Obfuscation of JPEG CODEC IP core for CE devices

Obfuscation of JPEG CODEC IP core for CE devices

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IP Core Protection and Hardware-Assisted Security for Consumer Electronics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Joint Picture Export Group (JPEG) is the most commonly used image compression standard in the world. One cannot comprehend a CE system that does not process a JPEG. Without JPEG there is no smartphone photography, no social media. So, authors feel strongly that this important multimedia core “JPEG”needs to give well-deserving credit in terms of securing it when security/protection of “DSP core”has been a major focus of all the discussions in this book so far. The chapter is organized as follows: Section 9.2 provides an overview of DCT-based JPEG compression and decompression process. Section 9.3 explains the design process of generating structurally obfuscated JPEG CODEC IP core; Section 9.4 provides a detailed insight on the implementation process of obfuscated JPEG codec IP core in a CAD synthesis tool. Section 9.5 provides implementation and analysis of JPEG CODEC IP core as well as compressed images through the devised JPEG CODEC IP core.

Chapter Contents:

  • 9.1 Introduction
  • 9.2 Overview of JPEG compression and decompression
  • 9.2.1 DCT-based JPEG image compression process
  • Processing of the input image
  • Perform DCT on input image
  • Perform quantization
  • Data encoding
  • 9.2.2 DCT-based JPEG image decompression process
  • Data decoding
  • Perform inverse quantization
  • Perform IDCT on decompressed image
  • Reconstruct the decompressed image
  • 9.3 Design process of structurally obfuscated JPEG IP core
  • 9.3.1 Threat model, problem formulation, and optimization framework
  • Threat model
  • Problem formulation
  • Optimization framework
  • 9.3.2 Constructing non-obfuscated DFG for JPEG compression
  • 9.3.3 Generating structurally obfuscated JPEG compression IP core
  • 9.3.4 Generating structurally obfuscated JPEG decompression IP core
  • 9.4 Implementation of JPEG CODEC IP core
  • 9.4.1 Designing obfuscated JPEG compression IP core
  • 9.4.2 Designing obfuscated JPEG decompression IP core
  • 9.4.3 End-to-end JPEG CODEC through designed hardware/IP core
  • 9.5 Analysis on case studies
  • 9.6 Conclusion
  • 9.7 Exercises
  • References

Inspec keywords: electronic engineering computing; data compression; integrated circuit design; codecs; data protection; image coding; multimedia systems; digital signal processing chips; discrete cosine transforms

Other keywords: CE system; JPEG codec IP core obfuscation; CAD synthesis tool; multimedia core JPEG; image compression standard; DSP core security; Joint Picture Export Group; decompression process; DSP core protection; CE devices; DCT

Subjects: Integral transforms; Digital signal processing chips; Multimedia; Electronic engineering computing; Integral transforms; Digital circuit design, modelling and testing; Computer vision and image processing techniques; Digital signal processing chips; Image and video coding

Preview this chapter:
Zoom in

Obfuscation of JPEG CODEC IP core for CE devices, Page 1 of 2

| /docserver/preview/fulltext/books/cs/pbcs060e/PBCS060E_ch9-1.gif /docserver/preview/fulltext/books/cs/pbcs060e/PBCS060E_ch9-2.gif

Related content

This is a required field
Please enter a valid email address