2006 Ph.D. Research in Microelectronics and Electronics
DOI: 10.1109/rme.2006.1689969
|View full text |Cite
|
Sign up to set email alerts
|

RNS-based Watermarking for IP Cores

Abstract: This paper presents a watermarking technique for Intellectual Property Protection (IPP) of circuits based on the residue number system (RNS). This technique relies on embedding a digital signature in non used cells of look-up tables of RNS-based designs at HDL design level; this enables the protection of author rights in the development and distribution of these designs as reusable modules (IP cores) in an efficient and transparent way. The embedded signature uniquely identifies both the design origin and the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…The protection at high design levels 6,11,12,13 introduces great difficulties to remove the watermark, since the signatures is embedded in preliminary stages, being dragged through the whole design flow. In addition, the watermark could be embedded as a functional part of the design 6 .…”
Section: Protection Using Watermarking Strategiesmentioning
confidence: 99%
See 4 more Smart Citations
“…The protection at high design levels 6,11,12,13 introduces great difficulties to remove the watermark, since the signatures is embedded in preliminary stages, being dragged through the whole design flow. In addition, the watermark could be embedded as a functional part of the design 6 .…”
Section: Protection Using Watermarking Strategiesmentioning
confidence: 99%
“…IPP@HDL 6 protects digital systems by spreading the bits of a digital signature through memory structures or combinational logic included in the high-level description of the design. Thus, the signature is propagated through the whole design flow down to the physical implementation, independently of the target technology (ASIC, FPGA, etc.).…”
Section: Protection Using Watermarking Strategiesmentioning
confidence: 99%
See 3 more Smart Citations