Publicly Detectable Watermarking for Intellectual Property Authentication in VLSI Design
dc.contributor.author | Qu, Gang | |
dc.date.accessioned | 2009-03-12T12:42:58Z | |
dc.date.available | 2009-03-12T12:42:58Z | |
dc.date.issued | 2002-11 | |
dc.description.abstract | Highlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components or IPs in very large scale integration (VLSI) design has received a great deal of attention recently. Digital signature/watermark is one of the most promising solutions among the known protection mechanisms. It provides desirable proof of authorship without rendering the IP useless. However, it makes the watermark detection, which is as important as watermarking, an NP-hard problem. In fact, the tradeoff between hard-to-attack and easy-to-detect and the lack of efficient detection schemes are the major obstacles for digital signatures to thrive. In this paper, the authors propose a new watermarking method which allows the watermark to be publicly detected without losing its strength and security. The basic idea is to create a cryptographically strong pseudo-random watermark, embed it into the original problem as a special (which the authors call mutual exclusive) constraint, and make it public. The authors combine data integrity technique and the unique characteristics in the design of VLSI IPs such that adversaries will not gain any advantage from the public watermarking for forgery. This new technique is compatible with the existing constraint-based watermarking/fingerprinting techniques. The resulting public–private watermark maintains the strength of a watermark and provides easy detectability with little design overhead. The authors build the mathematical framework for this approach based on the concept of mutual exclusive constraints. They use popular VLSI CAD problems, namely technology mapping, partitioning, graph coloring, FPGA design, and Boolean satisfiability, to demonstrate the public watermark’s easy detectability, high credibility, low design overhead, and robustness. | en |
dc.format.extent | 350524 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.citation | G. Qu. "Publicly Detectable Watermarking for Intellectual Property Authentication in VLSI Design," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 21, No. 11, pp. 1363-1368, November 2002. | en |
dc.identifier.uri | http://hdl.handle.net/1903/8953 | |
dc.language.iso | en_US | en |
dc.publisher | IEEE | en |
dc.relation.isAvailableAt | A. James Clark School of Engineering | en_us |
dc.relation.isAvailableAt | Electrical & Computer Engineering | en_us |
dc.relation.isAvailableAt | Digital Repository at the University of Maryland | en_us |
dc.relation.isAvailableAt | University of Maryland (College Park, MD) | en_us |
dc.rights.license | Copyright © 2002 IEEE. Reprinted from IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Maryland's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. | |
dc.subject | Authentication | en |
dc.subject | copy detection | en |
dc.subject | data integrity | en |
dc.subject | information hiding | en |
dc.subject | intellectual property protection | en |
dc.subject | mutual exclusive constraints | en |
dc.subject | virtual component | en |
dc.subject | watermarking | en |
dc.title | Publicly Detectable Watermarking for Intellectual Property Authentication in VLSI Design | en |
dc.type | Article | en |
Files
Original bundle
1 - 1 of 1