{"title":"用于CE设备的JPEG CODEC IP核的混淆","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch9","DOIUrl":null,"url":null,"abstract":"Joint Picture Export Group (JPEG) is the most commonly used image compression standard in the world. One cannot comprehend a CE system that does not process a JPEG. Without JPEG there is no smartphone photography, no social media. So, authors feel strongly that this important multimedia core “JPEG”needs to give well-deserving credit in terms of securing it when security/protection of “DSP core”has been a major focus of all the discussions in this book so far. The chapter is organized as follows: Section 9.2 provides an overview of DCT-based JPEG compression and decompression process. Section 9.3 explains the design process of generating structurally obfuscated JPEG CODEC IP core; Section 9.4 provides a detailed insight on the implementation process of obfuscated JPEG codec IP core in a CAD synthesis tool. Section 9.5 provides implementation and analysis of JPEG CODEC IP core as well as compressed images through the devised JPEG CODEC IP core.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Obfuscation of JPEG CODEC IP core for CE devices\",\"authors\":\"A. Sengupta, S. Mohanty\",\"doi\":\"10.1049/pbcs060e_ch9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Joint Picture Export Group (JPEG) is the most commonly used image compression standard in the world. One cannot comprehend a CE system that does not process a JPEG. Without JPEG there is no smartphone photography, no social media. So, authors feel strongly that this important multimedia core “JPEG”needs to give well-deserving credit in terms of securing it when security/protection of “DSP core”has been a major focus of all the discussions in this book so far. The chapter is organized as follows: Section 9.2 provides an overview of DCT-based JPEG compression and decompression process. Section 9.3 explains the design process of generating structurally obfuscated JPEG CODEC IP core; Section 9.4 provides a detailed insight on the implementation process of obfuscated JPEG codec IP core in a CAD synthesis tool. Section 9.5 provides implementation and analysis of JPEG CODEC IP core as well as compressed images through the devised JPEG CODEC IP core.\",\"PeriodicalId\":14528,\"journal\":{\"name\":\"IP Core Protection and Hardware-Assisted Security for Consumer Electronics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IP Core Protection and Hardware-Assisted Security for Consumer Electronics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/pbcs060e_ch9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/pbcs060e_ch9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Joint Picture Export Group (JPEG) is the most commonly used image compression standard in the world. One cannot comprehend a CE system that does not process a JPEG. Without JPEG there is no smartphone photography, no social media. So, authors feel strongly that this important multimedia core “JPEG”needs to give well-deserving credit in terms of securing it when security/protection of “DSP core”has been a major focus of all the discussions in this book so far. The chapter is organized as follows: Section 9.2 provides an overview of DCT-based JPEG compression and decompression process. Section 9.3 explains the design process of generating structurally obfuscated JPEG CODEC IP core; Section 9.4 provides a detailed insight on the implementation process of obfuscated JPEG codec IP core in a CAD synthesis tool. Section 9.5 provides implementation and analysis of JPEG CODEC IP core as well as compressed images through the devised JPEG CODEC IP core.