Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4520
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sengupta, Anirban | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:34:45Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:34:45Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Sengupta, A. (2021). Key-triggered hash-chaining-based encoded hardware steganography for securing DSP hardware accelerators. Secured hardware accelerators for DSP and image processing applications (pp. 279-314) | en_US |
dc.identifier.isbn | 9781839533068 | - |
dc.identifier.other | EID(2-s2.0-85114585483) | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/4520 | - |
dc.description.abstract | This chapter describes a multi-encoding-driven key-triggered hash-chaining-based hardware steganography approach for securing digital signal processing (DSP) hardware accelerators which uses multiple layers of encoding and key-based parallel switch blocks (SBs) to drive multiple secure hash-chaining blocks in the algorithm. The presented approach is highly robust against fraud ownership claim and piracy threats. The chapter is organized as follows: Section 7.1 provides some introduction to the research problem, followed by some discussion on other selected approaches in Section 7.2; Section 7.3 describes the presented hash-chaining-based hardware steganography approach. Section 7.4 presents the design process of securing finite impulse response (FIR) filter using this hardware steganography process; Section 7.5 presents the KHC-stego tool of this corresponding key-triggered hash-chaining hardware steganography approach; Section 7.6 discusses the analysis on case studies; Section 7.7 concludes the chapter, while Section 7.8 presents some exercise for readers. © The Institution of Engineering and Technology 2021. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institution of Engineering and Technology | en_US |
dc.source | Secured Hardware Accelerators for DSP and Image Processing Applications | en_US |
dc.title | Key-triggered hash-chaining-based encoded hardware steganography for securing DSP hardware accelerators | en_US |
dc.type | Book Chapter | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: