Constraint-based watermarking techniques for design IP protection
暂无分享,去创建一个
Miodrag Potkonjak | Andrew B. Kahng | Igor L. Markov | Stefanus Mantik | William H. Mangione-Smith | John Lach | Huijuan Wang | Gregory Wolfe | Paul Tucker | A. Kahng | J. Lach | W. Mangione-Smith | M. Potkonjak | S. Mantik | I. Markov | Gregory Wolfe | P. Tucker | Huijuan Wang
[1] Lawrence O'Gorman,et al. Watermarking Document Images with Bounding Box Expansion , 1996, Information Hiding.
[2] George,et al. Computer Algorithms for Plagiarism Detection , 1989 .
[3] Ingemar J. Cox,et al. Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.
[4] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[5] Brad Calder,et al. Efficient procedure mapping using cache line coloring , 1997, PLDI '97.
[6] Hugo T. Jankowitz. Detecting Plagiarism in Student Pascal Programs , 1988, Comput. J..
[7] Edoardo Charbon,et al. Watermarking layout topologies , 1999, Proceedings of the ASP-DAC '99 Asia and South Pacific Design Automation Conference 1999 (Cat. No.99EX198).
[8] M. Sarrafzadeh,et al. A performance-driven placement technique based on a new budgeting criterion , 1996, 1996 IEEE International Symposium on Circuits and Systems. Circuits and Systems Connecting the World. ISCAS 96.
[9] Srinivas Devadas,et al. Optimal layout via Boolean satisfiability , 1989, 1989 IEEE International Conference on Computer-Aided Design. Digest of Technical Papers.
[10] Andrew B. Kahng,et al. A new adaptive multi-start technique for combinatorial global optimizations , 1994, Oper. Res. Lett..
[11] Ieee Circuits,et al. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems information for authors , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[12] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[13] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[14] Tracy Larrabee,et al. Test pattern generation using Boolean satisfiability , 1992, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[15] Michael L. Bushnell,et al. SEARCH STATE EQUIVALENCE FOR REDUNDANCY IDENTIFICATION AND TEST GENERATION , 1991, 1991, Proceedings. International Test Conference.
[16] Robert E. Tarjan,et al. Notes on Introductory Combinatorics , 1983, Progress in Computer Science.
[17] Randal E. Bryant. Binary decision diagrams and beyond: enabling technologies for formal verification , 1995, ICCAD.
[18] Hilary Putnam,et al. A Computing Procedure for Quantification Theory , 1960, JACM.
[19] Ahmed H. Tewfik,et al. Data hiding for multimedia personalization, interaction, and protection , 1997 .
[20] Edoardo Charbon. Hierarchical watermarking in IC design , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).
[21] Vishwani D. Agrawal,et al. A transitive closure algorithm for test generation , 1993, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[22] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[23] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[24] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[25] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[26] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[27] Miodrag Potkonjak,et al. System-level synthesis of low-power hard real-time systems , 1997, DAC.
[28] Qing Yang,et al. Minimizing Area Cost of On-Chip Cache Memories by Caching Address Tags , 1997, IEEE Trans. Computers.
[29] John Riordan,et al. Introduction to Combinatorial Analysis , 1959 .
[30] Tracy Bradley Maples,et al. Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.
[31] Miodrag Potkonjak,et al. Fingerprinting Digital Circuits on Programmable Hardware , 1998, Information Hiding.
[32] Bart Selman,et al. Stochastic Search and Phase Transitions: AI Meets Physics , 1995, IJCAI.
[33] Lawrence O'Gorman,et al. Protecting ownership rights through digital watermarking , 1996 .
[34] Ingemar J. Cox,et al. Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[35] Ioannis Pitas,et al. Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[36] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[37] M. Potkonjak,et al. FPGA fingerprinting techniques for protecting intellectual property , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).
[38] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[39] S. Kauffman. At Home in the Universe: The Search for the Laws of Self-Organization and Complexity , 1995 .
[40] Miodrag Potkonjak,et al. Techniques for intellectual property protection of DSP designs , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[41] A.Z. Tirkel,et al. Image watermarking-a spread spectrum application , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.
[42] Carl Sechen,et al. Timing Driven Placement for Large Standard Cell Circuits , 1995, 32nd Design Automation Conference.
[43] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[44] David P. Williamson,et al. Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming , 1995, JACM.
[45] Andrew B. Kahng,et al. Recent directions in netlist partitioning: a survey , 1995, Integr..
[46] Gordon W. Braudaway,et al. Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.
[47] Bernd Girod,et al. Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.
[48] Andrew B. Kahng,et al. Faster minimization of linear wirelength for global placement , 1997, ISPD '97.
[49] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[50] John Riordan,et al. Introduction to Combinatorial Analysis , 1958 .
[51] Christophe De Vleeschouwer,et al. Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.
[52] Bernd Girod,et al. Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.
[53] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.