Sciweavers

126 search results - page 2 / 26
» Computational Forensic Techniques for Intellectual Property ...
Sort
View
ICCAD
1998
IEEE
83views Hardware» more  ICCAD 1998»
15 years 1 months ago
Signature hiding techniques for FPGA intellectual property protection
John Lach, William H. Mangione-Smith, Miodrag Potk...
DAC
2000
ACM
15 years 10 months ago
Fingerprinting intellectual property using constraint-addition
Recently, intellectual property protection (IPP) techniques attracted a great deal of attention from semiconductor, system integration and software companies. A number of watermar...
Gang Qu, Miodrag Potkonjak
MM
2004
ACM
136views Multimedia» more  MM 2004»
15 years 2 months ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski
ICCAD
1999
IEEE
108views Hardware» more  ICCAD 1999»
15 years 1 months ago
Copy detection for intellectual property protection of VLSI designs
We give the first study of copy detection techniques for VLSI CAD applications; these techniques are complementary to previous watermarking-based IP protection methods in finding ...
Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, ...