Constraint-based watermarking techniques for design IP protection

Digital system designs are the product of valuable effort and know-how. Their embodiments, from software and hardware description language program down to device-level netlist and mask data, represent carefully guarded intellectual property (IP). Hence, design methodologies based on IP reuse require new mechanisms to protect the rights of IP producers and owners. This paper establishes principles of watermarking-based IP protection, where a watermark is a mechanism for identification that is: (1) nearly invisible to human and machine inspection; (2) difficult to remove; and (3) permanently embedded as an integral part of the design. Watermarking addresses IP protection by tracing unauthorized reuse and making untraceable unauthorized reuse as difficult as recreating given pieces of IP from scratch. We survey related work in cryptography and design methodology, then develop desiderata, metrics, and concrete protocols for constraint-based watermarking at various stages of the very large scale integration (VLSI) design process. In particular, we propose a new preprocessing approach that embeds watermarks as constraints into the input of a black-box design tool and a new postprocessing approach that embeds watermarks as constraints into the output of a black-box design tool. To demonstrate that our protocols can be transparently integrated into existing design flows, we use a testbed of commercial tools for VLSI physical design and embed watermarks into real-world industrial designs. We show that the implementation overhead is low-both in terms of central processing unit time and such standard physical design metrics as wirelength, layout area, number of vias, and routing congestion. We empirically show that the placement and routing applications considered in our methods achieve strong proofs of authorship and are resistant to tampering and do not adversely influence timing.

[1]  Lawrence O'Gorman,et al.  Watermarking Document Images with Bounding Box Expansion , 1996, Information Hiding.

[2]  George,et al.  Computer Algorithms for Plagiarism Detection , 1989 .

[3]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[4]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[5]  Brad Calder,et al.  Efficient procedure mapping using cache line coloring , 1997, PLDI '97.

[6]  Hugo T. Jankowitz Detecting Plagiarism in Student Pascal Programs , 1988, Comput. J..

[7]  Edoardo Charbon,et al.  Watermarking layout topologies , 1999, Proceedings of the ASP-DAC '99 Asia and South Pacific Design Automation Conference 1999 (Cat. No.99EX198).

[8]  M. Sarrafzadeh,et al.  A performance-driven placement technique based on a new budgeting criterion , 1996, 1996 IEEE International Symposium on Circuits and Systems. Circuits and Systems Connecting the World. ISCAS 96.

[9]  Srinivas Devadas,et al.  Optimal layout via Boolean satisfiability , 1989, 1989 IEEE International Conference on Computer-Aided Design. Digest of Technical Papers.

[10]  Andrew B. Kahng,et al.  A new adaptive multi-start technique for combinatorial global optimizations , 1994, Oper. Res. Lett..

[11]  Ieee Circuits,et al.  IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems information for authors , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[12]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[13]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[14]  Tracy Larrabee,et al.  Test pattern generation using Boolean satisfiability , 1992, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[15]  Michael L. Bushnell,et al.  SEARCH STATE EQUIVALENCE FOR REDUNDANCY IDENTIFICATION AND TEST GENERATION , 1991, 1991, Proceedings. International Test Conference.

[16]  Robert E. Tarjan,et al.  Notes on Introductory Combinatorics , 1983, Progress in Computer Science.

[17]  Randal E. Bryant Binary decision diagrams and beyond: enabling technologies for formal verification , 1995, ICCAD.

[18]  Hilary Putnam,et al.  A Computing Procedure for Quantification Theory , 1960, JACM.

[19]  Ahmed H. Tewfik,et al.  Data hiding for multimedia personalization, interaction, and protection , 1997 .

[20]  Edoardo Charbon Hierarchical watermarking in IC design , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).

[21]  Vishwani D. Agrawal,et al.  A transitive closure algorithm for test generation , 1993, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[22]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[23]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[24]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[25]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[26]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[27]  Miodrag Potkonjak,et al.  System-level synthesis of low-power hard real-time systems , 1997, DAC.

[28]  Qing Yang,et al.  Minimizing Area Cost of On-Chip Cache Memories by Caching Address Tags , 1997, IEEE Trans. Computers.

[29]  John Riordan,et al.  Introduction to Combinatorial Analysis , 1959 .

[30]  Tracy Bradley Maples,et al.  Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.

[31]  Miodrag Potkonjak,et al.  Fingerprinting Digital Circuits on Programmable Hardware , 1998, Information Hiding.

[32]  Bart Selman,et al.  Stochastic Search and Phase Transitions: AI Meets Physics , 1995, IJCAI.

[33]  Lawrence O'Gorman,et al.  Protecting ownership rights through digital watermarking , 1996 .

[34]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[35]  Ioannis Pitas,et al.  Image watermarking using DCT domain constraints , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[36]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[37]  M. Potkonjak,et al.  FPGA fingerprinting techniques for protecting intellectual property , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).

[38]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[39]  S. Kauffman At Home in the Universe: The Search for the Laws of Self-Organization and Complexity , 1995 .

[40]  Miodrag Potkonjak,et al.  Techniques for intellectual property protection of DSP designs , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[41]  A.Z. Tirkel,et al.  Image watermarking-a spread spectrum application , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.

[42]  Carl Sechen,et al.  Timing Driven Placement for Large Standard Cell Circuits , 1995, 32nd Design Automation Conference.

[43]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[44]  David P. Williamson,et al.  Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming , 1995, JACM.

[45]  Andrew B. Kahng,et al.  Recent directions in netlist partitioning: a survey , 1995, Integr..

[46]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[47]  Bernd Girod,et al.  Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.

[48]  Andrew B. Kahng,et al.  Faster minimization of linear wirelength for global placement , 1997, ISPD '97.

[49]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[50]  John Riordan,et al.  Introduction to Combinatorial Analysis , 1958 .

[51]  Christophe De Vleeschouwer,et al.  Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.

[52]  Bernd Girod,et al.  Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.

[53]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.