A public-key watermarking technique for IP designs

被引:45
|
作者
Abdel-Hamid, AT [1 ]
Tahar, S [1 ]
Aboulhamid, EM [1 ]
机构
[1] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
关键词
D O I
10.1109/DATE.2005.32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Sharing IP blocks in today's competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illegally redistributed by consumers, and consumers want assurances that the content they buy is legitimate. Recently, digital watermarking emerged as a candidate solution for copyright protection of IP blocks. In this paper, we propose a new approach for watermarking IP designs based on the embedding of the ownership proof as part of the IP design's FSM. The approach utilizes coinciding as well as, un-used transitions in the state transition graph of the design. Our approach increases the robustness of the watermark and allows a secure implementation, hence enabling the development of the first public-key IP watermarking scheme at the FSM level. We also defin evaluation criteria for our approach, and us experimental measures to prove its robustness.
引用
收藏
页码:330 / 335
页数:6
相关论文
共 50 条
  • [41] On the security of a public-key cryptosystem
    Grosek, O
    Magliveras, SS
    Wei, W
    PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 71 - 75
  • [42] Public-key security systems
    Univ of New Orleans, New Orleans, United States
    IEEE Micro, 3 (10-13):
  • [43] Quantum Public-Key Cryptosystem
    Luo, Ming-Xing
    Chen, Xiu-Bo
    Yun, Deng
    Yang, Yi-Xian
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2012, 51 (03) : 912 - 924
  • [44] Modelling a public-key infrastructure
    Maurer, U.
    Lecture Notes in Computer Science, 1146
  • [45] Applied public-key steganography
    Guillon, P
    Furon, T
    Duhamel, P
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 38 - 49
  • [46] Public-key cryptography and availability
    Stabell-Kulo, T
    Lupetti, S
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 222 - 232
  • [47] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &
  • [48] Quantum public-key cryptosystems
    Okamoto, T
    Tanaka, K
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 147 - 165
  • [49] MODIFICATION OF A PUBLIC-KEY CRYPTOSYSTEM
    OKAMOTO, T
    ELECTRONICS LETTERS, 1987, 23 (16) : 814 - 815
  • [50] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154