2007
DOI: 10.1093/ietfec/e90-a.9.1932
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Reliable Watermarking System for IP Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…The probability of leaking watermark is lower in the proposed algorithm. When the collusion users are more than 60, the probability in Nie and Toyonaga 25 increases rapidly than that in Schmid et al 26 It is because the use of random number in the generation of secret key. In fact, it is pseudo-random number, which can be found with enumeration.…”
Section: Resistance Against Attacksmentioning
confidence: 92%
“…The probability of leaking watermark is lower in the proposed algorithm. When the collusion users are more than 60, the probability in Nie and Toyonaga 25 increases rapidly than that in Schmid et al 26 It is because the use of random number in the generation of secret key. In fact, it is pseudo-random number, which can be found with enumeration.…”
Section: Resistance Against Attacksmentioning
confidence: 92%
“…This section of attacks awaits innovative solutions. Signature embedded by applying constraints in place/ route phase of physical design [8] or through incremental router [37] cannot be verified from an IC fabricated from that marked design. Hence, in order to provide effective security of an IP on SoC, the mark (i.e., watermarks and fingerprints) insertion technique should be resilient against fabrication.…”
Section: Ip Protection In Socmentioning
confidence: 99%
“…Security tags including physical unclonable functions (PUFs) have been proposed for implementing unique extrinsic IC identifiers [1,2]. Watermarking is a comprehensive mechanism implemented to protect IP which is roughly categorized into constraint-based methods [3,4] or additive methods [5,6]. However, watermarking techniques do not facilitate the tracing process of illegally resold IPs and therefore cannot provide IP protection for buyers.…”
Section: Introductionmentioning
confidence: 99%