Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/15192
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sengupta, Anirban | en_US |
dc.contributor.author | Anshul, Aditya | en_US |
dc.date.accessioned | 2024-12-24T05:20:10Z | - |
dc.date.available | 2024-12-24T05:20:10Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | Sengupta, A., & Anshul, A. (2024). High-level synthesis-based watermarking using crypto-chain signature framework. In A. Sengupta, High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection (pp. 137–166). Institution of Engineering and Technology. https://doi.org/10.1049/PBCS084E_ch6 | en_US |
dc.identifier.other | EID(2-s2.0-85211840842) | - |
dc.identifier.uri | https://doi.org/10.1049/PBCS084E_ch6 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/15192 | - |
dc.description.abstract | Designing reusable hardware intellectual property (IP) core (such as JPEG-CODEC) for multimedia/electronic systems involves managing competing design goals like latency and area during high-level synthesis (HLS). Additionally, it requires addressing the critical aspect of hardware security to prevent IP piracy and false IP ownership claim. This chapter discusses the generation of low-cost, secure IP design using the firefly algorithm (FA) based space exploration or design space exploration (DSE) and crypto-based watermarking (security) framework. The discussed crypto (key-driven) watermarking approach leads to the generation of watermarking constraints, which are further implanted into the hardware design through an HLS-based embedding process. This discussed low-cost security methodology facilitates IP piracy detection and resolution of false IP ownership assertion. © The Institution of Engineering and Technology and its licensors 2024. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institution of Engineering and Technology | en_US |
dc.source | High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection | en_US |
dc.title | High-level synthesis-based watermarking using crypto-chain signature framework | en_US |
dc.type | Book Chapter | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: