Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/9742
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chaurasia, Rahul | en_US |
dc.contributor.author | Anshul, Aditya | en_US |
dc.contributor.author | Sengupta, Anirban | en_US |
dc.contributor.author | Gupta, Shikha | en_US |
dc.date.accessioned | 2022-05-05T15:41:17Z | - |
dc.date.available | 2022-05-05T15:41:17Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | Chaurasia, R., Anshul, A., Sengupta, A., & Gupta, S. (2022). Palmprint biometric vs encrypted hash based digital signature for securing DSP cores used in CE systems. IEEE Consumer Electronics Magazine, doi:10.1109/MCE.2022.3153276 | en_US |
dc.identifier.issn | 2162-2248 | - |
dc.identifier.other | EID(2-s2.0-85125750471) | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/9742 | - |
dc.identifier.uri | https://doi.org/10.1109/MCE.2022.3153276 | - |
dc.description.abstract | In the prior articles of reusable intellectual property (IP) core, different facets of their threat models and defence mechanisms against IP Trojan and IP piracy have been presented. This article provides novel comparative perspective between the two security techniques viz. palmprint biometric based approach and encrypted-hash based digital signature approach for IP cores, integrated in Consumer Electronics (CE) systems. These reusable IP cores such as finite impulse response (FIR) filter used in audio devices, HD TVs etc., discrete cosine transform (DCT) core used in audio/image/video/compression, fast fourier transform (FFT) used in digital video broadcasting and JPEG-CODEC used in image/video compression of camera systems can be secured using the two security methodologies discussed in this article. These both approaches enable detective control against important security threats such as IP piracy, fraudulent claim of IP ownership, overproduction and IP counterfeiting. The article therefore contributes the following: (a) security comparison of security techniques on digital signal processing (DSP) IP cores in terms of probability of coincidence (Pc) and tamper tolerance (TT) (b) comparison between two security techniques in terms of its properties (c) end to end demonstration of the palmprint biometric security approach (d) design flow of the encrypted-hash based digital signature approach. IEEE | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | IEEE Consumer Electronics Magazine | en_US |
dc.subject | Audio systems|Authentication|Biometrics|Computer crime|Cryptography|Digital signal processing|Digital television|Discrete cosine transforms|Electronic document identification systems|Fast Fourier transforms|FIR filters|Impulse response|Internet protocols|Multimedia systems|Network security|Tissue|Voice/data communication systems|Biometric (access control)|Electronics system|Encodings|Features extraction|Intellectual property network|Model mechanisms|Palmprint biometric|Processing core|Property networks|Threat modeling|Digital devices | en_US |
dc.title | Palmprint Biometric vs Encrypted Hash based Digital Signature for Securing DSP Cores Used in CE systems | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: