Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/12014
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.contributor.authorRathor, Mahendraen_US
dc.date.accessioned2023-06-24T13:06:49Z-
dc.date.available2023-06-24T13:06:49Z-
dc.date.issued2022-
dc.identifier.citationSengupta, A., & Rathor, M. (2022). Hardware (IP) watermarking during behavioral synthesis. Behavioral synthesis for hardware security (pp. 119-145) doi:10.1007/978-3-030-78841-4_7 Retrieved from www.scopus.comen_US
dc.identifier.isbn9783030788414-
dc.identifier.isbn9783030788407-
dc.identifier.otherEID(2-s2.0-85158950853)-
dc.identifier.urihttps://doi.org/10.1007/978-3-030-78841-4_7-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/12014-
dc.description.abstractThe current generation of Consumer Electronics (CE) systems includes Digital Signal Processing (DSP) hardware as an essential constituent. Without these imperative data-intensive high-performance cores, much of the vital consumer applications including image/video/audio processing functions would not be possible in the modern electronic devices. Owing to the importance of such Intellectual Property (IP) cores, its security against standard threats cannot be undermined. Securing a DSP core against false claim of ownership and piracy is very crucial due to globalization aspect leading to multinational, distributed, and multi-step nature of Integrated Circuit (IC) design process, which in turn contributes toward vulnerability related to hardware trust. This chapter discusses the state-of-the-art approaches on hardware watermarking during behavioral synthesis as a solution to the aforesaid problem. This chapter presents various high-level synthesis-based techniques with emphasis on single-phase, triple-phase watermarking techniques, digital signature-based watermarking, binary encoding-based watermarking, and in-synthesis-based watermarking used for reusable IP cores (for DSP/multimedia applications). Demonstrative examples have been provided for illustrations of these approaches. The chapter also discusses algorithm used for generating low-cost optimal watermark during behavioral synthesis as well as the important threat scenarios and desirable properties necessary for IP watermarking. The chapter finally concludes with discussions on several case studies (DSP cores) in the context of some important watermarking techniques. © Springer Nature Switzerland AG 2022.en_US
dc.language.isoenen_US
dc.publisherSpringer International Publishingen_US
dc.sourceBehavioral Synthesis for Hardware Securityen_US
dc.subjectBehavioral synthesisen_US
dc.subjectDigital signal processing hardwareen_US
dc.subjectIntellectual propertyen_US
dc.subjectIP piracyen_US
dc.subjectSecurityen_US
dc.subjectWatermarkingen_US
dc.titleHardware (IP) Watermarking During Behavioral Synthesisen_US
dc.typeBook Chapteren_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: