Skip to main content
Log in

Exploiting Retina Biometric Fused with Encoded Hash for Designing Watermarked Convolutional Hardware IP Against Piracy

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The convolution layer in a convolutional neural network (CNN) is highly computationally intensive. It is crucial to design reusable low-cost hardware IP for convolutional layer for enabling hardware-based feature extraction. However, the involvement of fake IP vendor/untrustworthy broker in the integrated circuit (IC) supply chain, makes these IPs susceptible to the threat of piracy. The proposed approach presents high- level synthesis (HLS) driven watermarking methodology for designing low-cost and secure convolutional hardware IP. The presented watermarking approach employs complier-driven high-level transformation and exploits retinal signature fused with the encoded hash for piracy detective countermeasure. The proposed approach, therefore, firstly performs compiler-driven high-level transformation in order to optimize the design latency, followed by embedding the watermark of an authentic IP vendor. The generated watermark in the form of encoded hardware watermarking constraints (digital evidence) is covertly embedded into the resulting optimized design during the register allocation module of HLS. The proposed approach achieves the following: (i) optimized and secure design for convolutional hardware IP, (ii) robust detection of pirated IP at zero design cost overhead, (iii) significantly lower probability of coincidence (in the range of 1.3E−06 to 1.2E−09) indicating stronger digital evidence and higher tamper tolerance (in the range of 2.64E+460 to 9.60E+698) than recent approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Availability of Data and Material

The datasets used and/or analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. Rajendran J, Ali A, Sinanoglu O, Karri R. Belling the CAD: toward security-centric electronic system design. IEEE Trans Comput-Aid Design Integr Circuits Syst. 2015;34(11):1756–69.

    Article  Google Scholar 

  2. Hu W, Chang C-H, Sengupta A, Bhunia S, Kastner R, Li H. An overview of hardware security and trust: threats, countermeasures, and design tools. IEEE Trans Comput Aid Design Integr Circuits Syst. 2021;40(6):1010–38.

    Article  Google Scholar 

  3. Pilato C, Garg S, Wu K, Karri R, Regazzoni F. Securing hardware accelerators: a new challenge for high-level synthesis. IEEE Embed Syst Lett. 2018;10(3):77–80.

    Article  Google Scholar 

  4. Albawi S, Mohammed TA, Al-Zawi S. Understanding of a convolutional neural network. In: Proc. ICET, 2017, p. 1–6. https://doi.org/10.1109/ICEngTechnol.2017.8308186.

  5. Dai D. An introduction of CNN: models and training on neural network models. In: 2021 International Conference on Big Data, Artificial Intelligence and Risk Management (ICBAR), Shanghai, China, 2021, p. 135–8. https://doi.org/10.1109/ICBAR55169.2021.00037.

  6. Liu Z, Dou Y, Jiang J, Xu J, Li S, Zhou Y, Xu Y. Throughput-optimized FPGA accelerator for deep convolutional neural networks. ACM Trans Reconfig Technol Syst. 2017;10:1–23.

    Article  Google Scholar 

  7. Chang M-C, Pan Z-G, Chen J-L. Hardware accelerator for boosting convolution computation in image classification applications. In: 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), Nagoya, Japan, 2017, p. 1–2.

  8. Ma Y, Cao Y, Vrudhula S, Seo J. Optimizing the convolution operation to accelerate deep neural networks on FPGA. IEEE Trans Very Large Scale Integr (VLSI) Syst. 2018;26(7):1354–67.

    Article  Google Scholar 

  9. Guo K et al Angel-eye: a complete design flow for mapping CNN onto customized hardware. In: Proc. ISVLSI, 2016, p. 24–9. https://doi.org/10.1109/ISVLSI.2016.129.

  10. Putra RE, Suartana IM, Bisma R, Jannah M, Maulidiyah EC, Qoiriah A. Implementation of convolutional neural network in the development of object recognition system. In: 2023 Sixth International Conference on Vocational Education and Electrical Engineering (ICVEE), Surabaya, Indonesia, 2023, p. 286–90. https://doi.org/10.1109/ICVEE59738.2023.10348202.

  11. Kyriakos A, Kitsakis V, Louropoulos A, Papatheofanous E-A, Patronas I, Reisis D. High performance accelerator for CNN applications. In: Proc. PATMOS, 2019, p. 135–40. https://doi.org/10.1109/PATMOS.2019.8862166.

  12. Tsiktsiris D, Ziouzios D, Dasygenis M. A portable image processing accelerator using FPGA. In: Proc. MOCAST, 2018, p. 1–4. https://doi.org/10.1109/MOCAST.2018.8376566.

  13. Shen Y, Ji T, Ferdman M, Milder P. Argus: an end-to-end framework for accelerating CNNs on FPGAs. IEEE Micro. 2019;39(5):17–25. https://doi.org/10.1109/MM.2019.2930607.

    Article  Google Scholar 

  14. Srivastava H, Sarawadekar K. A depthwise separable convolution architecture for CNN accelerator. In: Proc. ASPCON, 2020, p. 1–5. https://doi.org/10.1109/ASPCON49795.2020.9276672.

  15. Bai L, Zhao Y, Huang X. A CNN accelerator on FPGA using depthwise separable convolution. IEEE Trans Circuits Syst II Exp Briefs. 2018;65(10):1415–9. https://doi.org/10.1109/TCSII.2018.2865896.

    Article  Google Scholar 

  16. Kim TS, Bae J, Sunwoo MH. Fast convolution algorithm for convolutional neural networks. In: Proc. AICAS, 2019, p. 258–61. https://doi.org/10.1109/AICAS.2019.8771531.

  17. Wang X, Zheng Y, Basak A, Bhunia S. IIPS: infrastructure IP for secure SoC design. IEEE Trans Comput. 2015;64(8):2226–38.

    Article  MathSciNet  Google Scholar 

  18. Koushanfar F, et al. Can EDA combat the rise of electronic counterfeiting? In: DAC Design Automation Conference 2012, 2012, p. 133–8.

  19. Arafin MT, Stanley A, Sharma P. Hardware-based anti-counterfeiting techniques for safeguarding supply chain integrity. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), 2017, p. 1–4.

  20. Hroub A, Elrabaa MES. SecSoC: a secure system on chip architecture for IoT devices. In: 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2022, p. 41–4.

  21. Colombier B, Bossuet L. Survey of hardware protection of design data for integrated circuits and intellectual properties. IET Comput Digit Tech. 2015;8(6):274–87. https://doi.org/10.1049/iet-cdt.2014.0028.

    Article  Google Scholar 

  22. Chaurasia R, Sengupta A. Security vs design cost of signature driven security methodologies for reusable hardware IP core. In: 2022 IEEE International Symposium on Smart Electronic Systems (iSES), Warangal, India, 2022, p. 283–8. https://doi.org/10.1109/iSES54909.2022.00064.

  23. Rajendran JJV. An overview of hardware intellectual property protection. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), 2017, p. 1–4.

  24. Koushanfar F, Hong I, Potkonjak M. Behavioral synthesis techniques for intellectual property protection. ACM Trans Design Autom Electron Syst. 2005;10(3):523–45.

    Article  Google Scholar 

  25. Castillo E, Parrilla L, Garcia A, Meyer-Baese U, Botella G, Lloris A. Automated signature insertion in combinational logic patterns for HDL IP core protection. In: 2008 4th Southern Conference on Programmable Logic, Bariloche, Argentina, 2008, p. 183–6.

  26. Chen J, Schafer BC. Watermarking of behavioral IPs: a practical approach. In: 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), France, 2021, p. 1266–71.

  27. Karmakar R, Jana SS, Chattopadhyay S. A cellular automata guided finite-state-machine watermarking strategy for IP protection of sequential circuits. IEEE Trans Emerg Top Comput. 2022;10(2):806–23.

    Google Scholar 

  28. Sengupta A, Rathor M. IP core steganography for protecting DSP kernels used in CE systems. IEEE Trans Consum Electron. 2019;65(4):506–15.

    Article  Google Scholar 

  29. Sengupta A, Kumar ER, Chandra NP. Embedding digital signature using encrypted-hashing for protection of DSP cores in CE. IEEE Trans Consum Electron. 2019;65(3):398–407.

    Article  Google Scholar 

  30. Sengupta A, Rathor M. Securing hardware accelerators for CE systems using biometric fingerprinting. IEEE Trans Very Large Scale Integr (VLSI) Syst. 2020;28(9):1979–992. https://doi.org/10.1109/TVLSI.2020.2999514.

    Article  Google Scholar 

  31. Sengupta A, Chaurasia R, Reddy T. Contact-less palmprint biometric for securing DSP coprocessors used in CE systems. IEEE Trans Consum Electron. 2021;67(3):202–13.

    Article  Google Scholar 

  32. Sengupta A, Rathor M. Facial biometric for securing hardware accelerators. IEEE Trans Very Large Scale Integr (VLSI) Syst. 2021;29(1):112–23. https://doi.org/10.1109/TVLSI.2020.3029245.

    Article  Google Scholar 

  33. Sengupta A, Chaurasia R. Securing IP cores for DSP applications using structural obfuscation and chromosomal DNA impression. IEEE Access. 2022;10:50903–13.

    Article  Google Scholar 

  34. Rathor M, Rathor GP. Hard-sign: a hardware watermarking scheme using dated handwritten signature. IEEE Des Test. 2024;41(2):75–83.

    Article  Google Scholar 

  35. Chaurasia R, Sengupta A. Designing optimized and secured reusable convolutional hardware accelerator against IP piracy using retina biometrics. In: 2023 IEEE International Symposium on Smart Electronic Systems (iSES), Ahmedabad, India, 2023, p. 153–8. https://doi.org/10.1109/iSES58672.2023.00040

  36. Sengupta A, Bhadauria S. Exploring low cost optimal watermark for reusable IP cores during high level synthesis. IEEE Access. 2016;4:2198–215. https://doi.org/10.1109/ACCESS.2016.2552058.

    Article  Google Scholar 

  37. Sengupta A, Roy D, Mohanty SP. Triple-phase watermarking for reusable IP core protection during architecture synthesis. IEEE Trans Comput-Aid Design Integr Circuits Syst. 2018;37(4):742–55. https://doi.org/10.1109/TCAD.2017.2729341.

    Article  Google Scholar 

  38. Ibnat Z, Rahman MS, Rahman MM, Kamali HM, Tehranipoor M, Farahmandi F. ActiWate: adaptive and design-agnostic active watermarking for IP ownership in modern SoCs. In: 2023 60th ACM/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 2023, p. 1–6. https://doi.org/10.1109/DAC56929.2023.10247688.

  39. CAD for Assurance, IEEE CEDA. KHC-Stego tool: key-triggered hash-chaining driven steganography tool. Available at: https://cadforassurance.org/tools/ip-ic-protection/khc-stego/. Last accessed on June 2024.

  40. Sengupta A, Roy D. Protecting an intellectual property core during architectural synthesis using high-level transformation based obfuscation. IET Electron Lett. 2017;53(13):849–51.

    Article  Google Scholar 

  41. Sengupta A, Chaurasia R. Secured convolutional layer IP core in convolutional neural network using facial biometric. IEEE Trans Consum Electron. 2022;68(3):291–306.

    Article  Google Scholar 

  42. Aleem S, Sheng B, Li P, Yang P, Feng DD. Fast and accurate retinal identification system: using retinal blood vasculature landmarks. IEEE Trans Ind Informat. 2019;15(7):4099–110.

    Article  Google Scholar 

  43. Multimedia Laboratory datasets. Available: https://www.medicmind.tech/retinal-image-databases. Accessed in 2022.

  44. NanGate 15 nm Open Cell Library. 2022. [Online]. Available: http://www.nangate.com/?pageid=2328.

  45. Sengupta A. Frontiers in securing IP cores—forensic detective control and obfuscation techniques. The Institute of Engineering and Technology (IET); 2020. ISBN: 1-83953-031-6.

  46. Rostami M, Koushanfar F, Karri R. A primer on hardware security: models, methods, and metrics. Proc IEEE. 2014;102(8):1283–95. https://doi.org/10.1109/JPROC.2014.2335155.

    Article  Google Scholar 

Download references

Acknowledgements

This work is technically and financially supported in part by the CSIR sanction number 22/0856/23/EMR-II, under CSIR EMR II scheme and Indian Institute of Technology Indore.

Funding

This work is technically and financially supported by CSIR grant no. 22/0856/23/EMR-II.

Author information

Authors and Affiliations

Authors

Contributions

Rahul Chaurasia: Development and implementation of the idea, Writing the research paper. Anirban Sengupta: Problem formulation, Ideation, Technical supervision.

Corresponding author

Correspondence to Rahul Chaurasia.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Research involving human and/or animals

Not applicable.

Informed consent

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This work has been submitted on June 1, 2024. This work was supported by Indian Institute of Technology Indore and CSIR.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chaurasia, R., Sengupta, A. Exploiting Retina Biometric Fused with Encoded Hash for Designing Watermarked Convolutional Hardware IP Against Piracy. SN COMPUT. SCI. 5, 982 (2024). https://doi.org/10.1007/s42979-024-03247-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-03247-9

Keywords