Watermarking Techniques for Electronic Circuit Design

ثبت نشده
چکیده

Enforcing copyright laws aimed at intellectual property protection of electronic design is generally considered a hard task. The difficulty is in discovering infringements effectively and proving them as such in a court of law. While reverse engineering is a widely used and legal tool to extract schematics from fabricated integrated circuits, determining that a given circuitry is trivially derived from a patented technique or method is very hard, often impossible, in a reasonable amount of time. Furthermore, forensic analysis of fabricated chips is usually so complex that its application to large collections of commercial products is usually prohibitive. Watermarking is one of several techniques available today to deter copyright infringement in electronic systems. The technique consists of implanting indelible stamps in the circuit’s inner structure, while not disrupting its functionality or significantly degrading its performance. In this paper a series of methods is proposed for the creation of watermarks at several stages of the design cycle, from high-level design to layout. Algorithms are described for implanting robust watermarks to minimize the overhead and, ultimately, to reduce the impact on performance. Detection methods have also been discussed in the presence of infringement. The resilience of the methods in several tampering regimes has been estimated.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Watermarking Techniques for Electronic Circuit Design

Enforcing copyright laws related to circuit design is usually hard, since discovery and proof of infringements are required beyond reasonable doubt. Proving that a given circuitry is trivially derived from a patented technique or method is in general a painstakingly slow task, often requiring reverse-engineering and forensic analysis of fabricated chips. These techniques are so complex that the...

متن کامل

Circuit partitioning based fingerprinting method for IP protection

The continuously widening design productivity gap in the past few decades gives high incentives to counterfeiting ICs. Existing intellectual property (IP) protection schemes demand high overheads, and some techniques like watermarking do not facilitate tracing of illegal users. In this letter,we propose a novel fingerprinting method based on post-processing on circuit partitions. We evaluate ou...

متن کامل

Watermark Design Pattern for Intellectual Property Protection in Electronic Commerce Applications

In this paper, we propose watermark design patterns to model the characteristic of digital watermark in electronic commerce applications. A watermark design pattern preserves the properties of a digital watermark in binary tree representation. Applying the survey results and characteristics of existing watermarking techniques, watermark design patterns for four media data video, image, audio, a...

متن کامل

Increasing the Capacity and PSNR in Blind Watermarking Resist Against Cropping Attacks

Watermarking has increased dramatically in recent years in the Internet and digital media. Watermarking is one of the powerful tools to protect copyright. Local image features have been widely used in watermarking techniques based on feature points. In various papers, the invariance feature has been used to obtain the robustness against attacks. The purpose of this research was based on local f...

متن کامل

Post Layout Watermarking Design Method for IP Protection

The progress of semiconductor manufacture process technology has made it possible to mount a huge number of transistors on a chip that includes a perfect system on it. Nevertheless, while the design reuse is effective in reducing both the SOC design cost and TAT (Turn Around time) of development, the design method also exposes the risk on security. IP (Intellectual Property) reuse plays an impo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008