Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/12014
Title: | Hardware (IP) Watermarking During Behavioral Synthesis |
Authors: | Sengupta, Anirban Rathor, Mahendra |
Keywords: | Behavioral synthesis;Digital signal processing hardware;Intellectual property;IP piracy;Security;Watermarking |
Issue Date: | 2022 |
Publisher: | Springer International Publishing |
Citation: | Sengupta, A., & Rathor, M. (2022). Hardware (IP) watermarking during behavioral synthesis. Behavioral synthesis for hardware security (pp. 119-145) doi:10.1007/978-3-030-78841-4_7 Retrieved from www.scopus.com |
Abstract: | The current generation of Consumer Electronics (CE) systems includes Digital Signal Processing (DSP) hardware as an essential constituent. Without these imperative data-intensive high-performance cores, much of the vital consumer applications including image/video/audio processing functions would not be possible in the modern electronic devices. Owing to the importance of such Intellectual Property (IP) cores, its security against standard threats cannot be undermined. Securing a DSP core against false claim of ownership and piracy is very crucial due to globalization aspect leading to multinational, distributed, and multi-step nature of Integrated Circuit (IC) design process, which in turn contributes toward vulnerability related to hardware trust. This chapter discusses the state-of-the-art approaches on hardware watermarking during behavioral synthesis as a solution to the aforesaid problem. This chapter presents various high-level synthesis-based techniques with emphasis on single-phase, triple-phase watermarking techniques, digital signature-based watermarking, binary encoding-based watermarking, and in-synthesis-based watermarking used for reusable IP cores (for DSP/multimedia applications). Demonstrative examples have been provided for illustrations of these approaches. The chapter also discusses algorithm used for generating low-cost optimal watermark during behavioral synthesis as well as the important threat scenarios and desirable properties necessary for IP watermarking. The chapter finally concludes with discussions on several case studies (DSP cores) in the context of some important watermarking techniques. © Springer Nature Switzerland AG 2022. |
URI: | https://doi.org/10.1007/978-3-030-78841-4_7 https://dspace.iiti.ac.in/handle/123456789/12014 |
ISBN: | 9783030788414 9783030788407 |
Type of Material: | Book Chapter |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: