Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/12014
Title: Hardware (IP) Watermarking During Behavioral Synthesis
Authors: Sengupta, Anirban
Rathor, Mahendra
Keywords: Behavioral synthesis;Digital signal processing hardware;Intellectual property;IP piracy;Security;Watermarking
Issue Date: 2022
Publisher: Springer International Publishing
Citation: Sengupta, A., & Rathor, M. (2022). Hardware (IP) watermarking during behavioral synthesis. Behavioral synthesis for hardware security (pp. 119-145) doi:10.1007/978-3-030-78841-4_7 Retrieved from www.scopus.com
Abstract: The current generation of Consumer Electronics (CE) systems includes Digital Signal Processing (DSP) hardware as an essential constituent. Without these imperative data-intensive high-performance cores, much of the vital consumer applications including image/video/audio processing functions would not be possible in the modern electronic devices. Owing to the importance of such Intellectual Property (IP) cores, its security against standard threats cannot be undermined. Securing a DSP core against false claim of ownership and piracy is very crucial due to globalization aspect leading to multinational, distributed, and multi-step nature of Integrated Circuit (IC) design process, which in turn contributes toward vulnerability related to hardware trust. This chapter discusses the state-of-the-art approaches on hardware watermarking during behavioral synthesis as a solution to the aforesaid problem. This chapter presents various high-level synthesis-based techniques with emphasis on single-phase, triple-phase watermarking techniques, digital signature-based watermarking, binary encoding-based watermarking, and in-synthesis-based watermarking used for reusable IP cores (for DSP/multimedia applications). Demonstrative examples have been provided for illustrations of these approaches. The chapter also discusses algorithm used for generating low-cost optimal watermark during behavioral synthesis as well as the important threat scenarios and desirable properties necessary for IP watermarking. The chapter finally concludes with discussions on several case studies (DSP cores) in the context of some important watermarking techniques. © Springer Nature Switzerland AG 2022.
URI: https://doi.org/10.1007/978-3-030-78841-4_7
https://dspace.iiti.ac.in/handle/123456789/12014
ISBN: 9783030788414
9783030788407
Type of Material: Book Chapter
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: