Computational geometry: an introduction
Computational geometry: an introduction
Synthesis of finite state machines: logic optimization
Synthesis of finite state machines: logic optimization
Watermarking techniques for intellectual property protection
DAC '98 Proceedings of the 35th annual Design Automation Conference
Signature hiding techniques for FPGA intellectual property protection
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
Intellectual property protection by watermarking combinational logic synthesis solutions
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
A new algorithm for the reduction of incompletely specified finite state machines
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
Robust FPGA intellectual property protection through multiple small watermarks
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Robust techniques for watermarking sequential circuit designs
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
TimberWolf3.2: a new standard cell placement and global routing package
DAC '86 Proceedings of the 23rd ACM/IEEE Design Automation Conference
Copyright protection of designs based on multi source IPs
ICCAD '99 Proceedings of the 1999 IEEE/ACM international conference on Computer-aided design
Digital watermarking
Synthesis and Optimization of Digital Circuits
Synthesis and Optimization of Digital Circuits
Sequential Circuit Design Using Synthesis and Optimization
ICCD '92 Proceedings of the 1991 IEEE International Conference on Computer Design on VLSI in Computer & Processors
DAC '82 Proceedings of the 19th Design Automation Conference
Digital Watermarks for Audio Signals
ICMCS '96 Proceedings of the 1996 International Conference on Multimedia Computing and Systems
Hierarchical composition of vlsi circuits
Hierarchical composition of vlsi circuits
State Reduction in Incompletely Specified Finite-State Machines
IEEE Transactions on Computers
A fragile watermarking scheme protecting originator's rights for multimedia service
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
A method for deciding quantization steps in QIM watermarking schemes
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Invertible watermarking scheme for authentication and integrity
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
A fragile watermarking technique for image authentication using singular value decomposition
PCM'04 Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing - Volume Part II
Hi-index | 0.00 |
Enforcing copyright laws related to circuit design is usually hard, since discovery and proof of infringements are required beyond reasonable doubt. Proving that a given circuitry is trivially derived from a patented technique or method is in general a painstakingly slow task, often requiring reverse-engineering and forensic analysis of fabricated chips. These techniques are so complex that their application to large collections of commercial products is almost always prohibitive. Watermarking is one of several techniques available today to deter copyright infringement in electronic systems. The technique consists of implanting indelible stamps in the circuit's inner structure, while not disrupting its functionality or significantly degrading its performance. In this paper a series of methods is proposed for the creation of watermarks at several stages of the design cycle, from high-level design to layout. Algorithms are described for implanting robust watermarks to minimize the overhead and, ultimately, to reduce the impact on performance. Detection methods are discussed in the presence of infringement. The resilience of the methods in several tampering regimes is estimated.