Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Oct 1, 2019 · This paper presents a novel `IP core steganography' methodology for DSP kernels that is capable of detecting IP piracy. The proposed methodology ...
The proposed methodology is capable of implanting concealed information into the existing IP core design of DSP datapath without using any external signature, ...
This paper presents a novel `IP core steganography' methodology for DSP kernels that is capable of detecting IP piracy. The proposed methodology is capable of ...
This paper presents a novel 'IP core steganography' methodology for DSP kernels that is capable of detecting IP piracy. The proposed methodology is capable of ...
Intellectual property (IP) core of digital signal processing (DSP) kernels act as hardware accelerators in consumer electronics (CE) systems.
A key-regulated hash-modules chaining based IP steganography is presented in our paper to secure against counterfeiting threat. The proposed approach yielded a ...
KHC-Stego tool simulates and analyses the functionality of key-triggered hash-chaining driven steganography approach for securing DSP hardware accelerators.
IP core steganography using switch based key-driven hash-chaining and encoding for securing DSP kernels used in CE systems. M Rathor, A Sengupta. IEEE ...
Crypto-Stego tool simulates and analyses the functionality of crypto-based steganography approach for securing DSP hardware accelerators against piracy.
Mahendra Rathor, Anirban Sengupta "IP Core Steganography using Switch based Key- driven Hash-chaining and Encoding for Securing DSP kernels used in CE Systems", ...