IP Watermarking Techniques: Survey and Comparison
نویسندگان
چکیده
Intellectual property (IP) block reuse is essential for facilitating the design process of System-on-a-Chip. Sharing IP blocks in such a competitive market poses significant high security risks. IPs can be read, copied or even partitioned to cover the authorship proof. Creators and owners of IP designs want assurance that their content will not be illegally redistributed by consumers. Consumers, on the other hand, want assurance that the content they buy is legitimate. Digital watermarking, used with most of the shared digital media, has emerged as a candidate solution for helping copyright protection of IP blocks. In this paper, we outline IP watermarking and survey the current stateof-the-art of different schemes and algorithms. We also highlight the main technical problems that should be solved in order to let IP watermarking be used widely in industry.
منابع مشابه
A Survey on IP Watermarking Techniques
Intellectual property (IP) block reuse is essential for facilitating the design process of system-ona-chip. Sharing IP designs poses significant high security risks. Recently, digital watermarking emerged as a candidate solution for copyright protection of IP blocks. In this paper, we survey and classify different techniques used for watermarking IP designs. To this end, we defined several eval...
متن کاملHardware IP Watermarking and Fingerprinting
The continuously increasing gap between silicon and designer productivity has created a need for common design reuse. The initial response to this need emphasized the enforcement of designers’ rights through the creation of design such that ownership can be proved with ultra high probability. Our primary objective is to provide sound treatment of the foundations of hardware watermarking and fin...
متن کاملWatermarking Techniques for Relational Databases: Survey, Classification and Comparison
Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. In this paper, we survey the current state-of-theart and we classify them according to their intent, the way they ex...
متن کاملVerifying the Authorship of Embedded IP Cores: Watermarking and Core Identification Techniques
In this paper, we present an overview of existing watermarking techniques for FPGA and ASIC designs as well as our new watermarking and identification techniques for FPGA IP cores. Unlike most existing watermarking techniques, the focus of our new techniques lies on ease of verification, even if the protected cores are embedded into a product. Moreover, we have concentrated on higher abstractio...
متن کاملA recent survey of reversible watermarking techniques
1 Abstract— The art of secretly hiding and communicating information has gained immense importance in the last 2 two decades due to the advances in generation, storage, and communication technology of digital content. 3 Watermarking is one of the promising solutions for tamper detection and protection of digital content. However, 4 watermarking can cause damage to the sensitive information pr...
متن کامل