首页> 外文会议> >Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection
【24h】

Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection

机译:加州大学洛杉矶分校水印计划的密码学分析

获取原文
获取外文期刊封面目录资料

摘要

We analyze four recently proposed watermarking schemes for intellectual property protection of digital designs. The first scheme watermarks solutions of a hard optimization problem, namely the graph coloring problem. The other three schemes belong to a family of techniques for watermarking digital circuits on programmable hardware. They are different from the usual image and audio watermarking since they must maintain correctness of the watermarked objects. Thus their watermarks cannot be embedded in the form of small errors as usually done in audio and visual watermarking. Although constraint-based watermarking schemes existed long before, these schemes are the first ones to protect hardware designs. In this paper, we apply a novel method to break the first of these schemes. We show how to modify a watermarked object in such a way that every signature strings can be extracted from it. Thus anyone can claim ownership of the object, yet leave no traces of who leaked the object. According to our best knowledge, this method is new and it may be of its own interest. In the remaining three schemes, we show how to locate and to remove the watermark embedded in the object, without knowing the secret key used in the embedding.
机译:我们分析了四个最近提出的数字设计知识产权保护水印方案。第一种方案为硬优化问题(即图形着色问题)的水印解决方案。其他三种方案属于在可编程硬件上为数字电路加水印的技术家族。它们与通常的图像和音频水印不同,因为它们必须保持水印对象的正确性。因此,它们的水印不能像通常在音频和视频水印中那样以小错误的形式嵌入。尽管基于约束的水印方案已经存在很久了,但是这些方案是最早保护硬件设计的方案。在本文中,我们采用了一种新颖的方法来打破这些方案中的第一个方案。我们展示了如何修改水印对象,以便可以从中提取每个签名字符串。因此,任何人都可以声明对对象的所有权,却不留任何泄漏对象的痕迹。据我们所知,此方法是新方法,可能与它自己息息相关。在其余的三个方案中,我们展示了如何在不知道嵌入中使用的密钥的情况下定位和删除嵌入在对象中的水印。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号