Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/11423
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAnshul, Adityaen_US
dc.contributor.authorSengupta, Anirbanen_US
dc.date.accessioned2023-03-07T11:45:31Z-
dc.date.available2023-03-07T11:45:31Z-
dc.date.issued2022-
dc.identifier.citationAnshul, A., & Sengupta, A. (2022). IP core protection of image processing filters with multi-level encryption and covert steganographic security constraints. Paper presented at the Proceedings - 2022 IEEE International Symposium on Smart Electronic Systems, iSES 2022, 83-88. doi:10.1109/iSES54909.2022.00028 Retrieved from www.scopus.comen_US
dc.identifier.isbn979-8350399226-
dc.identifier.otherEID(2-s2.0-85148090304)-
dc.identifier.urihttps://doi.org/10.1109/iSES54909.2022.00028-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/11423-
dc.description.abstractImage processing-based hardware accelerators are extensively used in consumer electronics devices and applications. Image processing intellectual property (IP) cores such as blur filter, sharpening filter, laplace edge detection filter, etc., are some essential IP cores used in these image processing-based hardware accelerators. Security of these image processing IP cores is crucial as they perform critical real-world functions such as medical imagining, character recognition, etc. This paper presents a novel hardware security technique for IP core protection of image processing filters with multi-level encryption and steganographic security constraints. This paper presents signature-based hardware security methodology on image processing IP cores for the first time. Further, the paper presents embedding hardware security constraints generated with multi-level encryption and steganographic constraints on blur filter application using a high-level synthesis framework. The article also reports the design cost (in terms of delay and area) of the proposed methodology corresponding to different filters and a lower probability of coincidence, indicating the robustness of the proposed approach. © 2022 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceProceedings - 2022 IEEE International Symposium on Smart Electronic Systems, iSES 2022en_US
dc.subjectCharacter recognitionen_US
dc.subjectHigh level synthesisen_US
dc.subjectIntellectual property coreen_US
dc.subjectInternet protocolsen_US
dc.subjectMedical imagingen_US
dc.subjectConsumer electronic devicesen_US
dc.subjectConsumer electronics applicationsen_US
dc.subjectHardware acceleratorsen_US
dc.subjectImage processing filtersen_US
dc.subjectImages processingen_US
dc.subjectMulti-level encryptionen_US
dc.subjectMultilevelsen_US
dc.subjectSecurity constrainten_US
dc.subjectSteganographic securityen_US
dc.subjectSteganographic security constrainten_US
dc.subjectCryptographyen_US
dc.titleIP Core Protection of Image Processing Filters with Multi-Level Encryption and Covert Steganographic Security Constraintsen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: