Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4858
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRathor, Mahendraen_US
dc.contributor.authorSengupta, Anirbanen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:46Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:46Z-
dc.date.issued2020-
dc.identifier.citationRathor, M., & Sengupta, A. (2020). IP core steganography using switch based key-driven hash-chaining and encoding for securing DSP kernels used in CE systems. IEEE Transactions on Consumer Electronics, 66(3), 251-260. doi:10.1109/TCE.2020.3006050en_US
dc.identifier.issn0098-3063-
dc.identifier.otherEID(2-s2.0-85087483243)-
dc.identifier.urihttps://doi.org/10.1109/TCE.2020.3006050-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4858-
dc.description.abstractIntellectual property (IP) core of digital signal processing (DSP) kernels act as hardware accelerators in consumer electronics (CE) systems. However due to rising threats of cloning and counterfeiting to an IP core, security remains an important subject of research for these hardware accelerators. This paper presents a novel key-driven hash-chaining based hardware steganography for securing such IP cores used in CE systems. The proposed approach is capable to implant secret invisible stego-marks in design using hash-chaining process that incorporates switches, strong large stego-keys, multiple encoding algorithms and hash blocks. The methodology proposed provides massive security against IP cloning and counterfeiting while incurring nominal design overhead (<0.3 %). The results of the proposed approach on comparison with state of the art indicated significantly stronger digital evidence (lower probability of co-incidence), stronger key size (in bits) and lower design cost using proposed stego-marks. Further, from an attacker's perspective, the proposed steganography increases an attacker's effort manifold during decoding the valid stego-key value (for generating/extracting original secret stego-mark), compared to existing approaches. © 1975-2011 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceIEEE Transactions on Consumer Electronicsen_US
dc.subjectClone cellsen_US
dc.subjectCloningen_US
dc.subjectEncoding (symbols)en_US
dc.subjectIntellectual property coreen_US
dc.subjectSignal encodingen_US
dc.subjectSteganographyen_US
dc.subjectDesign costsen_US
dc.subjectDigital evidenceen_US
dc.subjectDigital signal processing (DSP)en_US
dc.subjectEncoding algorithmsen_US
dc.subjectHardware acceleratorsen_US
dc.subjectHash chainingen_US
dc.subjectLower probabilitiesen_US
dc.subjectState of the arten_US
dc.subjectDigital signal processingen_US
dc.titleIP Core Steganography Using Switch Based Key-Driven Hash-Chaining and Encoding for Securing DSP Kernels Used in CE Systemsen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: