Sciweavers

54 search results - page 5 / 11
» Watermarking Techniques for Intellectual Property Protection
Sort
View
DAC
2000
ACM
14 years 8 months ago
Fingerprinting intellectual property using constraint-addition
Recently, intellectual property protection (IPP) techniques attracted a great deal of attention from semiconductor, system integration and software companies. A number of watermar...
Gang Qu, Miodrag Potkonjak
DAC
2001
ACM
14 years 8 months ago
Watermarking of SAT using Combinatorial Isolation Lemmas
Watermarking of hardware and software designs is an effective mechanism for intellectual property protection (IPP). Two important criteria for watermarking schemes are credibility...
Rupak Majumdar, Jennifer L. Wong
DAC
2000
ACM
14 years 1 days ago
Watermarking while preserving the critical path
In many modern designs, timing is either a key optimization goal and/or a mandatory constraint. We propose the first intellectual property protection technique using watermarking ...
Seapahn Meguerdichian, Miodrag Potkonjak
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
IH
2007
Springer
14 years 1 months ago
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation
The recent decade has seen the emergence of 3D meshes in industrial, medical and entertainment applications. Therefore, their intellectual property protection problem has attracted...
Kai Wang, Guillaume Lavoué, Florence Denis,...