高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于时间约束的FPGA数字水印

陆健峰 王朔中

陆健峰, 王朔中. 基于时间约束的FPGA数字水印[J]. 电子与信息学报, 2004, 26(12): 1882-1887.
引用本文: 陆健峰, 王朔中. 基于时间约束的FPGA数字水印[J]. 电子与信息学报, 2004, 26(12): 1882-1887.
Lu Jian-feng, Wang Shuo-zhong. FPGA Watermarking Based on Modification of Time Constraints[J]. Journal of Electronics & Information Technology, 2004, 26(12): 1882-1887.
Citation: Lu Jian-feng, Wang Shuo-zhong. FPGA Watermarking Based on Modification of Time Constraints[J]. Journal of Electronics & Information Technology, 2004, 26(12): 1882-1887.

基于时间约束的FPGA数字水印

FPGA Watermarking Based on Modification of Time Constraints

  • 摘要: 该文提出一种基于时间约束的FPGA数字水印技术,其基本思想是将准备好的水印标记嵌入非关键路径上的时间约束来定制最终的下载比特流文件,同时并不改变设计的原始性能.这一方法能保证水印标记所对应的下载比特流文件的唯一性,从而可对FPGA设计模块的所有权提供强有力的证明。与其他方法相比,该文提出的技术不仅具有零空间开销和低时间开销,而且还有效地提高了信息嵌入量。
  • Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding - A survey[J].Proc. IEEE.1999,87(7):1062-1078[2]Hartung F, Kutter M. Multimedia watermarking techniques[J].Proc. IEEE.1999, 87(7):1079-1107[3]Lach J, Mangione-Smith W H, Potkonjak M. Signature hiding techniques for FPGA intellectual property protection. International Conference on Computer-Aided Design, San Jose, CA, USA,1998: 186-189.[4]Kahng A B, et al.. Watermarking techniques for intellectual property protection. Design Automation Conference, San Francico, California, USA, 1998: 776-781.Lach J, Mangione-Smith W H, Potkonjak M. Fingerprinting digital circuits on programmable hardware. International Workshop on Information Hiding, Portland, Oregon, USA, 1998: 16-31.[5]Lach J, Mangione-Smith W H, Potkonjak M. Fingerprinting techniques for field programmable gate array intellectual property protection[J].IEEE Trans. on Computer-Aided Design.2001,20(10):1253-1261[6]Lach J, Mangione-Smith W H, Potkonjak M. Robust FPGA intellectual property protection through multiple small watermarks. Design Automation Conference, New Orleans, LA, USA,1999: 831-836.[7]Lach J, Mangione-Smith W H, Potkonjak M. Enhanced intellectual property protection for digital circuits on programmable hardware, International Workshop on Information Hiding, Dresden,Germany, 1999: 286-301.[8]Kahng A B, et al.. Constraint-based watermarking techniques for design IP protection[J].IEEE Trans. on Computer-Aided Design.2001, 20(10):1236-1252[9]Jain A K, Yuan Lin, Pari P R, Qu G. Zero overhead watermarking technique for FPGA designs.GLSVLSI, Washington, DC, USA, 2003: 147-152.[10]Lach J, Mangione-Smith W H, Potkonjak M. FPGA fingerprinting techniques for protecting intellectual property. Custom Integrated Circuits Conference, Santa Clara, CA, USA, 1998: 299-302.[11]Qu G, Potkonjak M. Fingerprinting intellectual property using constraint-addition. Proceedings of the 2000 International Symposium on Low Power Electronics and Design, Rapallo/Portofino Coast, Italy, 2000: 587-592.[12]Schouten R. A whitepaper on SRAM FPGA security. February 2003, http:∥www.fpga.com.cn/advance/skill/SRAM_Security_whitepaper.pdf.
  • 加载中
计量
  • 文章访问数:  2312
  • HTML全文浏览量:  84
  • PDF下载量:  698
  • 被引次数: 0
出版历程
  • 收稿日期:  2003-06-28
  • 修回日期:  2003-10-20
  • 刊出日期:  2004-12-19

目录

    /

    返回文章
    返回