Skip to main content

Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1768))

Abstract

The use of digital marks to provide ownership (watermarking) and recipient (fingerprinting) identification for intellectual property (IP) has become widespread. However, many of these techniques require a high complexity of copy detection, are vulnerable to mark removal after revelation for ownership verification, and are susceptible to reduced mark integrity due to partial mark removal. This paper presents a method for both watermarking and fingerprinting intellectual property, in the form of designs implemented on field programmable gate arrays (FPGAs), that achieves robustness by responding to these three weaknesses. The key techniques involve using secure hash functions to generate and embed multiple small marks that are more detectable, verifiable, and secure than existing FPGA IP protection techniques.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Furber, S.: ARM System Architecture, p. 329. Addison-Wesley, Menlo Park (1996)

    Google Scholar 

  2. Montanaro, J., et al.: A 160MHz 32b 0.5W CMOS RISC Microprocessor. In: International Solid-State Circuits Conference, pp. 49–62 (1996)

    Google Scholar 

  3. Turley, J.: ARM Grabs Embedded Speed Lead. Microprocessor Report  I10 (1996)

    Google Scholar 

  4. Lach, J., Mangione-Smith, W.H., Potkonjak, M.: Signature Hiding Techniques for FPGA Intellectual Property Protection. In: International Conference on Computer-Aided Design, pp. 186–189 (1998)

    Google Scholar 

  5. Lach, J., Mangione-Smith, W.H., Potkonjak, M.: Fingerprinting Digital Circuits on Programmable Hardware. In: International Workshop on Information Hiding, pp. 16–31 (1998)

    Google Scholar 

  6. Trimberger, S.: Personal Communication, Xilinx Corporation (1997)

    Google Scholar 

  7. Goering, R.: IP98 Forum Exposes Struggling Industry – Undefined Business Models, Unstable Core Prices Cited. EE Times, Issue 1000, March 30 (1998)

    Google Scholar 

  8. Brassil, J., O’Gorman, L.: Watermarking Document Images with Bounding Box Expansion. In: International Workshop on Information Hiding, pp. 227–235 (1996)

    Google Scholar 

  9. Cox, I.J., et al.: Secure Spread Spectrum Watermarking for Images, Audio, and Video. In: International Conference on Image Processing, pp. 243–246 (1996)

    Google Scholar 

  10. Smith, J., Comiskey, B.: Modulation and Information Hiding in Images. In: International Workshop on Information Hiding, pp. 207–226 (1996)

    Google Scholar 

  11. Craver, S., et al.: Can Invisible Watermarks Resolve Rightful Ownership? International Society for Optical Engineering  3022 (1997)

    Google Scholar 

  12. Bender, W., et al.: Techniques for Data Hiding. IBM Systems Journal 35(3-4), 313–336 (1996)

    Article  Google Scholar 

  13. Boney, L., et al.: Digital Watermarks for Audio Signals. In: International Conference on Multimedia Computing and Systems, pp. 473–480 (1996)

    Google Scholar 

  14. Hartung, F., Girod, B.: Copyright Protection in Video Delivery Networks by Watermarking of Pre-Compressed Video. In: European Conference on Multimedia Applications, Services and Techniques, pp. 423–436 (1997)

    Google Scholar 

  15. Spanos, G.A., Maples, T.B.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. In: International Conference on Computer Communications and Networks, pp. 2–10 (1995)

    Google Scholar 

  16. Caldwell, A.E., et al.: Effective Iterative Techniques for Fingerprinting Design IP. In: Design Automation Conference, pp. 843–848 (1999)

    Google Scholar 

  17. Charbon, E., "Hierarchical Watermarking in IC Design, Custom Integrated Circuits Conference, pp. 295-298 (1998)

    Google Scholar 

  18. Hong, I., Potkonjak, M.: Behavioral Synthesis Techniques for Intellectual Property Protection. In: Design Automation Conference, pp. 849–854 (1997)

    Google Scholar 

  19. Kahng, A.B., et al.: Robust IP Watermarking Methodologies for Physical Design. In: Design Automation Conference, pp. 782–787 (1998)

    Google Scholar 

  20. Kahng, A.B., et al.: Watermarking Techniques for Intellectual Property Protection. In: Design Automation Conference, pp. 776–781 (1998)

    Google Scholar 

  21. Oliveira, A.: Robust Techniques for Watermarking Sequential Circuit Designs. In: Design Automation Conference, pp. 837–842 (1999)

    Google Scholar 

  22. Torunoglu, I., Charbon, E.: Watermarking-Based Copyright Protection of Sequential Functions. In: Custom Integrated Circuits Conference (1999)

    Google Scholar 

  23. Schneier, B.: 1963- Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, New York (1996)

    Google Scholar 

  24. Hutchings, B., et al.: BYUcore: A MIPS R2000 Processor for FPGAs (1997)

    Google Scholar 

  25. Villasenor, J., et al.: Configurable Computing Solutions for Automatic Target Recognition. In: IEEE Workshop on FPGAs for Custom Computing Machines, pp. 70–79 (1996)

    Google Scholar 

  26. Leonard, J., Mangione-Smith, W.H.: A Case Study of Partially Evaluated Hardware Circuits: Key-Specific DES. Field Programmable Logic, 151–160 (1997)

    Google Scholar 

  27. Xilinx, The Programmable Logic Data Book, San Jose, CA (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lach, J., Mangione-Smith, W.H., Potkonjak, M. (2000). Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_20

Download citation

  • DOI: https://doi.org/10.1007/10719724_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67182-4

  • Online ISBN: 978-3-540-46514-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics