一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

基于時(shí)間約束的FPGA數(shù)字水印

陸健峰 王朔中

陸健峰, 王朔中. 基于時(shí)間約束的FPGA數(shù)字水印[J]. 電子與信息學(xué)報(bào), 2004, 26(12): 1882-1887.
引用本文: 陸健峰, 王朔中. 基于時(shí)間約束的FPGA數(shù)字水印[J]. 電子與信息學(xué)報(bào), 2004, 26(12): 1882-1887.
Lu Jian-feng, Wang Shuo-zhong. FPGA Watermarking Based on Modification of Time Constraints[J]. Journal of Electronics & Information Technology, 2004, 26(12): 1882-1887.
Citation: Lu Jian-feng, Wang Shuo-zhong. FPGA Watermarking Based on Modification of Time Constraints[J]. Journal of Electronics & Information Technology, 2004, 26(12): 1882-1887.

基于時(shí)間約束的FPGA數(shù)字水印

FPGA Watermarking Based on Modification of Time Constraints

  • 摘要: 該文提出一種基于時(shí)間約束的FPGA數(shù)字水印技術(shù),其基本思想是將準(zhǔn)備好的水印標(biāo)記嵌入非關(guān)鍵路徑上的時(shí)間約束來(lái)定制最終的下載比特流文件,同時(shí)并不改變?cè)O(shè)計(jì)的原始性能.這一方法能保證水印標(biāo)記所對(duì)應(yīng)的下載比特流文件的唯一性,從而可對(duì)FPGA設(shè)計(jì)模塊的所有權(quán)提供強(qiáng)有力的證明。與其他方法相比,該文提出的技術(shù)不僅具有零空間開銷和低時(shí)間開銷,而且還有效地提高了信息嵌入量。
  • Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding - A survey[J].Proc. IEEE.1999,87(7):1062-1078[2]Hartung F, Kutter M. Multimedia watermarking techniques[J].Proc. IEEE.1999, 87(7):1079-1107[3]Lach J, Mangione-Smith W H, Potkonjak M. Signature hiding techniques for FPGA intellectual property protection. International Conference on Computer-Aided Design, San Jose, CA, USA,1998: 186-189.[4]Kahng A B, et al.. Watermarking techniques for intellectual property protection. Design Automation Conference, San Francico, California, USA, 1998: 776-781.Lach J, Mangione-Smith W H, Potkonjak M. Fingerprinting digital circuits on programmable hardware. International Workshop on Information Hiding, Portland, Oregon, USA, 1998: 16-31.[5]Lach J, Mangione-Smith W H, Potkonjak M. Fingerprinting techniques for field programmable gate array intellectual property protection[J].IEEE Trans. on Computer-Aided Design.2001,20(10):1253-1261[6]Lach J, Mangione-Smith W H, Potkonjak M. Robust FPGA intellectual property protection through multiple small watermarks. Design Automation Conference, New Orleans, LA, USA,1999: 831-836.[7]Lach J, Mangione-Smith W H, Potkonjak M. Enhanced intellectual property protection for digital circuits on programmable hardware, International Workshop on Information Hiding, Dresden,Germany, 1999: 286-301.[8]Kahng A B, et al.. Constraint-based watermarking techniques for design IP protection[J].IEEE Trans. on Computer-Aided Design.2001, 20(10):1236-1252[9]Jain A K, Yuan Lin, Pari P R, Qu G. Zero overhead watermarking technique for FPGA designs.GLSVLSI, Washington, DC, USA, 2003: 147-152.[10]Lach J, Mangione-Smith W H, Potkonjak M. FPGA fingerprinting techniques for protecting intellectual property. Custom Integrated Circuits Conference, Santa Clara, CA, USA, 1998: 299-302.[11]Qu G, Potkonjak M. Fingerprinting intellectual property using constraint-addition. Proceedings of the 2000 International Symposium on Low Power Electronics and Design, Rapallo/Portofino Coast, Italy, 2000: 587-592.[12]Schouten R. A whitepaper on SRAM FPGA security. February 2003, http:∥www.fpga.com.cn/advance/skill/SRAM_Security_whitepaper.pdf.
  • 加載中
計(jì)量
  • 文章訪問(wèn)數(shù):  2335
  • HTML全文瀏覽量:  88
  • PDF下載量:  699
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2003-06-28
  • 修回日期:  2003-10-20
  • 刊出日期:  2004-12-19

目錄

    /

    返回文章
    返回