Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/9742
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaurasia, Rahulen_US
dc.contributor.authorAnshul, Adityaen_US
dc.contributor.authorSengupta, Anirbanen_US
dc.contributor.authorGupta, Shikhaen_US
dc.date.accessioned2022-05-05T15:41:17Z-
dc.date.available2022-05-05T15:41:17Z-
dc.date.issued2022-
dc.identifier.citationChaurasia, R., Anshul, A., Sengupta, A., & Gupta, S. (2022). Palmprint biometric vs encrypted hash based digital signature for securing DSP cores used in CE systems. IEEE Consumer Electronics Magazine, doi:10.1109/MCE.2022.3153276en_US
dc.identifier.issn2162-2248-
dc.identifier.otherEID(2-s2.0-85125750471)-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/9742-
dc.identifier.urihttps://doi.org/10.1109/MCE.2022.3153276-
dc.description.abstractIn the prior articles of reusable intellectual property (IP) core, different facets of their threat models and defence mechanisms against IP Trojan and IP piracy have been presented. This article provides novel comparative perspective between the two security techniques viz. palmprint biometric based approach and encrypted-hash based digital signature approach for IP cores, integrated in Consumer Electronics (CE) systems. These reusable IP cores such as finite impulse response (FIR) filter used in audio devices, HD TVs etc., discrete cosine transform (DCT) core used in audio/image/video/compression, fast fourier transform (FFT) used in digital video broadcasting and JPEG-CODEC used in image/video compression of camera systems can be secured using the two security methodologies discussed in this article. These both approaches enable detective control against important security threats such as IP piracy, fraudulent claim of IP ownership, overproduction and IP counterfeiting. The article therefore contributes the following: (a) security comparison of security techniques on digital signal processing (DSP) IP cores in terms of probability of coincidence (Pc) and tamper tolerance (TT) (b) comparison between two security techniques in terms of its properties (c) end to end demonstration of the palmprint biometric security approach (d) design flow of the encrypted-hash based digital signature approach. IEEEen_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceIEEE Consumer Electronics Magazineen_US
dc.subjectAudio systems|Authentication|Biometrics|Computer crime|Cryptography|Digital signal processing|Digital television|Discrete cosine transforms|Electronic document identification systems|Fast Fourier transforms|FIR filters|Impulse response|Internet protocols|Multimedia systems|Network security|Tissue|Voice/data communication systems|Biometric (access control)|Electronics system|Encodings|Features extraction|Intellectual property network|Model mechanisms|Palmprint biometric|Processing core|Property networks|Threat modeling|Digital devicesen_US
dc.titlePalmprint Biometric vs Encrypted Hash based Digital Signature for Securing DSP Cores Used in CE systemsen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: