A chaotic-based publicly verifiable FPGA IP watermark detection scheme

XiangQi WANG,JiLiang ZHANG,YongQiang LYU,YaPing LIN
DOI: https://doi.org/10.1360/112012-466
2013-01-01
Abstract:IP(intellectual property) infringement has been a serious problem to FPGA vendors or IP designer.Watermarking is a novel technique for FPGA IP protection,while existing FPGA watermarking techniques may give away sensitive information during the public verifcation(e.g.the content or position of watermarks),which enables malicious verifers or third parties to remove the watermarks and resell the design.Existing zero-knowledge watermarking verifcation schemes are able to address the sensitive information leakage issue but are vulnerable to embedding attacks,which makes it inefective in preventing denying infringement of un-trusted buyers(verifers).This paper presents a new chaotic-based publicly verifable zero knowledge watermark detection scheme for FPGA IP protection.This scheme is both resilient against the sensitive information leakage issue and removing attacks,thus robust to cheating from provers,verifers or the third party.In traditional FPGA watermarking techniques,watermarks are embedded in the used Slices,thus the area overhead is proportional to the number of embedded watermarks. In the proposed scheme, watermarks are hidden in the unused LUTs of used Slices, introducing zero area and timing overheads. Chaotic systems are sensitive to initial values and convenient to produce numerous pseudo-random numbers with ultra-low coefcients and perfect statistical property. These advantages match the specifc requirements for the random location permutation of the LUTs in the FPGA bit-stream fle in the zero knowledge protocol, bringing an ultra-high robustness of LUT location permutation. The timestamp mechanism is also introduced in this paper to resist embedding attacks against denying the infringement from un-trusted IP buyers(verifers). Experimental results and analysis show that the proposed scheme is signifcantly better than the latest related literatures in both watermarking overheads and robustness of location permutation.
What problem does this paper attempt to address?