc.subject | Character recognition | en_US |
dc.subject | High level synthesis | en_US |
dc.subject | Intellectual property core | en_US |
dc.subject | Internet protocols | en_US |
dc.subject | Medical imaging | en_US |
dc.subject | Consumer electronic devices | en_US |
dc.subject | Consumer electronics applications | en_US |
dc.subject | Hardware accelerators | en_US |
dc.subject | Image processing filters | en_US |
dc.subject | Images processing | en_US |
dc.subject | Multi-level encryption | en_US |
dc.subject | Multilevels | en_US |
dc.subject | Security constraint | en_US |
dc.subject | Steganographic security | en_US |
dc.subject | Steganographic security constraint | en_US |
dc.subject | Cryptography | en_US |
dc.title | IP Core Protection of Image Processing Filters with Multi-Level Encryption and Covert Steganographic Security Constraints | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: