- 1.Anderson, R., and Kuhn, M. Tamper resistance- A cautionary note. Proceedings of the Second USENIX Workshop on Electronic Commerce. (1996), 1-1 I. Google ScholarDigital Library
- 2.Charbon, E. Hierarchical watermarking in IC design. Proceedings of the Custom Integrated Circuits Conference '98. (1998).Google ScholarCross Ref
- 3.Cox, I.J. et al. Secure spread spectrum watermarking for images, audio and video. Proceedings of the Third International Conference on Image Processing. (1996), 243- 246.Google ScholarCross Ref
- 4.Diffie, W. and Hellman, M. New directions on cryptography. IEEE Transactions on Information Theory. IT-22, 6 (Nov. 1976), 644-654.Google ScholarDigital Library
- 5.Hong, I., and Potkonjak, M. Behavioral synthesis techniques for intellectual property protection, unpublished manuscript. (1997).Google Scholar
- 6.Kahng, A.B. et al. Watermarking techniques for intellectual property protection. Proceedings of the Design Automation Conference '98. (1998). Google ScholarDigital Library
- 7.Leonard, J. and Mangione-Smith, W.H. A case study of partially evaluated hardware circuits: Key-Specific DES. FieM Programmable Logic. London, England (I 997). Google ScholarDigital Library
- 8.Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: John Wiley & Sons (1996). Google ScholarDigital Library
- 9.Swanson, M.D. et al. Transparent robust image watermarking, international Conference on Image Processing. (1996), 211-214.Google Scholar
- 10.Trimberger, S. Personal communication. Xilinx Corporation. (1997).Google Scholar
- 11.Villasenor, J. et al. Configurable computing solutions for automatic target recognition. Proceedings of lEEE Workshop on FPGAs for Custom Computing Machines. Ed. Arnold, J. and Pocek, K.L. Napa, CA (1996), 70-79.Google Scholar
- 12.Wolfgang, R.B. and Delp, E.J. A watermark for digital images. Applications of Toral Automorphisms. 3 (1996), 219-222.Google Scholar
- 13.XJlinx. The Programmable Logic Data Book. San Jose, CA (1996).Google Scholar
Index Terms
- Signature hiding techniques for FPGA intellectual property protection
Recommendations
An FPGA intellectual property authentication scheme through watermarking techniques
IMCAS'06: Proceedings of the 5th WSEAS international conference on Instrumentation, measurement, circuits and systemsThis paper presents an intellectual property (IP) protection authentication scheme for field programmable gate array (FPGA) with embedded watermark. The use of digital watermarks to provide ownership (watermarking) and recipient (fingerprinting) ...
Watermark Design Pattern for Intellectual Property Protection in Electronic Commerce Applications
HICSS '00: Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6In this paper, we propose watermark design patterns to model the characteristic of digital watermark in electronic commerce applications. A watermark design pattern preserves the properties of a digital watermark in binary tree representation. Applying ...
Comments