Loading…

Finite State Machine IP Watermarking: A Tutorial

Sharing intellectual property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach based on the embedding of the ownership proof as part of the IP design's finite state machine (FSM). It utilizes c...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdel-Hamid, A.T., Tahar, S., El Mostapha Aboulhamid
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 464
container_issue
container_start_page 457
container_title
container_volume
creator Abdel-Hamid, A.T.
Tahar, S.
El Mostapha Aboulhamid
description Sharing intellectual property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach based on the embedding of the ownership proof as part of the IP design's finite state machine (FSM). It utilizes coinciding as well as unused transitions in the state transition graph of the design. Based on this approach, we have developed a robust watermarking framework, used for copyright protection. The developed technique increases the robustness of the watermark and allows a secure implementation, hence enabling the development of the first public-key IP watermarking scheme at the FSM level. In order to integrate these algorithms in the design cycle of industrial projects, we extend the above techniques to enable the watermarking of hierarchical finite state machines (HFSMs)
doi_str_mv 10.1109/AHS.2006.40
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1638200</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1638200</ieee_id><sourcerecordid>1638200</sourcerecordid><originalsourceid>FETCH-LOGICAL-i212t-eb1839628fbd852c3a8bf9d24338ef3b9f89e5d9047bca6a5ac5b28f25eb54fc3</originalsourceid><addsrcrecordid>eNotT01LAzEUDIig1p48eskf2PXl46WJt6VYW6i00IrHkmRfNFpX2V0P_vsGdA4zDAzDDGM3AmohwN01y10tAUyt4Yxdwcw4lEZofcGmw_AOBRoFoLlksMhdHonvRl_4yce33BFfbflL8f2n7z9y93rPG77_Gb_67I_X7Dz540DTf52w58XDfr6s1pvH1bxZV1kKOVYUhFXOSJtCa1FG5W1IrpVaKUtJBZesI2wd6FmI3nj0EUNJS6SAOkU1Ybd_vZmIDt99Llt-D8IoW46pEwC8QAw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Finite State Machine IP Watermarking: A Tutorial</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Abdel-Hamid, A.T. ; Tahar, S. ; El Mostapha Aboulhamid</creator><creatorcontrib>Abdel-Hamid, A.T. ; Tahar, S. ; El Mostapha Aboulhamid</creatorcontrib><description>Sharing intellectual property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach based on the embedding of the ownership proof as part of the IP design's finite state machine (FSM). It utilizes coinciding as well as unused transitions in the state transition graph of the design. Based on this approach, we have developed a robust watermarking framework, used for copyright protection. The developed technique increases the robustness of the watermark and allows a secure implementation, hence enabling the development of the first public-key IP watermarking scheme at the FSM level. In order to integrate these algorithms in the design cycle of industrial projects, we extend the above techniques to enable the watermarking of hierarchical finite state machines (HFSMs)</description><identifier>ISBN: 0769526144</identifier><identifier>ISBN: 9780769526140</identifier><identifier>DOI: 10.1109/AHS.2006.40</identifier><language>eng</language><publisher>IEEE</publisher><subject>Automata ; Intellectual property ; Law ; Leak detection ; Legal factors ; Permission ; Protection ; Robustness ; Tutorial ; Watermarking</subject><ispartof>First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06), 2006, p.457-464</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1638200$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1638200$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Abdel-Hamid, A.T.</creatorcontrib><creatorcontrib>Tahar, S.</creatorcontrib><creatorcontrib>El Mostapha Aboulhamid</creatorcontrib><title>Finite State Machine IP Watermarking: A Tutorial</title><title>First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06)</title><addtitle>AHS</addtitle><description>Sharing intellectual property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach based on the embedding of the ownership proof as part of the IP design's finite state machine (FSM). It utilizes coinciding as well as unused transitions in the state transition graph of the design. Based on this approach, we have developed a robust watermarking framework, used for copyright protection. The developed technique increases the robustness of the watermark and allows a secure implementation, hence enabling the development of the first public-key IP watermarking scheme at the FSM level. In order to integrate these algorithms in the design cycle of industrial projects, we extend the above techniques to enable the watermarking of hierarchical finite state machines (HFSMs)</description><subject>Automata</subject><subject>Intellectual property</subject><subject>Law</subject><subject>Leak detection</subject><subject>Legal factors</subject><subject>Permission</subject><subject>Protection</subject><subject>Robustness</subject><subject>Tutorial</subject><subject>Watermarking</subject><isbn>0769526144</isbn><isbn>9780769526140</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotT01LAzEUDIig1p48eskf2PXl46WJt6VYW6i00IrHkmRfNFpX2V0P_vsGdA4zDAzDDGM3AmohwN01y10tAUyt4Yxdwcw4lEZofcGmw_AOBRoFoLlksMhdHonvRl_4yce33BFfbflL8f2n7z9y93rPG77_Gb_67I_X7Dz540DTf52w58XDfr6s1pvH1bxZV1kKOVYUhFXOSJtCa1FG5W1IrpVaKUtJBZesI2wd6FmI3nj0EUNJS6SAOkU1Ybd_vZmIDt99Llt-D8IoW46pEwC8QAw</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Abdel-Hamid, A.T.</creator><creator>Tahar, S.</creator><creator>El Mostapha Aboulhamid</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2006</creationdate><title>Finite State Machine IP Watermarking: A Tutorial</title><author>Abdel-Hamid, A.T. ; Tahar, S. ; El Mostapha Aboulhamid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i212t-eb1839628fbd852c3a8bf9d24338ef3b9f89e5d9047bca6a5ac5b28f25eb54fc3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Automata</topic><topic>Intellectual property</topic><topic>Law</topic><topic>Leak detection</topic><topic>Legal factors</topic><topic>Permission</topic><topic>Protection</topic><topic>Robustness</topic><topic>Tutorial</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Abdel-Hamid, A.T.</creatorcontrib><creatorcontrib>Tahar, S.</creatorcontrib><creatorcontrib>El Mostapha Aboulhamid</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Abdel-Hamid, A.T.</au><au>Tahar, S.</au><au>El Mostapha Aboulhamid</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Finite State Machine IP Watermarking: A Tutorial</atitle><btitle>First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06)</btitle><stitle>AHS</stitle><date>2006</date><risdate>2006</risdate><spage>457</spage><epage>464</epage><pages>457-464</pages><isbn>0769526144</isbn><isbn>9780769526140</isbn><abstract>Sharing intellectual property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach based on the embedding of the ownership proof as part of the IP design's finite state machine (FSM). It utilizes coinciding as well as unused transitions in the state transition graph of the design. Based on this approach, we have developed a robust watermarking framework, used for copyright protection. The developed technique increases the robustness of the watermark and allows a secure implementation, hence enabling the development of the first public-key IP watermarking scheme at the FSM level. In order to integrate these algorithms in the design cycle of industrial projects, we extend the above techniques to enable the watermarking of hierarchical finite state machines (HFSMs)</abstract><pub>IEEE</pub><doi>10.1109/AHS.2006.40</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 0769526144
ispartof First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06), 2006, p.457-464
issn
language eng
recordid cdi_ieee_primary_1638200
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Automata
Intellectual property
Law
Leak detection
Legal factors
Permission
Protection
Robustness
Tutorial
Watermarking
title Finite State Machine IP Watermarking: A Tutorial
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T18%3A42%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Finite%20State%20Machine%20IP%20Watermarking:%20A%20Tutorial&rft.btitle=First%20NASA/ESA%20Conference%20on%20Adaptive%20Hardware%20and%20Systems%20(AHS'06)&rft.au=Abdel-Hamid,%20A.T.&rft.date=2006&rft.spage=457&rft.epage=464&rft.pages=457-464&rft.isbn=0769526144&rft.isbn_list=9780769526140&rft_id=info:doi/10.1109/AHS.2006.40&rft_dat=%3Cieee_6IE%3E1638200%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i212t-eb1839628fbd852c3a8bf9d24338ef3b9f89e5d9047bca6a5ac5b28f25eb54fc3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1638200&rfr_iscdi=true