Show simple item record

dc.contributor.authorQu, Gang
dc.date.accessioned2009-04-10T18:03:57Z
dc.date.available2009-04-10T18:03:57Z
dc.date.issued2001-06
dc.identifier.citationG. Qu. "Publicly Detectable Techniques for the Protection of Virtual Components," 38th ACM/IEEE Design Automation Conference Proceedings, pp. 474-479, June 2001.en
dc.identifier.urihttp://hdl.handle.net/1903/9042
dc.description.abstractHighlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components (VCs) has received a large amount of attention recently. Digital signature is one of the most promising solutions among the known protection mechanisms. However, the trade-off between hard-to-attack and easy-to-detect and the lack of efficient detection schemes are the major obstacles for digital signatures to thrive. In this paper, we propose a new watermarking method which (i) allows the watermark to be public detected without forensic experts, (ii) gives little advantage to attackers for forgery, and (iii) does not lose the strength of protection provided by other watermarking techniques. The basic idea is to make part of the watermark public. We explain the concept of this public-private watermark and discuss the generation and embedding of such marks. We use popular VLSI CAD problems, namely technology mapping, partitioning, graph coloring, FPGA design, and Boolean satisfiability, to demonstrate its easy detectability, high credibility, low design overhead, and robustness. Finally, this technique is compatible with all the known watermarking and fingerprinting techniques.en
dc.format.extent131888 bytes
dc.format.mimetypeapplication/pdf
dc.language.isoen_USen
dc.publisherIEEEen
dc.subjectintellectual propertyen
dc.subjectdigital signaturesen
dc.subjectwatermarkingen
dc.subjectfingerprintingen
dc.titlePublicly Detectable Techniques for the Protection of Virtual Componentsen
dc.typeArticleen
dc.relation.isAvailableAtA. James Clark School of Engineeringen_us
dc.relation.isAvailableAtElectrical & Computer Engineeringen_us
dc.relation.isAvailableAtDigital Repository at the University of Marylanden_us
dc.relation.isAvailableAtUniversity of Maryland (College Park, MD)en_us
dc.rights.licenseCopyright © 2001 IEEE. Reprinted from ACM/IEEE Design Automation Conference Proceedings. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Maryland's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record