© The Institution of Engineering and Technology
A novel robust watermarking methodology for intellectual property core protection of control data flow graphs during behavioural synthesis based on user specified resource constraints and loop unrolling factor is proposed. The proposed methodology incorporates robust multi-variable signature encoding scheme for securing against typical attacks such as false claim of ownership and tampering. Some of the features of the watermarking include greater robustness, lower embedding cost, lower storage overhead, fault tolerance and faster encoding/decoding. Experimental results suggest that the watermarked solution generated by the proposed approach produces lower embedding cost than previous approaches, as well as is more secured due to its multi-variable signature encoding rules.
References
-
-
1)
-
1. Hong, I., Potkonjak, M.: ‘Behavioral synthesis techniques for intellectual property protection’. Proc. 36th annual ACM/IEEE Design Automation Conf., Los Angeles, June 1999, pp. 849–854.
-
2)
-
6. Koushanfar, F., Hong, I., Potkonjak, M.: ‘Behavioral synthesis techniques for intellectual property protection’, ACM Trans. Des. Autom. Electron. Syst., 2005, 10, (3), pp. 523–545 (doi: 10.1145/1080334.1080338).
-
3)
-
3. Oliveira, A.L.: ‘Techniques for the creation of digital watermarks in sequential circuit designs’, IEEE Trans. Comput., Aided Des. Integr. Circuits Syst., 2001, 20, (9), pp. 1101–1117 (doi: 10.1109/43.945306).
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2015.3879
Related content
content/journals/10.1049/el.2015.3879
pub_keyword,iet_inspecKeyword,pub_concept
6
6