Abstract
The convolution layer in a convolutional neural network (CNN) is highly computationally intensive. It is crucial to design reusable low-cost hardware IP for convolutional layer for enabling hardware-based feature extraction. However, the involvement of fake IP vendor/untrustworthy broker in the integrated circuit (IC) supply chain, makes these IPs susceptible to the threat of piracy. The proposed approach presents high- level synthesis (HLS) driven watermarking methodology for designing low-cost and secure convolutional hardware IP. The presented watermarking approach employs complier-driven high-level transformation and exploits retinal signature fused with the encoded hash for piracy detective countermeasure. The proposed approach, therefore, firstly performs compiler-driven high-level transformation in order to optimize the design latency, followed by embedding the watermark of an authentic IP vendor. The generated watermark in the form of encoded hardware watermarking constraints (digital evidence) is covertly embedded into the resulting optimized design during the register allocation module of HLS. The proposed approach achieves the following: (i) optimized and secure design for convolutional hardware IP, (ii) robust detection of pirated IP at zero design cost overhead, (iii) significantly lower probability of coincidence (in the range of 1.3E−06 to 1.2E−09) indicating stronger digital evidence and higher tamper tolerance (in the range of 2.64E+460 to 9.60E+698) than recent approaches.














Similar content being viewed by others
Availability of Data and Material
The datasets used and/or analyzed during the current study are available from the corresponding author on reasonable request.
References
Rajendran J, Ali A, Sinanoglu O, Karri R. Belling the CAD: toward security-centric electronic system design. IEEE Trans Comput-Aid Design Integr Circuits Syst. 2015;34(11):1756–69.
Hu W, Chang C-H, Sengupta A, Bhunia S, Kastner R, Li H. An overview of hardware security and trust: threats, countermeasures, and design tools. IEEE Trans Comput Aid Design Integr Circuits Syst. 2021;40(6):1010–38.
Pilato C, Garg S, Wu K, Karri R, Regazzoni F. Securing hardware accelerators: a new challenge for high-level synthesis. IEEE Embed Syst Lett. 2018;10(3):77–80.
Albawi S, Mohammed TA, Al-Zawi S. Understanding of a convolutional neural network. In: Proc. ICET, 2017, p. 1–6. https://doi.org/10.1109/ICEngTechnol.2017.8308186.
Dai D. An introduction of CNN: models and training on neural network models. In: 2021 International Conference on Big Data, Artificial Intelligence and Risk Management (ICBAR), Shanghai, China, 2021, p. 135–8. https://doi.org/10.1109/ICBAR55169.2021.00037.
Liu Z, Dou Y, Jiang J, Xu J, Li S, Zhou Y, Xu Y. Throughput-optimized FPGA accelerator for deep convolutional neural networks. ACM Trans Reconfig Technol Syst. 2017;10:1–23.
Chang M-C, Pan Z-G, Chen J-L. Hardware accelerator for boosting convolution computation in image classification applications. In: 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), Nagoya, Japan, 2017, p. 1–2.
Ma Y, Cao Y, Vrudhula S, Seo J. Optimizing the convolution operation to accelerate deep neural networks on FPGA. IEEE Trans Very Large Scale Integr (VLSI) Syst. 2018;26(7):1354–67.
Guo K et al Angel-eye: a complete design flow for mapping CNN onto customized hardware. In: Proc. ISVLSI, 2016, p. 24–9. https://doi.org/10.1109/ISVLSI.2016.129.
Putra RE, Suartana IM, Bisma R, Jannah M, Maulidiyah EC, Qoiriah A. Implementation of convolutional neural network in the development of object recognition system. In: 2023 Sixth International Conference on Vocational Education and Electrical Engineering (ICVEE), Surabaya, Indonesia, 2023, p. 286–90. https://doi.org/10.1109/ICVEE59738.2023.10348202.
Kyriakos A, Kitsakis V, Louropoulos A, Papatheofanous E-A, Patronas I, Reisis D. High performance accelerator for CNN applications. In: Proc. PATMOS, 2019, p. 135–40. https://doi.org/10.1109/PATMOS.2019.8862166.
Tsiktsiris D, Ziouzios D, Dasygenis M. A portable image processing accelerator using FPGA. In: Proc. MOCAST, 2018, p. 1–4. https://doi.org/10.1109/MOCAST.2018.8376566.
Shen Y, Ji T, Ferdman M, Milder P. Argus: an end-to-end framework for accelerating CNNs on FPGAs. IEEE Micro. 2019;39(5):17–25. https://doi.org/10.1109/MM.2019.2930607.
Srivastava H, Sarawadekar K. A depthwise separable convolution architecture for CNN accelerator. In: Proc. ASPCON, 2020, p. 1–5. https://doi.org/10.1109/ASPCON49795.2020.9276672.
Bai L, Zhao Y, Huang X. A CNN accelerator on FPGA using depthwise separable convolution. IEEE Trans Circuits Syst II Exp Briefs. 2018;65(10):1415–9. https://doi.org/10.1109/TCSII.2018.2865896.
Kim TS, Bae J, Sunwoo MH. Fast convolution algorithm for convolutional neural networks. In: Proc. AICAS, 2019, p. 258–61. https://doi.org/10.1109/AICAS.2019.8771531.
Wang X, Zheng Y, Basak A, Bhunia S. IIPS: infrastructure IP for secure SoC design. IEEE Trans Comput. 2015;64(8):2226–38.
Koushanfar F, et al. Can EDA combat the rise of electronic counterfeiting? In: DAC Design Automation Conference 2012, 2012, p. 133–8.
Arafin MT, Stanley A, Sharma P. Hardware-based anti-counterfeiting techniques for safeguarding supply chain integrity. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), 2017, p. 1–4.
Hroub A, Elrabaa MES. SecSoC: a secure system on chip architecture for IoT devices. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2022, p. 41–4.
Colombier B, Bossuet L. Survey of hardware protection of design data for integrated circuits and intellectual properties. IET Comput Digit Tech. 2015;8(6):274–87. https://doi.org/10.1049/iet-cdt.2014.0028.
Chaurasia R, Sengupta A. Security vs design cost of signature driven security methodologies for reusable hardware IP core. In: 2022 IEEE International Symposium on Smart Electronic Systems (iSES), Warangal, India, 2022, p. 283–8. https://doi.org/10.1109/iSES54909.2022.00064.
Rajendran JJV. An overview of hardware intellectual property protection. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), 2017, p. 1–4.
Koushanfar F, Hong I, Potkonjak M. Behavioral synthesis techniques for intellectual property protection. ACM Trans Design Autom Electron Syst. 2005;10(3):523–45.
Castillo E, Parrilla L, Garcia A, Meyer-Baese U, Botella G, Lloris A. Automated signature insertion in combinational logic patterns for HDL IP core protection. In: 2008 4th Southern Conference on Programmable Logic, Bariloche, Argentina, 2008, p. 183–6.
Chen J, Schafer BC. Watermarking of behavioral IPs: a practical approach. In: 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), France, 2021, p. 1266–71.
Karmakar R, Jana SS, Chattopadhyay S. A cellular automata guided finite-state-machine watermarking strategy for IP protection of sequential circuits. IEEE Trans Emerg Top Comput. 2022;10(2):806–23.
Sengupta A, Rathor M. IP core steganography for protecting DSP kernels used in CE systems. IEEE Trans Consum Electron. 2019;65(4):506–15.
Sengupta A, Kumar ER, Chandra NP. Embedding digital signature using encrypted-hashing for protection of DSP cores in CE. IEEE Trans Consum Electron. 2019;65(3):398–407.
Sengupta A, Rathor M. Securing hardware accelerators for CE systems using biometric fingerprinting. IEEE Trans Very Large Scale Integr (VLSI) Syst. 2020;28(9):1979–992. https://doi.org/10.1109/TVLSI.2020.2999514.
Sengupta A, Chaurasia R, Reddy T. Contact-less palmprint biometric for securing DSP coprocessors used in CE systems. IEEE Trans Consum Electron. 2021;67(3):202–13.
Sengupta A, Rathor M. Facial biometric for securing hardware accelerators. IEEE Trans Very Large Scale Integr (VLSI) Syst. 2021;29(1):112–23. https://doi.org/10.1109/TVLSI.2020.3029245.
Sengupta A, Chaurasia R. Securing IP cores for DSP applications using structural obfuscation and chromosomal DNA impression. IEEE Access. 2022;10:50903–13.
Rathor M, Rathor GP. Hard-sign: a hardware watermarking scheme using dated handwritten signature. IEEE Des Test. 2024;41(2):75–83.
Chaurasia R, Sengupta A. Designing optimized and secured reusable convolutional hardware accelerator against IP piracy using retina biometrics. In: 2023 IEEE International Symposium on Smart Electronic Systems (iSES), Ahmedabad, India, 2023, p. 153–8. https://doi.org/10.1109/iSES58672.2023.00040
Sengupta A, Bhadauria S. Exploring low cost optimal watermark for reusable IP cores during high level synthesis. IEEE Access. 2016;4:2198–215. https://doi.org/10.1109/ACCESS.2016.2552058.
Sengupta A, Roy D, Mohanty SP. Triple-phase watermarking for reusable IP core protection during architecture synthesis. IEEE Trans Comput-Aid Design Integr Circuits Syst. 2018;37(4):742–55. https://doi.org/10.1109/TCAD.2017.2729341.
Ibnat Z, Rahman MS, Rahman MM, Kamali HM, Tehranipoor M, Farahmandi F. ActiWate: adaptive and design-agnostic active watermarking for IP ownership in modern SoCs. In: 2023 60th ACM/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 2023, p. 1–6. https://doi.org/10.1109/DAC56929.2023.10247688.
CAD for Assurance, IEEE CEDA. KHC-Stego tool: key-triggered hash-chaining driven steganography tool. Available at: https://cadforassurance.org/tools/ip-ic-protection/khc-stego/. Last accessed on June 2024.
Sengupta A, Roy D. Protecting an intellectual property core during architectural synthesis using high-level transformation based obfuscation. IET Electron Lett. 2017;53(13):849–51.
Sengupta A, Chaurasia R. Secured convolutional layer IP core in convolutional neural network using facial biometric. IEEE Trans Consum Electron. 2022;68(3):291–306.
Aleem S, Sheng B, Li P, Yang P, Feng DD. Fast and accurate retinal identification system: using retinal blood vasculature landmarks. IEEE Trans Ind Informat. 2019;15(7):4099–110.
Multimedia Laboratory datasets. Available: https://www.medicmind.tech/retinal-image-databases. Accessed in 2022.
NanGate 15 nm Open Cell Library. 2022. [Online]. Available: http://www.nangate.com/?pageid=2328.
Sengupta A. Frontiers in securing IP cores—forensic detective control and obfuscation techniques. The Institute of Engineering and Technology (IET); 2020. ISBN: 1-83953-031-6.
Rostami M, Koushanfar F, Karri R. A primer on hardware security: models, methods, and metrics. Proc IEEE. 2014;102(8):1283–95. https://doi.org/10.1109/JPROC.2014.2335155.
Acknowledgements
This work is technically and financially supported in part by the CSIR sanction number 22/0856/23/EMR-II, under CSIR EMR II scheme and Indian Institute of Technology Indore.
Funding
This work is technically and financially supported by CSIR grant no. 22/0856/23/EMR-II.
Author information
Authors and Affiliations
Contributions
Rahul Chaurasia: Development and implementation of the idea, Writing the research paper. Anirban Sengupta: Problem formulation, Ideation, Technical supervision.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Research involving human and/or animals
Not applicable.
Informed consent
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This work has been submitted on June 1, 2024. This work was supported by Indian Institute of Technology Indore and CSIR.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Chaurasia, R., Sengupta, A. Exploiting Retina Biometric Fused with Encoded Hash for Designing Watermarked Convolutional Hardware IP Against Piracy. SN COMPUT. SCI. 5, 982 (2024). https://doi.org/10.1007/s42979-024-03247-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-03247-9