Utilisation of multipath phenomenon to improve the performance of BCH and RS codes

Author(s):  
Alyaa Al-Barrak ◽  
Ali Al-Sherbaz ◽  
Triantafyllos Kanakis ◽  
Robin Crockett
Keyword(s):  
2009 ◽  
Vol 3 (6) ◽  
pp. 1041 ◽  
Author(s):  
Y.L. Grushevsky ◽  
G.F. Elmasry

2015 ◽  
Vol 9 (3) ◽  
pp. 41-56 ◽  
Author(s):  
Jing Long ◽  
Dafang Zhang ◽  
Wei Liang ◽  
Xia'an Bi

Many watermarking techniques for intellectual property (IP) protection are not resilient to tampering or removal attacks, especially for field programmable gate array (FPGA)-based IP cores. If attacked, the damaged watermarks cannot provide sufficient evidence in front of a court. To address this issue, the authors present a signature restoration scheme. The thought of secret sharing is introduced to share the signature into small watermarks. These watermarks are encoded with Reed-Solomon (RS) codes and embedded into unused lookup tables (LUTs) of used slices. Unlike most of existing techniques, the proposed scheme can restore the signature only by extracting parts of watermarks. So, it is tolerant to some damaged watermarks caused by removal attacks. The experiments show that the proposed scheme incurs no extra hardware resource and timing overhead. The robustness against attacks is much better by comparing to other schemes.


Computers ◽  
2017 ◽  
Vol 6 (2) ◽  
pp. 21 ◽  
Author(s):  
Alyaa Al-Barrak ◽  
Ali Al-Sherbaz ◽  
Triantafyllos Kanakis ◽  
Robin Crockett

2013 ◽  
Vol 49 (15) ◽  
pp. 940-941
Author(s):  
Erl‐Huei Lu ◽  
Pen‐Yao Lu ◽  
Tso‐Cho Chen
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document