ABSTRACT
IP reuse is rapidly proliferating recent automated circuit design. It is facing serious challenges like forgery, theft and misappropriation of intellectual property (IP) of the design. Thus, protection of design IP is a matter of prime concern. In this paper, we propose a novel Internet-based scheme to tackle this problem. Input to the proposed scheme is a graph corresponding to a digital system design. Watermarking of the graph and its encryption are achieved using a new linear feedback shift register(LFSR)-based locking scheme. The proposed scheme makes unauthorized disclosure of valuable design almost infeasible, and can easily detect any alteration of the design file during transmission. It ensures authentication of the original designer as well as non-repudiation between the seller and the buyer. Empirical evidences on several benchmark problem sets are encouraging.
- J. Lach. A. B. Kahng and H. Mangione-Smith. Constraint-based watermarking techniques for design ip protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 20(10):1236--1251, 2001. Google ScholarDigital Library
- H. J. Choi A. E. Caldwell and A. B. Kahng. Effective iterative technique for fingerprinting design ip. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 23(2), 2004. Google ScholarDigital Library
- P. R. Pari G. Qu. A. Jain L. Yuan. Zero overhead watermarking technique for fpga designs. In Proc. of the Great Lakes Symposium on VLSI (GLSVLSI), pages 147--152, April 2003. Google ScholarDigital Library
- I. L. Markov M. Potkonjak P. Tucker H. Wang A. B. Kahng, S. Mantik and G. Wolfe. Robust ip watermarking methodologies for physical design. In Proc. of the Design Automation Conference, pages 782--787, June 1998. Google ScholarDigital Library
- E. Charbon. Hierarchical watermarking in ic design. In Proc. of the Custom Integrated Circuits Conference, 1998.Google ScholarCross Ref
- E. Charbon and I. H. Torunoglu. On intellectual property protection. In Proc. of the Custom Integrated Circuits Conference, pages 517--522, 2000.Google ScholarCross Ref
- S. Sur-Kolay S. Sen-Sarma D. Saha P. Dasgupta. A novel scheme for encoding and watermark embedding in vlsi physical design for ip protection. In Proc. of the International Computing Conference: Theory and Algorithms, pages 111--116, 2007. Google ScholarDigital Library
- A. Garcia A. Loris U. Meyer-Baese E. Castillo, L. Parrilla. Ipp watermarking technique for ip core protection on fpl devices. In Proc. of the Field Programmable Logic and Applications, pages 1--6, August 2006.Google Scholar
- J. P. Hayes. Computer Architecture and Organization. Tata Mc-graw Hill, 1996. Google ScholarDigital Library
- W. H. Mangionne-Smith J. Lach and M. Potkonjak. Robust fpga intellectual property protection through multiple small watermarks. In Proc. of IEEE/ACM Design Automation Conference, pages 831--836, June 1999. Google ScholarDigital Library
- L. Ghouti L. Yuan, G. Qu and A. Bouridane. Vlsi design ip protection: Solutions, new challenges, and opportunities. In Proc. of NASA/ESA Conf. on AHS, 2006. Google ScholarDigital Library
- R. C. Merkle. Secrecy, authentication, and public key systems. Stanford Ph.D. Thesis, 1979. Google ScholarDigital Library
- A. D. Friedman Miron Abramovici Melvin A. Breuer. Digital System testing and Testable Design. Jaico Publishers, 2001.Google Scholar
- M. Ni and Z. Gao. Detector-based watermarking technique for soft ip core protection in high synthesis design level. In Proc. of the, pages 1348--1352, 2005.Google Scholar
- W. Stallings. Cryptography and network security. Prentice-Hall India, 2005. Google ScholarDigital Library
- The ISPD98 Circuit Benchmark Suite. http://vlsicad.ucsd.edu/uclaweb/cheese/ispd98.html.Google Scholar
- G. Qu L. Yuan P. R. Pari. Soft ip protection: Watermarking hdl codes. In Proc. of the 6th Information Hiding Workshop (IHWŠ04), pages 224--238, May 2004. Google ScholarDigital Library
Index Terms
- An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking
Recommendations
A watermarking-based image ownership and tampering authentication scheme
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is ...
A novel reversible data hiding scheme based on AMBTC compression technique
Data hiding encompasses a wide range of applications for embedding messages in content. However, hiding data inevitably destroys the host image, even though the distortion is imperceptible. To enhance the hiding capacity and maintain the quality of the ...
Histogram-based reversible data hiding technique using subsampling
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and securityReversible data hiding technique guarantees that the original cover image is completely recovered from the marked image after the hidden data are extracted. This technique can be applied in some applications such as medical imaging and law enforcement ...
Comments