Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/11425
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chaurasia, Rahul | en_US |
dc.contributor.author | Sengupta, Anirban | en_US |
dc.date.accessioned | 2023-03-07T11:45:40Z | - |
dc.date.available | 2023-03-07T11:45:40Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | Chaurasia, R., & Sengupta, A. (2022). Symmetrical protection of ownership right's for IP buyer and IP vendor using facial biometric pairing. Paper presented at the Proceedings - 2022 IEEE International Symposium on Smart Electronic Systems, iSES 2022, 272-277. doi:10.1109/iSES54909.2022.00062 Retrieved from www.scopus.com | en_US |
dc.identifier.isbn | 979-8350399226 | - |
dc.identifier.other | EID(2-s2.0-85148107256) | - |
dc.identifier.uri | https://doi.org/10.1109/iSES54909.2022.00064 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/11425 | - |
dc.description.abstract | This paper presents a novel approach for the exploration of security-design cost tradeoff for signature-based security methodologies used for detective control against intellectual property (IP) piracy/counterfeiting for digital signal processing (DSP) IP cores. The proposed approach offers low-cost hardware design architectural solutions for secured IP cores using particle swarm optimization (PSO). In the proposed approach, three different hardware security methodologies such as IP facial biometrics, encrypted-hashing and IP watermarking have been integrated with the PSO framework for exploring the hardware architecture tradeoffs of security-design cost for different DSP applications. The results of the presented approach include (i) analysis of low-cost architectural resource configuration, (ii) impact of signature strength on security-design cost fitness value and (iii) register count of the DSP IP core and (iv) security parameter such as probability of co-incidence for various security methodologies for varying (scalable) signature strength. © 2022 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | Proceedings - 2022 IEEE International Symposium on Smart Electronic Systems, iSES 2022 | en_US |
dc.subject | Cost benefit analysis | en_US |
dc.subject | Intellectual property core | en_US |
dc.subject | Internet protocols | en_US |
dc.subject | Particle swarm optimization (PSO) | en_US |
dc.subject | Cost trade-off | en_US |
dc.subject | Design costs | en_US |
dc.subject | Digital signal processing security | en_US |
dc.subject | Hardware | en_US |
dc.subject | Hardware intellectual property | en_US |
dc.subject | Particle swarm | en_US |
dc.subject | Security design | en_US |
dc.subject | Security methodologies | en_US |
dc.subject | Swarm optimization | en_US |
dc.subject | Tradeoff | en_US |
dc.subject | Digital signal processing | en_US |
dc.title | Security Vs Design Cost of Signature Driven Security Methodologies for Reusable Hardware IP Core | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: