메뉴 건너뛰기




Volumn 10, Issue 3, 2005, Pages 523-545

Behavioral synthesis techniques for intellectual property protection

Author keywords

Behavioral synthesis; Intellectual property protection; Watermarking

Indexed keywords


EID: 33745218297     PISSN: 10844309     EISSN: 10844309     Source Type: Journal    
DOI: 10.1145/1080334.1080338     Document Type: Article
Times cited : (136)

References (53)
  • 2
  • 4
    • 85008047913 scopus 로고    scopus 로고
    • Protecting ownership rights through digital watermarking
    • BERGHEL, H. AND O'GORMAN, L. 1996. Protecting ownership rights through digital watermarking. IEEE Comput. 29, 7, 101-103.
    • (1996) IEEE Comput. , vol.29 , Issue.7 , pp. 101-103
    • Berghel, H.1    O'Gorman, L.2
  • 6
    • 0032637701 scopus 로고    scopus 로고
    • Copyright protection for the electronic distribution of text documents
    • BRASSIL, J. T., Low, S., AND MAXEMCHUK, N. F. 1999. Copyright protection for the electronic distribution of text documents. Proceedings of the IEEE, 87, 7, 1181-1196.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1181-1196
    • Brassil, J.T.1    Low, S.2    Maxemchuk, N.F.3
  • 7
    • 0033905408 scopus 로고    scopus 로고
    • Ip protection of dsp algorithms for system on chip implementation
    • CHAPMAN, R. AND DURRANI, T. S. 2000. Ip protection of dsp algorithms for system on chip implementation. IEEE Trans. Signal Process. 48, 3, 854-861.
    • (2000) IEEE Trans. Signal Process. , vol.48 , Issue.3 , pp. 854-861
    • Chapman, R.1    Durrani, T.S.2
  • 9
    • 0029696313 scopus 로고    scopus 로고
    • A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia
    • Cox, I. J., KILIAN, J., LEIGHTON, T., AND SHAMOON, T. 1996. A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia. In Proceedings of IEEE Southcon. 192-197.
    • (1996) Proceedings of IEEE Southcon , pp. 192-197
    • Cox, I.J.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4
  • 10
    • 0004166728 scopus 로고    scopus 로고
    • Can invisible watermarks resolve rightful ownerships?
    • RC 20509, 1996
    • CRAVER, S., MEMON, N., YEO, B. L., AND YEUNG, M. M. 1996. Can invisible watermarks resolve rightful ownerships? IBM Tech. rep., RC 20509, 1996.
    • (1996) IBM Tech. Rep.
    • Craver, S.1    Memon, N.2    Yeo, B.L.3    Yeung, M.M.4
  • 15
    • 0032634857 scopus 로고    scopus 로고
    • Multimedia watermarking techniques
    • HARTUNG, F. AND KUTTER, M. 1999. Multimedia watermarking techniques. In Proceedings of the IEEE 87, 1079-1107.
    • (1999) Proceedings of the IEEE , vol.87 , pp. 1079-1107
    • Hartung, F.1    Kutter, M.2
  • 17
    • 0001047763 scopus 로고
    • Optimization by simulated annealing: An experimental evaluation, Part II
    • JOHNSON, D. S., ARAGON, C. R., MCGEOCH, L. A., AND SCHEVON, C. 1991. Optimization by simulated annealing: An experimental evaluation, Part II. Operat. Res. 39, 3, 378-406.
    • (1991) Operat. Res. , vol.39 , Issue.3 , pp. 378-406
    • Johnson, D.S.1    Aragon, C.R.2    Mcgeoch, L.A.3    Schevon, C.4
  • 22
    • 0031628756 scopus 로고    scopus 로고
    • Protecting ownership rights of a loss-less image coder through hierarchical watermarking
    • KIM, H. J., MANGIONE-SMITH, W. H., AND POTKONJAK, M. 1998. Protecting ownership rights of a loss-less image coder through hierarchical watermarking. In Workshop on Signal Processing Systems, 73-82.
    • (1998) Workshop on Signal Processing Systems , pp. 73-82
    • Kim, H.J.1    Mangione-Smith, W.H.2    Potkonjak, M.3
  • 25
    • 0141517673 scopus 로고    scopus 로고
    • Local watermarks: Methodology and application to behavioral synthesis
    • KIROVSKI, D. AND POTKONJAK, M. 2003. Local watermarks: Methodology and application to behavioral synthesis. IEEE Trans. VLSI CAD 22, 9, 1277-1284.
    • (2003) IEEE Trans. VLSI CAD , vol.22 , Issue.9 , pp. 1277-1284
    • Kirovski, D.1    Potkonjak, M.2
  • 26
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Lecture Notes in Computer Science
    • KOCHER, P. C. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Lecture Notes in Computer Science, Advances in Cryptology, CRYPTO, 104-113.
    • (1996) Advances in Cryptology, CRYPTO , pp. 104-113
    • Kocher, P.C.1
  • 27
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis: Leaking secrets
    • KOCHER, P. C. 1999. Differential power analysis: Leaking secrets. Lecture Notes in Computer Science, 388-397.
    • (1999) Lecture Notes in Computer Science , pp. 388-397
    • Kocher, P.C.1
  • 28
    • 33745185330 scopus 로고    scopus 로고
    • Behavioral synthesis techniques for intellectual property protection
    • UCLA Computer Science Department
    • KOUSHANFAR, F., HONG, I., AND POTKONJAK, M. 2003. Behavioral synthesis techniques for intellectual property protection. Tech. Rep., UCLA Computer Science Department.
    • (2003) Tech. Rep.
    • Koushanfar, F.1    Hong, I.2    Potkonjak, M.3
  • 30
    • 0034334788 scopus 로고    scopus 로고
    • Chip detectives [reverse engineering]
    • KUMAGAI, J. 2000. Chip detectives [reverse engineering], IEEE Spectrum 37, 11, 43-48.
    • (2000) IEEE Spectrum , vol.37 , Issue.11 , pp. 43-48
    • Kumagai, J.1
  • 31
    • 0036121722 scopus 로고    scopus 로고
    • A vision-based masking model for spread-spectrum image watermarking
    • KUTTER, M. AND WINKLER, S. A. 2002. A vision-based masking model for spread-spectrum image watermarking. IEEE Trans. Image Process. 11, 1, 16-25.
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.1 , pp. 16-25
    • Kutter, M.1    Winkler, S.A.2
  • 41
    • 33745225188 scopus 로고    scopus 로고
    • A shape-preserving data embedding algorithm for nurbs curves and surfaces
    • OHBUCHI, R., MASUDA, H., AND AONO, M. 2000. A shape-preserving data embedding algorithm for nurbs curves and surfaces. Trans. Inform. Process. Soc. Japan 41, 3, 559-569.
    • (2000) Trans. Inform. Process. Soc. Japan , vol.41 , Issue.3 , pp. 559-569
    • Ohbuchi, R.1    Masuda, H.2    Aono, M.3
  • 42
    • 0035440030 scopus 로고    scopus 로고
    • Techniques for the creation of digital watermarks in sequential circuit designs
    • OLIVEIRA, A. L. 2001. Techniques for the creation of digital watermarks in sequential circuit designs. IEEE Trans. Comput.-Aid. Design Integrat Circuits Syst. 20, 9, 1101-1117.
    • (2001) IEEE Trans. Comput.-aid. Design Integrat Circuits Syst. , vol.20 , Issue.9 , pp. 1101-1117
    • Oliveira, A.L.1
  • 51
    • 84947291784 scopus 로고    scopus 로고
    • Computational forensic techniques for intellectual property protection
    • WONG, J. L., KIROVSKI, D., AND POTKONJAK, M. 2001. Computational forensic techniques for intellectual property protection. In Information Hiding Workshop, 2137, 71-86.
    • (2001) Information Hiding Workshop , vol.2137 , pp. 71-86
    • Wong, J.L.1    Kirovski, D.2    Potkonjak, M.3
  • 52
    • 0032754443 scopus 로고    scopus 로고
    • Watermarking 3d objects for verification
    • YEO, B. AND YEUNG, M. M. 1999. Watermarking 3d objects for verification. IEEE Comput. Graph. Applica. 19, 1, 36-45.
    • (1999) IEEE Comput. Graph. Applica. , vol.19 , Issue.1 , pp. 36-45
    • Yeo, B.1    Yeung, M.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.