Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4520
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:34:45Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:34:45Z-
dc.date.issued2021-
dc.identifier.citationSengupta, A. (2021). Key-triggered hash-chaining-based encoded hardware steganography for securing DSP hardware accelerators. Secured hardware accelerators for DSP and image processing applications (pp. 279-314)en_US
dc.identifier.isbn9781839533068-
dc.identifier.otherEID(2-s2.0-85114585483)-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4520-
dc.description.abstractThis chapter describes a multi-encoding-driven key-triggered hash-chaining-based hardware steganography approach for securing digital signal processing (DSP) hardware accelerators which uses multiple layers of encoding and key-based parallel switch blocks (SBs) to drive multiple secure hash-chaining blocks in the algorithm. The presented approach is highly robust against fraud ownership claim and piracy threats. The chapter is organized as follows: Section 7.1 provides some introduction to the research problem, followed by some discussion on other selected approaches in Section 7.2; Section 7.3 describes the presented hash-chaining-based hardware steganography approach. Section 7.4 presents the design process of securing finite impulse response (FIR) filter using this hardware steganography process; Section 7.5 presents the KHC-stego tool of this corresponding key-triggered hash-chaining hardware steganography approach; Section 7.6 discusses the analysis on case studies; Section 7.7 concludes the chapter, while Section 7.8 presents some exercise for readers. © The Institution of Engineering and Technology 2021.en_US
dc.language.isoenen_US
dc.publisherInstitution of Engineering and Technologyen_US
dc.sourceSecured Hardware Accelerators for DSP and Image Processing Applicationsen_US
dc.titleKey-triggered hash-chaining-based encoded hardware steganography for securing DSP hardware acceleratorsen_US
dc.typeBook Chapteren_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: