Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/12565
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAnshul, Adityaen_US
dc.contributor.authorSengupta, Anirbanen_US
dc.date.accessioned2023-12-14T12:37:39Z-
dc.date.available2023-12-14T12:37:39Z-
dc.date.issued2023-
dc.identifier.citationAnshul, A., & Sengupta, A. (2023). Exploration of optimal crypto-chain signature embedded secure JPEG-CODEC hardware IP during high level synthesis. Microprocessors and Microsystems. Scopus. https://doi.org/10.1016/j.micpro.2023.104916en_US
dc.identifier.issn0141-9331-
dc.identifier.otherEID(2-s2.0-85168800430)-
dc.identifier.urihttps://doi.org/10.1016/j.micpro.2023.104916-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/12565-
dc.description.abstractThe design process of the JPEG-CODEC as a reusable hardware intellectual property (IP) core for electronic and multimedia systems involves conflicting design goals such as area and latency, alongside providing hardware security against IP piracy and false claims of IP ownership during high-level synthesis (HLS). The proposed work introduces the following novelties: (a) firefly algorithm (FFA)-driven design space exploration (DSE) for generating optimal design solution of secure JPEG-CODEC hardware IP design during HLS, (b) covert security constraints generation process based on key-driven crypto-chain driven hardware security methodology during performing area-latency tradeoff, (c) embedding process that integrates covert security constraints into the design of the JPEG-CODEC. The proposed approach enables the detection of IP piracy and false IP ownership claim. The proposed methodology obtains stronger tamper tolerance ability of &gten_US
dc.description.abstract∼10,116 times and enhanced digital evidence (probability of coincidence) of &gten_US
dc.description.abstract∼102 times than similar recent techniques at lesser design cost. Moreover, the proposed approach attains stronger entropy value of &gten_US
dc.description.abstract∼1078 times than similar recent techniques. © 2023 Elsevier B.V.en_US
dc.language.isoenen_US
dc.publisherElsevier B.V.en_US
dc.sourceMicroprocessors and Microsystemsen_US
dc.subjectCrypto-chainen_US
dc.subjectHardware securityen_US
dc.subjectHigh level synthesisen_US
dc.subjectIP piracyen_US
dc.subjectJPEG-CODECen_US
dc.titleExploration of optimal crypto-chain signature embedded secure JPEG-CODEC hardware IP during high level synthesisen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: