Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/15198
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.contributor.authorChaurasia, Rahulen_US
dc.date.accessioned2024-12-24T05:20:10Z-
dc.date.available2024-12-24T05:20:10Z-
dc.date.issued2024-
dc.identifier.citationSengupta, A., & Chaurasia, R. (2024). High-level synthesis-based watermarking using retinal biometrics. In A. Sengupta, High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection (pp. 47–85). Institution of Engineering and Technology. https://doi.org/10.1049/PBCS084E_ch3en_US
dc.identifier.otherEID(2-s2.0-85211850720)-
dc.identifier.urihttps://doi.org/10.1049/PBCS084E_ch3-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/15198-
dc.description.abstractThe chapter describes a high-level synthesis (HLS) driven methodology for designing secure hardware intellectual property (IP) cores using retinal biometrics (Chaurasia and Sengupta, 2023a, 2023b). In this methodology, firstly, the retinal biometrics of the original IP vendor is captured, which is subsequently exploited for extracting unique retinal features and generating the retinal digital template. The generated retinal template (binarized) is then encoded into its corresponding hardware security constraints using IP vendor-specified encoding algorithm. Next, these generated secret constraints are covertly embedded into the design during the register allocation phase of the HLS framework. The embedding process results in the retinal signature implanted hardware IP core design at the register transfer level (RTL). These embedded, retinal biometric-driven encoded security constraints serve as digital evidence, fortifying the IP core design against piracy by providing a detective countermeasure. Thus, HLS-driven hardware security methodology based on retinal biometrics enables robust and seamless detective control against pirated versions of the IP design, thereby enabling integration of authentic designs into the end system (through isolation of pirated/fake versions, not containing authentic IP vendor security mark). The rest of the chapter has been organized as follows: Section 3.1 provides the introduction of the chapteren_US
dc.description.abstractSection 3.2 outlines the benefits to both consumer and consumer electronics (CE) system designeren_US
dc.description.abstractSection 3.3 encapsulates the key highlights of the chapteren_US
dc.description.abstractSection 3.4 discusses prior similar works on biometrics and non-biometrics based hardware securityen_US
dc.description.abstractSection 3.5 delves into the realm of retinal biometrics-based hardware security and trusten_US
dc.description.abstractSection 3.6 elucidates the process of embedding security constraints, demonstrated through a case studyen_US
dc.description.abstractSection 3.7 shows detection of pirated IPs using retinal biometricen_US
dc.description.abstractSection 3.8 explores the security properties of retinal biometrics, emphasizing robust hardware securityen_US
dc.description.abstractSection 3.9 provides a detailed analysis and discussionen_US
dc.description.abstractand Section 3.10 concludes the chapter by summarizing the chapter’s findings and implications. © The Institution of Engineering and Technology and its licensors 2024.en_US
dc.language.isoenen_US
dc.publisherInstitution of Engineering and Technologyen_US
dc.sourceHigh-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protectionen_US
dc.titleHigh-level synthesis-based watermarking using retinal biometricsen_US
dc.typeBook Chapteren_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: