Hardware IPwatermarking and fingerprinting

16Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The continuously increasing gap between silicon and designer productivity has created a need for common design reuse. The initial response to this need emphasized the enforcement of designers' rights through the creation of design such that ownership can be provedwith ultra high probability.Our primary objective is to provide sound treatment of the foundations of hardwarewatermarking and fingerprinting, as well as key research contributions to the field. At the same time, we aim not just to survey and explain key ideas, concepts, and tools but also to identify dominating trends and briefly outline emerging hardware IP protection and, in particular, hardware watermarking and fingerprinting issues including the creation and validation of trusted hardware IP and semantic IP rights protection. Finally, we also elaborate on changing focus from techniques for embedding watermarks and fingerprints to approaches for watermark and fingerprint extraction and on remote digital rights enforcement of hardware IP rights.

Cite

CITATION STYLE

APA

Chang, C. H., Potkonjak, M., & Zhang, L. (2015). Hardware IPwatermarking and fingerprinting. In Secure System Design and Trustable Computing (pp. 329–368). Springer International Publishing. https://doi.org/10.1007/978-3-319-14971-4_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free