{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T01:43:00Z","timestamp":1654134180500},"reference-count":0,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7,1]]},"abstract":"<p>Many watermarking techniques for intellectual property (IP) protection are not resilient to tampering or removal attacks, especially for field programmable gate array (FPGA)-based IP cores. If attacked, the damaged watermarks cannot provide sufficient evidence in front of a court. To address this issue, the authors present a signature restoration scheme. The thought of secret sharing is introduced to share the signature into small watermarks. These watermarks are encoded with Reed-Solomon (RS) codes and embedded into unused lookup tables (LUTs) of used slices. Unlike most of existing techniques, the proposed scheme can restore the signature only by extracting parts of watermarks. So, it is tolerant to some damaged watermarks caused by removal attacks. The experiments show that the proposed scheme incurs no extra hardware resource and timing overhead. The robustness against attacks is much better by comparing to other schemes.<\/p>","DOI":"10.4018\/ijisp.2015070103","type":"journal-article","created":{"date-parts":[[2016,3,21]],"date-time":"2016-03-21T17:40:50Z","timestamp":1458582050000},"page":"41-56","source":"Crossref","is-referenced-by-count":2,"title":["Signature Restoration for Enhancing Robustness of FPGA IP Designs"],"prefix":"10.4018","volume":"9","author":[{"given":"Jing","family":"Long","sequence":"first","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"given":"Dafang","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"given":"Wei","family":"Liang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"}]},{"given":"Xia'an","family":"Bi","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science, Hunan Normal University, Changsha, China"}]}],"member":"2432","container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=148302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T01:16:23Z","timestamp":1654132583000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2015070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2015,7,1]]},"references-count":0,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2015070103","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,1]]}}}