Abstract Sharing IP blocks in today's competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illegally redistributed by consumers, and consumers want assurances that the content they buy is legitimate. To protect a digital product, one of the ways is to embed an author's signature into the object in the form of minute errors. However, this technique is directly not applicable to protect intellectual properties such as solution of hard problems which must maintain the correct functionality. In this paper we propose a constrained-based watermarking technique and lay out a theoretical framework to evaluate watermarking techniques for intellectual property protection (IPP). Based on this framework, we analyze a watermarking technique for the graph coloring problem. Since credibility and overhead are the most important criteria for any efficient watermarking technique, we derive formulae that illustrate the trade-off between credibility and overhead.
[1]
Ingemar J. Cox,et al.
A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia
,
1996,
Southcon/96 Conference Record.
[2]
William Zhu,et al.
Algorithms to Watermark Software Through Register Allocation
,
2005,
DRMTICS.
[3]
Lawrence O'Gorman,et al.
Protecting ownership rights through digital watermarking
,
1996
.
[4]
Qiang Zhou,et al.
Information hiding for trusted system design
,
2009,
2009 46th ACM/IEEE Design Automation Conference.
[5]
Adrian Iftene,et al.
Graph Coloring using Peer-to-Peer Networks
,
2006,
Comput. Sci. J. Moldova.
[6]
Samir Kumar Bandyopadhyay,et al.
Some sequential graph colouring algorithms
,
1989
.
[7]
Gang Qu,et al.
Analysis of watermarking techniques for graph coloring problem
,
1998,
1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).