http://iet.metastore.ingenta.com
1887

Protecting the rights of an IP buyer using cryptosystem-based multivariable fingerprinting

Protecting the rights of an IP buyer using cryptosystem-based multivariable fingerprinting

For access to this article, please select a purchase option:

Buy chapter PDF
$16.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter describes a cryptosystem-based fingerprinting approach for IP cores that is employed during the register allocation phase of electronic-system level synthesis. The need for a buyer's fingerprint and its desirable features are highlighted. Further, a detailed elaboration on the fingerprint selection and encoding technique followed by the embedding process and, finally, implementation details on case studies are provided. The chapter is organized as follows: Section 6.1 discusses the various challenges in electronic system design, followed by some fingerprint basics; Section 6.2 introduces some of the prior works in this domain; Section 6.3 presents an overview of the crypto-based fingerprinting process; Section 6.4 illustrates in detail the fingerprinting approach for digital signal processing (DSP) cores; and Section 6.5 discusses the security and design cost analyses using different case studies.

Chapter Contents:

  • 6.1 Introduction
  • 6.1.1 Fingerprinting vs watermarking
  • 6.2 Selected contemporary fingerprinting approach at architectural level
  • 6.2.1 Overview, threat model and encoding process
  • 6.2.2 Embedding process
  • 6.3 Overview of cryptosystem-based multivariable fingerprinting
  • 6.4 Details of cryptosystem-based multivariable fingerprinting
  • 6.4.1 Evaluation models used
  • 6.4.1.1 Area model
  • 6.4.1.2 Delay model
  • 6.4.2 Fingerprinting methodology: pre-processing phase and demonstration
  • 6.4.2.1 Pre-processing phase
  • 6.4.2.2 Demonstration on DCT core
  • 6.4.3 Fingerprinting methodology: selection of fingerprint and embedding process and demonstration
  • 6.4.3.1 Choice of fingerprint and the decoding and embedding process
  • 6.4.3.2 Demonstration on DCT core
  • 6.5 Analysis of case studies
  • 6.5.1 Security and design cost analysis
  • 6.5.2 Comparative study
  • 6.6 Conclusion
  • 6.7 Questions and exercises
  • References

Inspec keywords: fingerprint identification; digital signal processing chips; cryptography

Other keywords: electronic-system level synthesis; electronic system design; digital signal processing; crypto-based fingerprinting process; IP cores; embedding process; fingerprint selection; fingerprint basics; cryptosystem-based multivariable fingerprinting; encoding technique; register allocation phase; IP buyer; fingerprinting approach

Subjects: Digital signal processing chips; Digital signal processing chips; Image recognition; Computer vision and image processing techniques; Cryptography; Data security

Preview this chapter:
Zoom in
Zoomout

Protecting the rights of an IP buyer using cryptosystem-based multivariable fingerprinting, Page 1 of 2

| /docserver/preview/fulltext/books/cs/pbcs067e/PBCS067E_ch6-1.gif /docserver/preview/fulltext/books/cs/pbcs067e/PBCS067E_ch6-2.gif

Related content

content/books/10.1049/pbcs067e_ch6
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address