Skip to main content

Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection

  • Conference paper
  • First Online:
Information Hiding (IH 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2578))

Included in the following conference series:

  • 1106 Accesses

Abstract

We analyze four recently proposed watermarking schemes for intellectual property protection of digital designs.The first scheme watermarks solutions of a hard optimization problem, namely the graph coloring problem.The other three schemes belong to a family of techniques for watermarking digital circuits on programmable hardware.They are different from the usual image and audio watermarking since they must maintain correctness of the watermarked objects.Thus their watermarks cannot be embedded in the form of small errors as usually done in audio and visual watermarking.A lthough constraint-based watermarking schemes existed long before, these schemes are the first ones to protect hardware designs.In this paper, we apply a novel method to break the first of these schemes.We show how to modify a watermarked object in such a way that every signature strings can be extracted from it.Thus anyone can claim ownership of the object, yet leave no traces of who leaked the object. According to our best knowledge, this method is new and it may be of its own interest. In the remaining three schemes, we show how to locate and to remove the watermark embedded in the object, without knowing the secret key used in the embedding.

The authors were partially supported by NFS 0096247.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ross Anderson and Markus Kuhn. “Tamper Resistance-A Cautionary Note”, 1996 USENIX Electronic Commerce Workshop, pp.1–11, Oakland, California, November 1996. 220

    Google Scholar 

  2. Ross Anderson and Fabien Peticolas.“On The Limits of Steganography”, IEEE Journal on Selected Areas in Communications, vol.16, pp. 474–481, May 1998. 214

    Article  Google Scholar 

  3. Andrew B. Kahng, John Lach, William H. Mangione-Smith, Stefanus Mantik, Igor L. Markov, Miodrag Potkonjak, Paul Tucker, Huijuan Wang, and Gregory Wolfe.“Watermarking Techniques for Intellectual Property Protection”, 35th ACM/IEEE DAC Design Automation Conference, pp.776–781, San Francisco, CA, June 1998. 213, 214, 215, 219, 221

    Google Scholar 

  4. John Lach, William H. Mangione-Smith, and Miodrag Potkonjak. “Fingerprinting Digital Circuits on Programmable Hardware”, 1998 Information Hiding Workshop, pp.16–31, Portland, Oregon, April 1998. 213, 214, 215, 219, 220, 221

    Google Scholar 

  5. John Lach, William H. Mangione-Smith, and Miodrag Potkonjak. “FPGA Fingerprinting Techniques for Protecting Intellectual Property”, 1998 Custom Integrated Circuits Conference, Santa Clara, CA, pp.299–302, May 1998. 213, 214, 215, 219, 220

    Google Scholar 

  6. John Lach, William H. Mangione-Smith, and Miodrag Potkonjak. “Signature Hiding Techniques for FPGA Intellectual Property Protection”, 1998 International Conference on Computer-Aided Design, pp.186–189, San Jose, CA, November 1998. 213, 214, 215, 219, 220

    Google Scholar 

  7. John Lach, William H. Mangione-Smith, and Miodrag Potkonjak. “Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks”, 36th ACM/IEEE Design Automation Conference, pp.831–836, New Orleans, LA, June 1999. 213, 214, 215, 219, 221

    Google Scholar 

  8. John Lach, William H. Mangione-Smith, and Miodrag Potkonjak.“Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware”, 1999 Information Hiding Workshop, pp.331–345, Dresden, Germany, September 1999. 213, 214, 215, 219, 221

    Google Scholar 

  9. John Lach, William H. Mangione-Smith, and Miodrag Potkonjak. “Hiding Signatures in Graph Coloring Solutions”, 1999 Information Hiding Workshop, pp. 391–408, Dresden, Germany, September 1999. 213, 214, 215, 216, 217, 219

    Google Scholar 

  10. G. Qu and Miodrag Potkonjak.“A nalysis ofWatermarking Techniques for Graph Coloring Problem”, 1998 International Conference on Computer-Aided Design, pp.190–193, San Jose, CA, November 1998. 213, 214, 215, 217, 219

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Van Le, T., Desmedt, Y. (2003). Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. In: Petitcolas, F.A.P. (eds) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36415-3_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-36415-3_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00421-9

  • Online ISBN: 978-3-540-36415-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics