{"id":"https://openalex.org/W2106288061","doi":"https://doi.org/10.1109/iccta.2007.17","title":"A Novel Scheme for Encoding and Watermark Embedding in VLSI Physical Design for IP Protection","display_name":"A Novel Scheme for Encoding and Watermark Embedding in VLSI Physical Design for IP Protection","publication_year":2007,"publication_date":"2007-03-01","ids":{"openalex":"https://openalex.org/W2106288061","doi":"https://doi.org/10.1109/iccta.2007.17","mag":"2106288061"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccta.2007.17","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101919576","display_name":"Debasri Saha","orcid":"https://orcid.org/0000-0002-7935-0980"},"institutions":[{"id":"https://openalex.org/I6498739","display_name":"Indian Statistical Institute","ror":"https://ror.org/00q2w1j53","country_code":"IN","type":"education","lineage":["https://openalex.org/I6498739"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debasri Saha","raw_affiliation_strings":["Indian Stat. Inst., Kolkata"],"affiliations":[{"raw_affiliation_string":"Indian Stat. Inst., Kolkata","institution_ids":["https://openalex.org/I6498739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110256937","display_name":"Parthasarathi Dasgupta","orcid":null},"institutions":[{"id":"https://openalex.org/I71495548","display_name":"Indian Institute of Management Calcutta","ror":"https://ror.org/02zhewk16","country_code":"IN","type":"education","lineage":["https://openalex.org/I71495548"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Parthasarathi Dasgupta","raw_affiliation_strings":["Indian institute of Management Calcutta, India"],"affiliations":[{"raw_affiliation_string":"Indian institute of Management Calcutta, India","institution_ids":["https://openalex.org/I71495548"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021904459","display_name":"Susmita Sur\u2010Kolay","orcid":"https://orcid.org/0000-0002-2052-3779"},"institutions":[{"id":"https://openalex.org/I6498739","display_name":"Indian Statistical Institute","ror":"https://ror.org/00q2w1j53","country_code":"IN","type":"education","lineage":["https://openalex.org/I6498739"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Susmita Sur-Kolay","raw_affiliation_strings":["Indian Statistical institute India"],"affiliations":[{"raw_affiliation_string":"Indian Statistical institute India","institution_ids":["https://openalex.org/I6498739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111494192","display_name":"Samar Sensarma","orcid":null},"institutions":[{"id":"https://openalex.org/I106542073","display_name":"University of Calcutta","ror":"https://ror.org/01e7v7w47","country_code":"IN","type":"education","lineage":["https://openalex.org/I106542073"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Samar Sen-Sarma","raw_affiliation_strings":["University of Calcutta, , India"],"affiliations":[{"raw_affiliation_string":"University of Calcutta, , India","institution_ids":["https://openalex.org/I106542073"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.37,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":7,"citation_normalized_percentile":{"value":0.586561,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":80,"max":81},"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"116"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9761,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7337044},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.723675},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.598812},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.57304245},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5285035},{"id":"https://openalex.org/C14580979","wikidata":"https://www.wikidata.org/wiki/Q876049","display_name":"Very-large-scale integration","level":2,"score":0.4955386},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4883039},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.431817},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.38139126},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35686332},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3384108},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0908871},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccta.2007.17","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.78,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":10,"referenced_works":["https://openalex.org/W1568614804","https://openalex.org/W2052027679","https://openalex.org/W2062567760","https://openalex.org/W2100286483","https://openalex.org/W2108987401","https://openalex.org/W2116590916","https://openalex.org/W2140345173","https://openalex.org/W329998640","https://openalex.org/W4210419940","https://openalex.org/W4255452013"],"related_works":["https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W2358993821","https://openalex.org/W2137394636","https://openalex.org/W2098152888","https://openalex.org/W2080353903","https://openalex.org/W2040356834","https://openalex.org/W1559740347","https://openalex.org/W1516446231","https://openalex.org/W1514507288"],"abstract_inverted_index":{"The":[0,96,126],"emerging":[1],"trend":[2],"of":[3,12,16,20,24,30,53,76,90,101],"design":[4,25,79,92],"reuse":[5],"in":[6,68],"VLSI":[7,69],"circuits":[8],"poses":[9],"the":[10,21,41,51,57,91,102,110,114,123,138],"threat":[11],"theft":[13],"and":[14,56,64,84,113,133,137],"misappropriation":[15],"intellectual":[17],"property":[18],"(IP)":[19],"design.":[22,71],"Protection":[23],"IP":[26,66],"is":[27,129],"a":[28,36,77],"matter":[29],"prime":[31],"concern":[32],"today.":[33],"We":[34],"propose":[35],"scheme":[37,98],"SECURE_IP,":[38],"which":[39],"tackles":[40],"problem":[42],"from":[43],"an":[44],"entirely":[45],"new":[46],"viewpoint.":[47],"It":[48,72],"relies":[49],"on":[50,131],"application":[52],"cryptographic":[54],"principles":[55],"watermarking":[58],"techniques":[59],"to":[60],"provide":[61],"both":[62],"direct":[63],"indirect":[65],"protection":[67],"physical":[70],"makes":[73],"unauthorized":[74],"disclosure":[75],"valuable":[78],"infeasible":[80],"during":[81,94],"its":[82],"transmission,":[83],"can":[85,118],"easily":[86],"detect":[87],"any":[88],"alteration":[89],"file":[93],"transmission.":[95],"proposed":[97,124],"ensures":[99],"authentication":[100],"original":[103],"designer":[104,111],"as":[105,107],"well":[106],"non-repudiation":[108],"between":[109],"(seller)":[112],"buyer.":[115],"Illegal":[116],"reselling":[117],"be":[119],"efficiently":[120],"detected":[121],"by":[122],"scheme.":[125],"algorithm":[127],"SECURE_IP":[128],"tested":[130],"random":[132],"MCNC":[134],"benchmark":[135],"instances,":[136],"experimental":[139],"results":[140],"are":[141],"quite":[142],"encouraging":[143]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2106288061","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-01-22T07:54:13.132641","created_date":"2016-06-24"}