Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4858
Title: | IP Core Steganography Using Switch Based Key-Driven Hash-Chaining and Encoding for Securing DSP Kernels Used in CE Systems |
Authors: | Rathor, Mahendra Sengupta, Anirban |
Keywords: | Clone cells;Cloning;Encoding (symbols);Intellectual property core;Signal encoding;Steganography;Design costs;Digital evidence;Digital signal processing (DSP);Encoding algorithms;Hardware accelerators;Hash chaining;Lower probabilities;State of the art;Digital signal processing |
Issue Date: | 2020 |
Publisher: | Institute of Electrical and Electronics Engineers Inc. |
Citation: | Rathor, M., & Sengupta, A. (2020). IP core steganography using switch based key-driven hash-chaining and encoding for securing DSP kernels used in CE systems. IEEE Transactions on Consumer Electronics, 66(3), 251-260. doi:10.1109/TCE.2020.3006050 |
Abstract: | Intellectual property (IP) core of digital signal processing (DSP) kernels act as hardware accelerators in consumer electronics (CE) systems. However due to rising threats of cloning and counterfeiting to an IP core, security remains an important subject of research for these hardware accelerators. This paper presents a novel key-driven hash-chaining based hardware steganography for securing such IP cores used in CE systems. The proposed approach is capable to implant secret invisible stego-marks in design using hash-chaining process that incorporates switches, strong large stego-keys, multiple encoding algorithms and hash blocks. The methodology proposed provides massive security against IP cloning and counterfeiting while incurring nominal design overhead (<0.3 %). The results of the proposed approach on comparison with state of the art indicated significantly stronger digital evidence (lower probability of co-incidence), stronger key size (in bits) and lower design cost using proposed stego-marks. Further, from an attacker's perspective, the proposed steganography increases an attacker's effort manifold during decoding the valid stego-key value (for generating/extracting original secret stego-mark), compared to existing approaches. © 1975-2011 IEEE. |
URI: | https://doi.org/10.1109/TCE.2020.3006050 https://dspace.iiti.ac.in/handle/123456789/4858 |
ISSN: | 0098-3063 |
Type of Material: | Journal Article |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: