Publicly Detectable Techniques for the Protection of Virtual Components
dc.contributor.author | Qu, Gang | |
dc.date.accessioned | 2009-04-10T18:03:57Z | |
dc.date.available | 2009-04-10T18:03:57Z | |
dc.date.issued | 2001-06 | |
dc.description.abstract | Highlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components (VCs) has received a large amount of attention recently. Digital signature is one of the most promising solutions among the known protection mechanisms. However, the trade-off between hard-to-attack and easy-to-detect and the lack of efficient detection schemes are the major obstacles for digital signatures to thrive. In this paper, we propose a new watermarking method which (i) allows the watermark to be public detected without forensic experts, (ii) gives little advantage to attackers for forgery, and (iii) does not lose the strength of protection provided by other watermarking techniques. The basic idea is to make part of the watermark public. We explain the concept of this public-private watermark and discuss the generation and embedding of such marks. We use popular VLSI CAD problems, namely technology mapping, partitioning, graph coloring, FPGA design, and Boolean satisfiability, to demonstrate its easy detectability, high credibility, low design overhead, and robustness. Finally, this technique is compatible with all the known watermarking and fingerprinting techniques. | en |
dc.format.extent | 131888 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.citation | G. Qu. "Publicly Detectable Techniques for the Protection of Virtual Components," 38th ACM/IEEE Design Automation Conference Proceedings, pp. 474-479, June 2001. | en |
dc.identifier.uri | http://hdl.handle.net/1903/9042 | |
dc.language.iso | en_US | en |
dc.publisher | IEEE | en |
dc.relation.isAvailableAt | A. James Clark School of Engineering | en_us |
dc.relation.isAvailableAt | Electrical & Computer Engineering | en_us |
dc.relation.isAvailableAt | Digital Repository at the University of Maryland | en_us |
dc.relation.isAvailableAt | University of Maryland (College Park, MD) | en_us |
dc.rights.license | Copyright © 2001 IEEE. Reprinted from ACM/IEEE Design Automation Conference Proceedings. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Maryland's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. | |
dc.subject | intellectual property | en |
dc.subject | digital signatures | en |
dc.subject | watermarking | en |
dc.subject | fingerprinting | en |
dc.title | Publicly Detectable Techniques for the Protection of Virtual Components | en |
dc.type | Article | en |
Files
Original bundle
1 - 1 of 1