{"title":"A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection","authors":"Jing Long, Dafang Zhang, W. Liang, Wenwei Li","doi":"10.1109/Trustcom.2015.379","DOIUrl":null,"url":null,"abstract":"Intellectual Property (IP) is difficult to identify when the watermarks are impaired in previous work. To address this issue, we propose a fault-tolerant watermarking scheme for FPGA IP design. The scheme employs Blakley threshold method for signature sharing. The watermarks are then encoded with Reed-Solomon (RS) coding and finally embedded into unused LUTs of used slice. The signature sharing makes it unnecessary to extract all embedded watermarks in authentication. The complete signature can be retrieved with several watermarks even if other watermarks are damaged. The experiments show that the fault-tolerant scheme incurs no extra resource and timing overhead and has good robustness against removal attacks.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"188 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Trustcom/BigDataSE/ISPA","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Trustcom.2015.379","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Intellectual Property (IP) is difficult to identify when the watermarks are impaired in previous work. To address this issue, we propose a fault-tolerant watermarking scheme for FPGA IP design. The scheme employs Blakley threshold method for signature sharing. The watermarks are then encoded with Reed-Solomon (RS) coding and finally embedded into unused LUTs of used slice. The signature sharing makes it unnecessary to extract all embedded watermarks in authentication. The complete signature can be retrieved with several watermarks even if other watermarks are damaged. The experiments show that the fault-tolerant scheme incurs no extra resource and timing overhead and has good robustness against removal attacks.