Abstract
The use of digital marks to provide ownership (watermarking) and recipient (fingerprinting) identification for intellectual property (IP) has become widespread. However, many of these techniques require a high complexity of copy detection, are vulnerable to mark removal after revelation for ownership verification, and are susceptible to reduced mark integrity due to partial mark removal. This paper presents a method for both watermarking and fingerprinting intellectual property, in the form of designs implemented on field programmable gate arrays (FPGAs), that achieves robustness by responding to these three weaknesses. The key techniques involve using secure hash functions to generate and embed multiple small marks that are more detectable, verifiable, and secure than existing FPGA IP protection techniques.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Furber, S.: ARM System Architecture, p. 329. Addison-Wesley, Menlo Park (1996)
Montanaro, J., et al.: A 160MHz 32b 0.5W CMOS RISC Microprocessor. In: International Solid-State Circuits Conference, pp. 49–62 (1996)
Turley, J.: ARM Grabs Embedded Speed Lead. Microprocessor Report I10 (1996)
Lach, J., Mangione-Smith, W.H., Potkonjak, M.: Signature Hiding Techniques for FPGA Intellectual Property Protection. In: International Conference on Computer-Aided Design, pp. 186–189 (1998)
Lach, J., Mangione-Smith, W.H., Potkonjak, M.: Fingerprinting Digital Circuits on Programmable Hardware. In: International Workshop on Information Hiding, pp. 16–31 (1998)
Trimberger, S.: Personal Communication, Xilinx Corporation (1997)
Goering, R.: IP98 Forum Exposes Struggling Industry – Undefined Business Models, Unstable Core Prices Cited. EE Times, Issue 1000, March 30 (1998)
Brassil, J., O’Gorman, L.: Watermarking Document Images with Bounding Box Expansion. In: International Workshop on Information Hiding, pp. 227–235 (1996)
Cox, I.J., et al.: Secure Spread Spectrum Watermarking for Images, Audio, and Video. In: International Conference on Image Processing, pp. 243–246 (1996)
Smith, J., Comiskey, B.: Modulation and Information Hiding in Images. In: International Workshop on Information Hiding, pp. 207–226 (1996)
Craver, S., et al.: Can Invisible Watermarks Resolve Rightful Ownership? International Society for Optical Engineering 3022 (1997)
Bender, W., et al.: Techniques for Data Hiding. IBM Systems Journal 35(3-4), 313–336 (1996)
Boney, L., et al.: Digital Watermarks for Audio Signals. In: International Conference on Multimedia Computing and Systems, pp. 473–480 (1996)
Hartung, F., Girod, B.: Copyright Protection in Video Delivery Networks by Watermarking of Pre-Compressed Video. In: European Conference on Multimedia Applications, Services and Techniques, pp. 423–436 (1997)
Spanos, G.A., Maples, T.B.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. In: International Conference on Computer Communications and Networks, pp. 2–10 (1995)
Caldwell, A.E., et al.: Effective Iterative Techniques for Fingerprinting Design IP. In: Design Automation Conference, pp. 843–848 (1999)
Charbon, E., "Hierarchical Watermarking in IC Design, Custom Integrated Circuits Conference, pp. 295-298 (1998)
Hong, I., Potkonjak, M.: Behavioral Synthesis Techniques for Intellectual Property Protection. In: Design Automation Conference, pp. 849–854 (1997)
Kahng, A.B., et al.: Robust IP Watermarking Methodologies for Physical Design. In: Design Automation Conference, pp. 782–787 (1998)
Kahng, A.B., et al.: Watermarking Techniques for Intellectual Property Protection. In: Design Automation Conference, pp. 776–781 (1998)
Oliveira, A.: Robust Techniques for Watermarking Sequential Circuit Designs. In: Design Automation Conference, pp. 837–842 (1999)
Torunoglu, I., Charbon, E.: Watermarking-Based Copyright Protection of Sequential Functions. In: Custom Integrated Circuits Conference (1999)
Schneier, B.: 1963- Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, New York (1996)
Hutchings, B., et al.: BYUcore: A MIPS R2000 Processor for FPGAs (1997)
Villasenor, J., et al.: Configurable Computing Solutions for Automatic Target Recognition. In: IEEE Workshop on FPGAs for Custom Computing Machines, pp. 70–79 (1996)
Leonard, J., Mangione-Smith, W.H.: A Case Study of Partially Evaluated Hardware Circuits: Key-Specific DES. Field Programmable Logic, 151–160 (1997)
Xilinx, The Programmable Logic Data Book, San Jose, CA (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lach, J., Mangione-Smith, W.H., Potkonjak, M. (2000). Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_20
Download citation
DOI: https://doi.org/10.1007/10719724_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67182-4
Online ISBN: 978-3-540-46514-0
eBook Packages: Springer Book Archive