A public-key watermarking technique for IP designs

被引:45
|
作者
Abdel-Hamid, AT [1 ]
Tahar, S [1 ]
Aboulhamid, EM [1 ]
机构
[1] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
关键词
D O I
10.1109/DATE.2005.32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Sharing IP blocks in today's competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illegally redistributed by consumers, and consumers want assurances that the content they buy is legitimate. Recently, digital watermarking emerged as a candidate solution for copyright protection of IP blocks. In this paper, we propose a new approach for watermarking IP designs based on the embedding of the ownership proof as part of the IP design's FSM. The approach utilizes coinciding as well as, un-used transitions in the state transition graph of the design. Our approach increases the robustness of the watermark and allows a secure implementation, hence enabling the development of the first public-key IP watermarking scheme at the FSM level. We also defin evaluation criteria for our approach, and us experimental measures to prove its robustness.
引用
收藏
页码:330 / 335
页数:6
相关论文
共 50 条
  • [1] Watermarking Public-Key Cryptographic Primitives
    Goyal, Rishab
    Kim, Sam
    Manohar, Nathan
    Waters, Brent
    Wu, David J.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 367 - 398
  • [2] Public-Key Watermarking Schemes for Pseudorandom Functions
    Yang, Rupeng
    Yu, Zuoxia
    Au, Man Ho
    Susilo, Willy
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 637 - 667
  • [3] Fast public-key watermarking of compressed video
    Hartung, F
    Girod, B
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL I, 1997, : 528 - 531
  • [4] A public-key authentication watermarking for binary images
    Kim, HY
    de Queiroz, RL
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 3459 - 3462
  • [5] Security analysis of public-key watermarking schemes
    Craver, S
    Katzenbeisser, S
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 172 - 182
  • [6] A public-key based secure mobile IP
    Zao, J
    Kent, S
    Gahm, J
    Troxel, G
    Condell, M
    Helinek, P
    Yuan, N
    Castineyra, I
    WIRELESS NETWORKS, 1999, 5 (05) : 373 - 390
  • [7] Public-key watermarking algorithm resistant to geometric attacks
    State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2007, 4 (629-633):
  • [8] A public-key based watermarking for color image authentication
    Byun, SC
    Lee, IL
    Shin, TH
    Ahn, BH
    IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I AND II, PROCEEDINGS, 2002, : 593 - 596
  • [9] A Multipurpose Public-key Cryptosystem Based Image Watermarking
    Ding, Yu-Wen
    Lin, Zi
    Wang, Li
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12584 - 12587
  • [10] An improved attack analysis on a public-key spread spectrum watermarking
    Kesal, M
    Mihçak, MK
    Venkatesan, R
    MULTIMEDIA SYSTEMS, 2005, 11 (02) : 133 - 142