Enhancing Hardware Security with Digital Signatures & IP Steganography π
Discover how digital signatures and IP steganography can protect reusable IP cores in consumer electronics, ensuring secure and tamper-proof hardware accelerators.

IEEEComputerSociety
384 views β’ Nov 10, 2020

About this video
Reusable Intellectual Property (IP) cores from signal processing and multimedia form an integral part of Consumer Electronics (CE) systems. However, owing to the value it represents, it needs protection against important threats such as piracy and illegal claim of ownership. This talk presents a novel multi-level encoding and encrypted-hash based digital signature for protection of complex reusable IP core used in CE Systems. This talk also discusses a key-driven hash-chaining based hardware steganography for securing such IP cores used in CE systems. The proposed approach is capable of implanting secret invisible stego-marks in design using a hash-chaining process that incorporates switches, strong large stego-keys, multiple encoding algorithms and hash blocks. The methodology proposed provides strong security against IP cloning and counterfeiting while incurring nominal design overhead.
For the latest Tech News, visit https://bit.ly/2z6C4q9
For information on Membership Benefits, visit https://bit.ly/2Rzxsz2
For the latest Tech News, visit https://bit.ly/2z6C4q9
For information on Membership Benefits, visit https://bit.ly/2Rzxsz2
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
384
Likes
17
Duration
49:42
Published
Nov 10, 2020
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.