Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4520
Title: Key-triggered hash-chaining-based encoded hardware steganography for securing DSP hardware accelerators
Authors: Sengupta, Anirban
Issue Date: 2021
Publisher: Institution of Engineering and Technology
Citation: Sengupta, A. (2021). Key-triggered hash-chaining-based encoded hardware steganography for securing DSP hardware accelerators. Secured hardware accelerators for DSP and image processing applications (pp. 279-314)
Abstract: This chapter describes a multi-encoding-driven key-triggered hash-chaining-based hardware steganography approach for securing digital signal processing (DSP) hardware accelerators which uses multiple layers of encoding and key-based parallel switch blocks (SBs) to drive multiple secure hash-chaining blocks in the algorithm. The presented approach is highly robust against fraud ownership claim and piracy threats. The chapter is organized as follows: Section 7.1 provides some introduction to the research problem, followed by some discussion on other selected approaches in Section 7.2; Section 7.3 describes the presented hash-chaining-based hardware steganography approach. Section 7.4 presents the design process of securing finite impulse response (FIR) filter using this hardware steganography process; Section 7.5 presents the KHC-stego tool of this corresponding key-triggered hash-chaining hardware steganography approach; Section 7.6 discusses the analysis on case studies; Section 7.7 concludes the chapter, while Section 7.8 presents some exercise for readers. © The Institution of Engineering and Technology 2021.
URI: https://dspace.iiti.ac.in/handle/123456789/4520
ISBN: 9781839533068
Type of Material: Book Chapter
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: