Abstract
We introduce dynamic watermarking techniques for protecting the value of intellectual property of CAD and compilation tools and reusable design components. The essence of the new approach is the addition of a set of design and timing constraints which encodes the author's signature. The constraints are selected in such a way that they result in a minimal hardware overhead while embedding a unique signature that is difficult to remove and forge. Techniques are applicable in conjunction with an arbitrary behavioral synthesis task such as scheduling, assignment, allocation, transformation, and template matching.On a large set of design examples, studies indicate the effectiveness of the new approach that results in signature data that is highly resilient, difficult to detect and remove, and yet is easy to verify and can be embedded in designs with very low hardware overhead. For example, the probability that the same design with the embedded signature is obtained by any other designers by themselves is less than 1 in 10102, and no register overhead was incurred. The probability of tampering, the probability that part of the embedded signature can be removed by random attempts, is shown to be extremely low, and the watermark is additionally protected from such tampering with error-correcting codes.
- Anderson, R. and Kuhn, M. 1996. Tamper resistance---A cautionary note. In 2nd USENIX Workshop on Electronic Commerce, 1--11.]] Google ScholarDigital Library
- Bender, W., Gruhl, D., Morimoto, N., and Lu, A. 1996. Techniques for data hiding. IBM Syst. J. 35, 3/4, 313--336.]] Google ScholarDigital Library
- Benedens, O. and Busch, C. 2000. Towards blind detection of robust watermarks in polygonal models. In Proceedings of the European Association for Computer Graphics (EUROGRAPHICS) vol. 19, 199--208.]]Google ScholarCross Ref
- Berghel, H. and O'Gorman, L. 1996. Protecting ownership rights through digital watermarking. IEEE Comput. 29, 7, 101--103.]] Google ScholarDigital Library
- Boney, L., Tewfik, A. H., and Hamdy, K. N. 1996. Digital watermarks for audio signals. In Proceedings of the International Conference on Multimedia Computing and Systems. 473--480.]] Google ScholarDigital Library
- Brassil, J. T., Low, S., and Maxemchuk, N. F. 1999. Copyright protection for the electronic distribution of text documents. Proceedings of the IEEE, 87, 7, 1181--1196.]]Google ScholarCross Ref
- Chapman, R. and Durrani, T. S. 2000. Ip protection of dsp algorithms for system on chip implementation. IEEE Trans. Signal Process. 48, 3, 854--861.]]Google ScholarDigital Library
- Charbon, E. 1998. Hierarchical watermarking in ic design. In Proceedings of the Custom Integrated Circuits Conference. 295--235.]]Google ScholarCross Ref
- Cox, I. J., Kilian, J., Leighton, T., and Shamoon, T. 1996. A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia. In Proceedings of IEEE Southcon. 192--197.]]Google Scholar
- Craver, S., Memon, N., Yeo, B. L., and Yeung, M. M. 1996. Can invisible watermarks resolve rightful ownerships? IBM Tech. rep., RC 20509, 1996.]]Google Scholar
- Crochiere, R. E. and Oppenheim, A. V. 1975. Analysis of linear digital networks. In Proceedings of the IEEE 63, 4, 581--595.]]Google ScholarCross Ref
- Fernandez, D. 1994. Intellectual property protection in the EDA industry. In Proceedings of the Design Automation Conference. 161--163.]] Google ScholarDigital Library
- Girczyc, E. and Carlson, S. 1993. Increasing design quality and engineering productivity through design reuse. In Proceedings of the Design Automation Conference. 48--53.]] Google ScholarDigital Library
- Hada, S. 2000. Zero-knowledge and code obfuscation. In Proceedings of the (ASIACRYPT) International Conference on the Theory and Application of Cryptology and Information Security, T. Okamoto Ed., 443--457.]] Google ScholarDigital Library
- Hartung, F. and Kutter, M. 1999. Multimedia watermarking techniques. In Proceedings of the IEEE 87, 1079--1107.]]Google ScholarCross Ref
- Irby, D. L., Newbould, R. D., Carothers, J. D., and Rodriguez, J. J. 2001. Placement watermarking of standard-cell designs. In IEEE Southwest Symposium on Mixed-Signal Design. 116--120.]]Google Scholar
- Johnson, D. S., Aragon, C. R., McGeoch, L. A., and Schevon, C. 1991. Optimization by simulated annealing: An experimental evaluation, Part II. Operat. Res. 39, 3, 378--406.]]Google ScholarDigital Library
- Johnson, N. F., Duric, Z., and Jajodia, S. 2001. Information Hiding: Steganography and Watermarking---Attacks and Countermeasures. Kluwer Academic, Boston, MA.]] Google ScholarDigital Library
- Kahng, A. B., Lach, J., Mangione-Smith, W. H., and Mantik, S. 2001. Constraint-based watermarking techniques for design ip protection. IEEE Trans. Comput.-Aid. Design Integrat. Circuits Syst. 20, 10, 1236--1252.]]Google ScholarDigital Library
- Katzenbeisser, S. and Petitcolas, F. A. P. Eds. 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston, MA.]] Google ScholarDigital Library
- Khanna, S. and Zane, F. 2000. Watermarking maps: hiding information in structured data. In ACM/SIAM Symposium on Discrete Algorithms (SODA), 596--605.]] Google ScholarDigital Library
- Kim, H. J., Mangione-Smith, W. H., and Potkonjak, M. 1998. Protecting ownership rights of a lossless image coder through hierarchical watermarking. In Workshop on Signal Processing Systems, 73--82.]]Google Scholar
- Kirovski, D., Hwang, Y., Potkonjak, M., and Cong, J. 1998. Intellectual property protection by watermarking combinational logic synthesis solutions. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design. 194--198.]] Google ScholarDigital Library
- Kirovski, D. and Malvar, H. S. 2001. Spread-spectrum audio watermarking: Requirements, applications, and limitations. In IEEE International Workshop on Multimedia Signal Processing.]] Google ScholarDigital Library
- Kirovski, D. and Potkonjak, M. 2003. Local watermarks: Methodology and application to behavioral synthesis. IEEE Trans. VLSI CAD 22, 9, 1277--1284.]]Google ScholarDigital Library
- Kocher, P. C. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Lecture Notes in Computer Science, Advances in Cryptology, CRYPTO, 104--113.]] Google ScholarDigital Library
- Kocher, P. C. 1999. Differential power analysis: Leaking secrets. Lecture Notes in Computer Science, 388--397.]] Google ScholarDigital Library
- Koushanfar, F., Hong, I., and Potkonjak, M. 2003. Behavioral synthesis techniques for intellectual property protection. Tech. Rep., UCLA Computer Science Department.]]Google Scholar
- Koushanfar, F., Qu, G., and Potkonjak, M. 2001. Intellectual property metering. In IHW Information Hiding Workshop, 2137, 87--102.]] Google ScholarDigital Library
- Kumagai, J. 2000. Chip detectives {reverse engineering}. IEEE Spectrum 37, 11, 43--48.]] Google ScholarDigital Library
- Kutter, M. and Winkler, S. A. 2002. A vision-based masking model for spread-spectrum image watermarking. IEEE Trans. Image Process. 11, 1, 16--25.]]Google ScholarDigital Library
- Lach, J., Mangione-Smith, W. H., and Potkonjak, M. 1998. Fingerprinting digital circuits on programmable hardware. Information Hiding Workshop. 16--31.]]Google Scholar
- Lach, J., Mangione-Smith, W. H., and Potkonjak, M. 2001. Fingerprinting techniques for field-programmable gate array intellectual property protection. IEEE Trans. Comput.-Aid. Design Integrat. Circuits Syst. 20, 10, 1253--1261.]]Google ScholarDigital Library
- Lee, E. A. and Messerschmitt, D. G. 1987. Synchronous dataflow. In Proceedings of the IEEE 75, 9, 1235--1245.]]Google ScholarCross Ref
- Lin, S. and Costello, D. J. 1983. Error Control Coding. Prentice Hall.]] Google ScholarDigital Library
- Lofstrom, K., Daasch, W. R., and Taylor, D. 2000. IC identification circuit using device mismatch. In Proceedings of the IEEE International Solid-State Circuits Conference. 372--373.]]Google Scholar
- Meguerdichian, S. and Potkonjak, M. 2000. Watermarking while preserving the critical path. In Design Automation Conference. 108--111.]] Google ScholarDigital Library
- De Micheli, G. 1994. Synthesis and Optimization of Digital Circuits. McGraw-Hill, New York, NY.]] Google ScholarDigital Library
- Newbould, R. D., Carothers, J. D., and Rodriguez, J. J. 2002. Watermarking ics for ip protection. Electron. Letters 38, 6, 272--274.]]Google ScholarCross Ref
- Newbould, R. D., Irby, D. L., Carothers, J. D., and Rodriguez, J. J. 2001. Mixed signal design watermarking for ip protection. In IEEE Southwest Symposium on Mixed-Signal Design. 110--115.]]Google Scholar
- Ohbuchi, R., Masuda, H., and Aono, M. 2000. A shape-preserving data embedding algorithm for nurbs curves and surfaces. Trans. Inform. Process. Soc. Japan 41, 3, 559--569.]]Google Scholar
- Oliveira, A. L. 2001. Techniques for the creation of digital watermarks in sequential circuit designs. IEEE Trans. Comput.-Aid. Design Integrat Circuits Syst. 20, 9, 1101--1117.]]Google ScholarDigital Library
- Podilchuk, C. and Zeng, W. 1997. Perceptual watermarking of still images. In IEEE Workshop on Multimedia Signal Processing. 363--368.]]Google Scholar
- Rabaey, J., Chu, C., Hoang, P., and Potkonjak, M. 1991. Fast prototyping of data path intensive architectures. IEEE Design and Test of Comput. 8, 2, 40--51.]] Google ScholarDigital Library
- Rashid, A., Asher, J., Mangione-Smith, W. H., and Potkonjak, M. 1999. Hierarchical watermarking for protection of dsp filter cores. In Custom Integrated Circuits Conference. 39--42.]]Google Scholar
- Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley and Sons, New York, NY.]] Google ScholarDigital Library
- Swanson, M. D., Zhu, B., Chau, B., and Tewfik, A. H. 1997. Object-based transparent video watermarking. In IEEE Workshop on Multimedia Signal Processing. 369--374.]]Google Scholar
- Torunoglu, I. and Charbon, E. 1999. Watermarking-based copyright protection of sequential functions. In Custom Integrated Circuits Conference.]]Google Scholar
- van Schyndel, R. G., Tirkel, A. Z., and Osborne, C. F. 1994. A digital watermark. In Proceedings of the International Conference on Image Processing. 86--90.]]Google Scholar
- Wagner, D., Foster, J. S., Brewer, E. A., and Aiken, A. 2000. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium.]]Google Scholar
- Wong, J. L., Kirovski, D., and Potkonjak, M. 2001. Computational forensic techniques for intellectual property protection. In Information Hiding Workshop, 2137, 71--86.]] Google ScholarDigital Library
- Yeo, B. and Yeung, M. M. 1999. Watermarking 3d objects for verification. IEEE Comput. Graph. Applica. 19, 1, 36--45.]] Google ScholarDigital Library
- Yeung, M. M., Mintzer, F. C., Braudaway, G. W., and Rao, A. R. 1997. Digital watermarking for high-quality imaging. In IEEE Workshop on Multimedia Signal Processing. 357--362.]]Google Scholar
Index Terms
- Behavioral synthesis techniques for intellectual property protection
Recommendations
Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data
EC-WEB '02: Proceedings of the Third International Conference on E-Commerce and Web TechnologiesIn this paper, an intellectual property protection mechanism realized on a watermarking scheme is proposed. The embedding technique we adopted in this paper is based on the modular operation. The modulus is a threshold value which determines how the ...
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection
IH '02: Revised Papers from the 5th International Workshop on Information HidingWe analyze four recently proposed watermarking schemes for intellectual property protection of digital designs.The first scheme watermarks solutions of a hard optimization problem, namely the graph coloring problem.Th e other three schemes belong to a ...
Comments