An FPGA Intellectual Property Authentication Scheme through Watermarking Techniques
نویسندگان
چکیده
This paper presents an intellectual property (IP) protection authentication scheme for field programmable gate array (FPGA) with embedded watermark. The use of digital watermarks to provide ownership (watermarking) and recipient (fingerprinting) identification for IP has become widespread. However, it could not prevent the unauthorized reuses when a person resells the watermarked FPGA design with signature to others. The authentication process in the proposed scheme is based on creating a watermark by encrypting the unique FPGA board ID with the signature of the original IP creator, which guarantees that a watermarked FPGA design can only be used on an authorized FPGA board. In addition, two feasible implementations of the proposed IP authentication scheme are presented. Key-Words: Security, Intellectual Property, FPGA, Watermarking, Authentication 1 Corresponding author. Professor of Department of Computer Science, University of Regina, Canada. E-mail: [email protected].
منابع مشابه
Watermarking FPGA Bitfile for Intellectual Property Protection
Intellectual property protection (IPP) of hardware designs is the most important requirement for many Field Programmable Gate Array (FPGA) intellectual property (IP) vendors. Digital watermarking has become an innovative technology for IPP in recent years. Existing watermarking techniques have successfully embedded watermark into IP cores. However, many of these techniques share two specific we...
متن کاملA robust low-overhead watermarking for field authentication of intellectual property cores
Most of existing field programmable gate array (FPGA) based watermarking algorithms have two primary weaknesses, large overhead and robustness. In this work, a robust low-overhead watermarking algorithm is proposed for intellectual property (IP) protection. The ownership is split into orderly small watermarks. The watermark positions are generated by the watermarks. Location mapping is performe...
متن کاملA Robust Watermarking and Image Authentication Scheme used for Digital Contant Application
The development of computers and Internet has exploded in the last few years. The digital images are distributed and duplicated easily through WWW, thus the protection of the intellectual property rights of digital images becomes an important issue. In this paper, we proposed two techniques that are robust watermarking and image authentication scheme. The proposed scheme includes two parts. The...
متن کاملHierarchical Watermarking Method for FPGA IP Protection
With the increasing intellectual property (IP) abuse in System‐on‐a‐Chip design, watermarking technique is playing an important role for IP protection. In this paper, we combine watermarking methods at different levels to construct a hierarchical watermarking scheme for field programmable gate array (FPGA) IP protec‐ tion. We first embed the watermark into the netlist by using a look‐up table–S...
متن کاملProtecting Ownership Rights of a Lossless Image Coder through Hierarchical Watermarking
Current market forces make it necessary for designers to protect their work against illicit use. Digital watermarks can be used to sign a design and thus establish ownership. We present a hierarchical set of techniques for intellectual property protection of a linear predictive image coder. Watermarking techniques employed include switching entries in the Huffman coding table, applying zero cos...
متن کامل