Sciweavers

126 search results - page 2 / 26
» Computational Forensic Techniques for Intellectual Property ...
Sort
View
ICCAD
1998
IEEE
83views Hardware» more  ICCAD 1998»
13 years 9 months ago
Signature hiding techniques for FPGA intellectual property protection
John Lach, William H. Mangione-Smith, Miodrag Potk...
DAC
2000
ACM
14 years 6 months ago
Fingerprinting intellectual property using constraint-addition
Recently, intellectual property protection (IPP) techniques attracted a great deal of attention from semiconductor, system integration and software companies. A number of watermar...
Gang Qu, Miodrag Potkonjak
MM
2004
ACM
136views Multimedia» more  MM 2004»
13 years 10 months ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski
ICCAD
1999
IEEE
108views Hardware» more  ICCAD 1999»
13 years 9 months ago
Copy detection for intellectual property protection of VLSI designs
We give the first study of copy detection techniques for VLSI CAD applications; these techniques are complementary to previous watermarking-based IP protection methods in finding ...
Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, ...