SlideShare a Scribd company logo
A ROBUST FSM WATERMARKING
  SCHEME FOR IP PROTECTION OF
   SEQUENTIAL CIRCUIT DESIGN



PROJECT GUIDE       SUBMITTED BY
MR.DEVARAJ B.E .,    D.MOHAN RAJ
                     D.RAJA
                     A.THANGAPANDI
AREA OF PROJECT

• Very Large Scale Integration
ABSTRACT

• To protect a VLSI design against IP infringement is
  by embedding a signature
• Direct and convenient detection scheme to allow
  allow the watermark on the FSM be publicly
  detectable
INTRODUCTION

• The signature can be recovered from the
  misappropriated IP
• Dynamic watermarking scheme is proposed
• Embedding the watermark at the behavioral level
EXISTING SYSTEM AND DRAWBACKS

EXISTING SYSTEM
• Static watermarking
• To detect the output without protected design
• Embedding the information at the architecture level
  design
DRAWBACKS
• Embedding capacity is limited
• Not suitable for large design
DRAWBACKS

• Embedding capacity is limited
• Not suitable for large design
PROPOSED SYSTEM

• Dynamic watermarking
• The watermark is embedded in the state transitions of
  FSM at the behavioral level
• Robust against state reduction attacks.
ADVANTAGES AND APPLICATIONS

ADVANTAGES
• Reduced vulnerability
• Robust architecture
• Attacker harder to erase or hide the watermark
APPLICATIONS
• Manufacture of IC‟s
• communication
PSEUDORANDOM NUMBER
             GENERATOR

• To generate a sequence
• The encrypted message is too long, a Message Digest
  (MD) algorithm
• The possibility that the same group of numbers is
  generated by coincidence is low
GENERATION OF WATERMARK
             SEQUENCE
• Message, is first encoded into a binary string and then
  encrypted by a provable cryptographic algorithm with
  the secret key of the IP owner
• message digest (MD) algorithm can be used to reduce
  its length
WATERMARKED TRANSITION

• Pseudo codes for the determination of watermarked
  transitions in state transition algorithm
WATERMARK INSERTION PROCESS


• Pseudo input variable 2n−1 potential free input
  combinations are created in every state transition
• Value „0‟ for existing transition
• Value „1‟ for waetrmarked transition
• Don‟t care inputs in transitions to optimize the design
  of next state and output decoders
WATERMARK DETECTION PROCESS

• The ownership can be authenticated directly by
  running the watermarked FSM
• the authorship of the watermarked FSM can be
  verified off chip by making it a part of the test kernel
BLOCK DIAGRAM
BLOCK DIAGRAM EXPLANATION

• Input variable “0” for existing transition
• Input variable is assigned “1”for added transition
• n=1(input variable),k=3(output variable) is applied to
  8 bit embed watermark seqence
  “10101000” (m/k)=3
TIME STAMPED SIGNATURE
SOFTWARE REQUIREMENT

• Modelsim 6.4c
• Xilinx ISE 10.1i
REFERENCES

• Intellectual Property Protection Development
  Working Group, Intellec-tual Property Protection:
  Schemes, Alternatives and Discussion. VSI Alliance,
  Aug. 2001, white paper, version 1.1
• I. Hong and M. Potkonjak, “Techniques for
  intellectual property protection of DSP designs,” in
  Proc. IEEE Int. Conf. Acoust. Speech Signal Process.,
  vol. 5. May 1998, pp

More Related Content

Similar to A robust fsm watermarking scheme for ip protection

A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...
Ece Rljit
 
Vlsi lab
Vlsi labVlsi lab
Vlsi lab
Hendrick Rick
 
Node architecture
Node architectureNode architecture
Node architecture
GhufranEssam
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
Mike Svoboda
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
VMUG IT
 
A consolidated virtualization approach to deploying distributed cloud networks
A consolidated virtualization approach to deploying distributed cloud networksA consolidated virtualization approach to deploying distributed cloud networks
A consolidated virtualization approach to deploying distributed cloud networks
Aruba, a Hewlett Packard Enterprise company
 
Software Defined Networking: Primer
Software Defined Networking: Primer Software Defined Networking: Primer
Software Defined Networking: Primer
Bangladesh Network Operators Group
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data Sheet
Ixia
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
Lancope, Inc.
 
DPDK Architecture Musings - Andy Harvey
DPDK Architecture Musings - Andy HarveyDPDK Architecture Musings - Andy Harvey
DPDK Architecture Musings - Andy Harvey
harryvanhaaren
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive Scale
Ixia
 
Patterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to KubernetesPatterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to Kubernetes
QAware GmbH
 
Patterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to KubernetesPatterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to Kubernetes
Josef Adersberger
 
Too soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentToo soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessment
Sergey Gordeychik
 
Vindicator Overview
Vindicator OverviewVindicator Overview
Vindicator Overview
dp3b58
 
MÁY KIỂM KHO DATALOGIC Dh60
MÁY KIỂM KHO DATALOGIC Dh60 MÁY KIỂM KHO DATALOGIC Dh60
MÁY KIỂM KHO DATALOGIC Dh60
Radiant Global ADC Vietnam Co., Ltd.
 
Hari Krishna Vetsa Resume
Hari Krishna Vetsa ResumeHari Krishna Vetsa Resume
Hari Krishna Vetsa Resume
Hari Krishna
 
Video-over-IP for AV
Video-over-IP for AVVideo-over-IP for AV
Video-over-IP for AV
Southern Vision Systems, Inc
 
Moving to software-based production workflows and containerisation of media a...
Moving to software-based production workflows and containerisation of media a...Moving to software-based production workflows and containerisation of media a...
Moving to software-based production workflows and containerisation of media a...
Kieran Kunhya
 
Cloud Networking Trends
Cloud Networking TrendsCloud Networking Trends
Cloud Networking Trends
Michelle Holley
 

Similar to A robust fsm watermarking scheme for ip protection (20)

A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...
 
Vlsi lab
Vlsi labVlsi lab
Vlsi lab
 
Node architecture
Node architectureNode architecture
Node architecture
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
 
A consolidated virtualization approach to deploying distributed cloud networks
A consolidated virtualization approach to deploying distributed cloud networksA consolidated virtualization approach to deploying distributed cloud networks
A consolidated virtualization approach to deploying distributed cloud networks
 
Software Defined Networking: Primer
Software Defined Networking: Primer Software Defined Networking: Primer
Software Defined Networking: Primer
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data Sheet
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
DPDK Architecture Musings - Andy Harvey
DPDK Architecture Musings - Andy HarveyDPDK Architecture Musings - Andy Harvey
DPDK Architecture Musings - Andy Harvey
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive Scale
 
Patterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to KubernetesPatterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to Kubernetes
 
Patterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to KubernetesPatterns and Pains of Migrating Legacy Applications to Kubernetes
Patterns and Pains of Migrating Legacy Applications to Kubernetes
 
Too soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentToo soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessment
 
Vindicator Overview
Vindicator OverviewVindicator Overview
Vindicator Overview
 
MÁY KIỂM KHO DATALOGIC Dh60
MÁY KIỂM KHO DATALOGIC Dh60 MÁY KIỂM KHO DATALOGIC Dh60
MÁY KIỂM KHO DATALOGIC Dh60
 
Hari Krishna Vetsa Resume
Hari Krishna Vetsa ResumeHari Krishna Vetsa Resume
Hari Krishna Vetsa Resume
 
Video-over-IP for AV
Video-over-IP for AVVideo-over-IP for AV
Video-over-IP for AV
 
Moving to software-based production workflows and containerisation of media a...
Moving to software-based production workflows and containerisation of media a...Moving to software-based production workflows and containerisation of media a...
Moving to software-based production workflows and containerisation of media a...
 
Cloud Networking Trends
Cloud Networking TrendsCloud Networking Trends
Cloud Networking Trends
 

More from Mohan Raj

Basic+electronic+interview+questions+and+answers
Basic+electronic+interview+questions+and+answersBasic+electronic+interview+questions+and+answers
Basic+electronic+interview+questions+and+answers
Mohan Raj
 
Asp.net+interview+questions+and+answers
Asp.net+interview+questions+and+answersAsp.net+interview+questions+and+answers
Asp.net+interview+questions+and+answers
Mohan Raj
 
Search engine optimization(seo)
Search engine optimization(seo)Search engine optimization(seo)
Search engine optimization(seo)
Mohan Raj
 
Impulse noise removal in digital images
Impulse noise removal in digital imagesImpulse noise removal in digital images
Impulse noise removal in digital images
Mohan Raj
 
Amazing facts of the world
Amazing facts of the worldAmazing facts of the world
Amazing facts of the world
Mohan Raj
 
An efficient denoising architecture for removing impulse noise
An efficient denoising architecture for removing impulse noiseAn efficient denoising architecture for removing impulse noise
An efficient denoising architecture for removing impulse noise
Mohan Raj
 
Blind seperation image sources via adaptive dictionary learning
Blind seperation image sources via adaptive dictionary learningBlind seperation image sources via adaptive dictionary learning
Blind seperation image sources via adaptive dictionary learning
Mohan Raj
 
Blind sepreration
Blind seprerationBlind sepreration
Blind sepreration
Mohan Raj
 

More from Mohan Raj (8)

Basic+electronic+interview+questions+and+answers
Basic+electronic+interview+questions+and+answersBasic+electronic+interview+questions+and+answers
Basic+electronic+interview+questions+and+answers
 
Asp.net+interview+questions+and+answers
Asp.net+interview+questions+and+answersAsp.net+interview+questions+and+answers
Asp.net+interview+questions+and+answers
 
Search engine optimization(seo)
Search engine optimization(seo)Search engine optimization(seo)
Search engine optimization(seo)
 
Impulse noise removal in digital images
Impulse noise removal in digital imagesImpulse noise removal in digital images
Impulse noise removal in digital images
 
Amazing facts of the world
Amazing facts of the worldAmazing facts of the world
Amazing facts of the world
 
An efficient denoising architecture for removing impulse noise
An efficient denoising architecture for removing impulse noiseAn efficient denoising architecture for removing impulse noise
An efficient denoising architecture for removing impulse noise
 
Blind seperation image sources via adaptive dictionary learning
Blind seperation image sources via adaptive dictionary learningBlind seperation image sources via adaptive dictionary learning
Blind seperation image sources via adaptive dictionary learning
 
Blind sepreration
Blind seprerationBlind sepreration
Blind sepreration
 

Recently uploaded

Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
FinalSD_MathematicsGrade7_Session2_Unida.pptx
FinalSD_MathematicsGrade7_Session2_Unida.pptxFinalSD_MathematicsGrade7_Session2_Unida.pptx
FinalSD_MathematicsGrade7_Session2_Unida.pptx
JennySularte1
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
khabri85
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
7DFarhanaMohammed
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 

Recently uploaded (20)

Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
FinalSD_MathematicsGrade7_Session2_Unida.pptx
FinalSD_MathematicsGrade7_Session2_Unida.pptxFinalSD_MathematicsGrade7_Session2_Unida.pptx
FinalSD_MathematicsGrade7_Session2_Unida.pptx
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 

A robust fsm watermarking scheme for ip protection

  • 1. A ROBUST FSM WATERMARKING SCHEME FOR IP PROTECTION OF SEQUENTIAL CIRCUIT DESIGN PROJECT GUIDE SUBMITTED BY MR.DEVARAJ B.E ., D.MOHAN RAJ D.RAJA A.THANGAPANDI
  • 2. AREA OF PROJECT • Very Large Scale Integration
  • 3. ABSTRACT • To protect a VLSI design against IP infringement is by embedding a signature • Direct and convenient detection scheme to allow allow the watermark on the FSM be publicly detectable
  • 4. INTRODUCTION • The signature can be recovered from the misappropriated IP • Dynamic watermarking scheme is proposed • Embedding the watermark at the behavioral level
  • 5. EXISTING SYSTEM AND DRAWBACKS EXISTING SYSTEM • Static watermarking • To detect the output without protected design • Embedding the information at the architecture level design DRAWBACKS • Embedding capacity is limited • Not suitable for large design
  • 6. DRAWBACKS • Embedding capacity is limited • Not suitable for large design
  • 7. PROPOSED SYSTEM • Dynamic watermarking • The watermark is embedded in the state transitions of FSM at the behavioral level • Robust against state reduction attacks.
  • 8. ADVANTAGES AND APPLICATIONS ADVANTAGES • Reduced vulnerability • Robust architecture • Attacker harder to erase or hide the watermark APPLICATIONS • Manufacture of IC‟s • communication
  • 9. PSEUDORANDOM NUMBER GENERATOR • To generate a sequence • The encrypted message is too long, a Message Digest (MD) algorithm • The possibility that the same group of numbers is generated by coincidence is low
  • 10. GENERATION OF WATERMARK SEQUENCE • Message, is first encoded into a binary string and then encrypted by a provable cryptographic algorithm with the secret key of the IP owner • message digest (MD) algorithm can be used to reduce its length
  • 11. WATERMARKED TRANSITION • Pseudo codes for the determination of watermarked transitions in state transition algorithm
  • 12. WATERMARK INSERTION PROCESS • Pseudo input variable 2n−1 potential free input combinations are created in every state transition • Value „0‟ for existing transition • Value „1‟ for waetrmarked transition • Don‟t care inputs in transitions to optimize the design of next state and output decoders
  • 13. WATERMARK DETECTION PROCESS • The ownership can be authenticated directly by running the watermarked FSM • the authorship of the watermarked FSM can be verified off chip by making it a part of the test kernel
  • 15. BLOCK DIAGRAM EXPLANATION • Input variable “0” for existing transition • Input variable is assigned “1”for added transition • n=1(input variable),k=3(output variable) is applied to 8 bit embed watermark seqence “10101000” (m/k)=3
  • 17. SOFTWARE REQUIREMENT • Modelsim 6.4c • Xilinx ISE 10.1i
  • 18. REFERENCES • Intellectual Property Protection Development Working Group, Intellec-tual Property Protection: Schemes, Alternatives and Discussion. VSI Alliance, Aug. 2001, white paper, version 1.1 • I. Hong and M. Potkonjak, “Techniques for intellectual property protection of DSP designs,” in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., vol. 5. May 1998, pp