Abstract
For the copyright protection in intellectual property reuse technology, we must ensure that when an intellectual property watermark verifier leaks the secret key of an intellectual property watermark system, a malicious attacker could not guess the key to facilitate successful attacks on the watermarks. Therefore, this work proposes a robust intellectual property watermarking algorithm based on elliptic-curve cryptography. The physical layout of intellectual property design is abstracted into a graph with tree structure by using the topology theory. A secure model based on the asymmetric encryption model is proposed to encrypt the watermark positions. The generated graph and a random searching algorithm are used for the distribution of the watermark positions. Finally, the watermarks are inserted by reordering the redundant attributes in the graph. The experiments show that the proposed algorithm will insert more watermark constraints under the same condition. Thus, the probability of coincidence is lower, achieving good reliability. In addition, when the watermarks are impaired due to attacks, the algorithm can restore the original watermarks from the topology graph. In comparison to other algorithms, the proposed algorithm has good performance in watermark capacity and overhead, as well as provides resilience to the typical attacks.
Keywords
Introduction
Significant investment (e.g. research and development costs) is required in integrated chip design, and therefore, intellectual property (IP) reuse reduces development costs. 1 However, there is potential for abuse, such as illegal resale and forgery of the reused IP, which has financial implications for the IP designer and affects the IP designer’s competitive advantage. The Virtual Socket Interface Alliance (VSIA) was established to protect the IP of integrated circuit designers, and IP protection for integrated circuits is a topic of ongoing interest. 2 Digital IP watermarking technique is one commonly used approach. In such a technique, an invisible and hard-to-remove code is inserted into a design for IP protection. 3
To ensure the robustness and the security of watermarking techniques, the verifier generates a secret key with the key generator and embeds a watermark into a target design. Gal and Bossuet 4 proposed an automatic low-cost IP watermarking algorithm based on output mark insertions. It realizes protection depending on the mathematical relationship between input and input number at specific time. Shastry 5 addressed the security threats (e.g. cloning, reverse engineering, tampering) by obfuscating the netlist of the design. The implementation is simple, and each design is obfuscated independently. The algorithm can achieve high security and efficiency. Zhang et al. 6 proposed an field programmable gate array (FPGA) IP protection technique by binding physical unclonable function with finite state machine of the target design. The license-based locking and unlocking mechanism is utilized to realize the pay-per-use of the device. Meade et al. 7 designed a reverse engineering finite state machine (REFSM) by reconfiguring the logic circuit of the high-level hardware description. It can restore the control logic of the circuit from the netlist with different complexity. Besides, the malicious logic circuit can be recognized from the obfuscated netlist. Sengupta et al. 8 proposed a triple-phase watermarking algorithm for reusable IP core protection. The watermark configuration needs a complete coding of seven variables. So, it can resist the external attacks effectively and the probability of coincidence is much lower. Liu and Li 9 proposed to lock the hard IP at physical level based on the key locking mechanism. The IP core cannot work normally without the key, which denotes the unique signatures of IP owner and buyer. In this case, the IP core can be effectively traced. Liang et al. 10 proposed an IP protection algorithm based on two-dimensional chaotic mapping. The selection of the watermark positions is determined by the generated chaotic sequence. The watermark segments are randomly distributed into these positions. Long et al. 11 proposed a low-cost IP watermarking algorithm for the protection of FPGA IP design. The signature is distributed orderly and the actual content of the watermark is compressed to reduce the resource overhead. Cui et al. 12 , 13 proposed an ultra-low overhead dynamic watermarking on scan design for hard IP protection. By analysis, an optimized scan design uses two complementary connections between two adjacent scan cells. Such scan design flexibility in the selection of local connection can be utilized to embed watermarking constraints. It can conveniently be implemented by local rewiring and/or introducing dummy scan cells. The test vectors will be changed accordingly to reflect the watermarked connection styles to guarantee the test coverage. The inserted watermark can be extracted from the test vectors and/or the corresponding scan output.
Most of the watermarking algorithms belong to IP protection and verification techniques based on traditional encryption model.14–16 The watermarking embedding procedure shares the same secret key with the extraction procedure. 17 , 18 Thus, if the key is leaked by the malicious verifier, the watermarks will be easily tampered or removed. In this work, we consider the real application and propose a symmetric encryption model-based IP watermarking algorithm. The thought of symmetric encryption is used in this technique. For IP design based on FPGA, the unused lookup table (LUT) structures are reordered for indicating the generated watermarks. In this way, the malicious attacker cannot reversely deduce the existence of the watermarks. The proposed algorithm can restore the impaired watermark after suffering from attacks, which achieves the following goals.
In this article, we propose a robust IP watermarking algorithm for protecting the copyright of FPGA design. The main contributions are listed as follows. We propose elliptic-curve cryptography (ECC)–based IP watermarking model. The proposed algorithm inserts the ownership information into the hardware circuit after encryption. The ECC model is used for encryption and decryption. The algorithm can restore the impaired watermark after suffering from attacks. The experiments show that the performance in terms of overhead and robustness are encouraging.
This work is organized as follows. The “Preliminaries” section introduces the preliminaries of this article. The algorithm is detailed in the “ECC-based IP watermarking algorithm” section. The “Experimental result” section evaluates the performance of the proposed algorithm, including embedding capacity, detection probability, and resistance against attacks. The “Conclusion” section summarizes this article.
Preliminaries
In this section, some mathematical theories of ECC
19
,
20
are introduced as the foundation of the proposed algorithm. At the elliptic curve, we select two points
Elliptic curve is derived from elliptic integral, as expressed below
Here,
The elliptic curve in equation (2) is continuous and not suitable for encryption. However, in finite field
In ECC group of the finite field
Here,

Encryption principle of ECC.
For all
1.
2. If
3. Two points
Here,
4. If
Here
When
ECC-based IP watermarking algorithm
Digital IP watermarking technique derives from the copyright protection in media. But the carrier is different from that in media. So, the watermarking implementation is different. 21 In Figure 2, Alice should first generate the watermark sequence with her own signature using the watermark generator. To ensure the security, two secret keys are generated, respectively, as the public key KEY1 and the private key KEY2. When IP disputes occur, the prover Alice will prove the existence of the inserted watermark to the verifier Bob by using an asymmetric encryption-based bidirectional authentication protocol. Alice uses the private key for watermark embedding. The sequence will be then inserted into the design without affecting the normal functionality of IP circuit. Thus, the watermarked design is generated and then propagated in market trading. The public key will be used in watermark detection. The private key is reserved, whereas the public key can be used by anyone who wants to detect the watermark. Finally, Alice provides an evidence of the watermark to Bob with the asymmetric bidirectional authentication protocol. The procedure will not leak the information about the private key.

The structure of IP watermarking technique.
ECC-based interactive protocol
Since the parameters in the field of the elliptic curve are public, Alice and Bob can share the encryption. In this work, we use the prime field
Alice and Bob are, respectively, the prover and the verifier in this protocol. IP watermark is designed as a one-way hash function, which controls the random bit generator. If an attacker Eve wants to attack the watermark, he will provide enough outputs of the one-way hash function. Otherwise, he cannot know the signal bit generated by this function. Therefore, the one-way hash function plays a role of secure encryption tool in this protocol. The implementation of the protocol is shown in Figure 3.

The interaction of ECC-based protocol.
Bob selects an elliptic curve Bob selects a random integer
Arbitrary Arbitrary
If the third party or the detector deliberately leaks the key information ∂, the security can still be guaranteed. N participants with less information cannot obtain the key.
IP watermark embedding
To enhance the robustness and the security of IP watermark, an asymmetric ECC encryption protocol is designed in watermark embedding. Assume the watermark sequence is
By analyzing the characteristic attributes of numerous unused LUTs, we find that the impact on IP performance can be ignored when the characteristic values of the redundant attribute of a few unused LUTs are changed. This feature allows us to insert watermark into the characteristic values of the redundant attributes of unused LUTs. The concrete procedure to embed watermarks is illustrated as follows:

The chart of watermark embedding: (a) the structure of the topology graph, (b) the positions for watermark embedding, (c) the chart of nodes in the design, and (d) the connection of nodes before and after watermarking.

The structure of watermark traversing process.
IP watermark extraction
In watermark extraction, the secret key used in watermark embedding is utilized to locate the marked positions. The watermarks are extracted by searching algorithm. It is a reverse process of the watermark embedding. The chart of watermark extraction is shown in Figure 6, and the concrete steps are described as follows:
Here,
Separate Calculate The same method can be used to get
Here,
Here,

The chart of watermark extraction.
Experimental result
In this section, we conduct a series of experiments to verify the performance of the proposed algorithm. All the experiments are conducted on a machine with Intel Pentium Dual-Core CPU 2.0 GHZ CPU and 2 GB memory. Very high speed integrated hardware description language (VHDL) and C++ language are used in the experiments. ISCAS’89 and some open-source cores are used as the benchmarks, which contain circuits of various types, from simple circuit module to complex very large-scale circuit. The performance of timing, resource, and resistance against attacks is verified.
Embedding capacity and hardware overhead
There is a close relationship between watermark capacity and the hardware overhead. Assume the watermark capacity is

The performance of watermark embedding: (a) the relationship between power consumption and watermark capacity, and (b) the relationship between embedding time and watermark capacity.
In Figure 7, with the increase of watermark capacity,
Detection probability
In this section, the detection probability is used to evaluate the performance of watermark verification. When the watermarks and the signals satisfy Gaussian distribution, the linear correlation detector can be used to detect the watermarks. Here, we use the asymmetric ECC-based detector and the symmetric detector, respectively, for watermark detection. For three IP circuits DES, AES, and RSA, we insert different number of watermark fragments into the design and simulate the removal attacks on these watermarked designs. The watermarks after being attacked are then detected. The evaluation and comparison of detection probability are shown in Figure 8. The evaluation of detection probability is shown in Figure 8(a) and (b). In Figure 8(a), the watermarks are detected by the asymmetric detector, and Figure 8(b) is the result of watermark detection using the symmetric detector. By comparing to algorithms in Castillo et al. 24 and Nie & Toyonaga, 25 the detection probability in Figure 8(a) is larger than that of Figure 8(b) Therefore, the asymmetric detector shows better performance in terms of transparency and security.

Watermark detection rate of three watermarking methods: (a) watermark detection using asymmetric detector and (b) watermark detection using symmetric detector.
Resistance against attacks
The resistance against attacks is the ability of IP watermarks against illegal attacks. In practical application, common attacks include removal attack, collusion attack, and so on. This section analyzes the resistance against attacks for the proposed algorithm.
Removal attack
This attack aims to remove the watermarks directly. This section evaluates the ability against the removal attacks with the metric of damage rate. The result is shown in Table 1. First, several removal attacks are performed on a watermarked design with different attack strength. The resistance against removal attacks is compared to other algorithms as well. With the increase of attack strength, the proposed algorithm achieves lower damage rate by comparing to other algorithms. It shows good robustness against removal attacks.
Performance comparison for IP watermark detection.
IP: intellectual property.
Collusion attack
The purpose of collusion users is to acquire more data with the holding secret key. By comparing to direct capture and eavesdrop attack, collusion attack needs less overhead and is not easy to be detected. Simply, we assume there is only one watermark fragment inserted into each LUT. The number of the collusion users is set as 80. The probability of watermark leakage is evaluated when the number of collusion users varies from 10 to 80. Figure 9 shows a comparison of three algorithms in terms of resistance against collusion attacks. When there are less collusion users, the ability of three algorithms against collusion attacks is different. With the increase of collusion users, the probability of watermark leakage in Nie and Toyonaga 25 and Schmid et al. 26 increases accordingly. The probability of leaking watermark is lower in the proposed algorithm. When the collusion users are more than 60, the probability in Nie and Toyonaga 25 increases rapidly than that in Schmid et al. 26 It is because the use of random number in the generation of secret key. In fact, it is pseudo-random number, which can be found with enumeration. The algorithm in Schmid et al. 26 eliminates the adverse factor and updates the main secret key periodically. If a malicious user is found, the operation will be canceled. In the proposed algorithm, the collusion users can only obtain their own data and cannot acquire data from other nodes. So, the impact on the security is much less.

The evaluation of the ability against collusion attack for three methods.
Conclusion
This work proposed an asymmetric ECC-based IP watermarking algorithm for IP protection. The topology theory is used to process the IP layout, and an asymmetric ECC-based encryption model is proposed. An improved searching algorithm is used to promote the efficiency of watermark embedding. It provides a novel thought for IP watermarking techniques depending on the strength of secret key. The proposed algorithm has no impact on the normal functionality of IP circuit and lower hardware overhead. The robustness and security of the proposed algorithm is also encouraging. It can be applied for FPGA IP protection in various devices. But the ability of real-time processing should be further enhanced. Besides, the asymmetric IP watermarking algorithm should also address the watermark protection and authentication issues by using mutual watermark correlation when the private key is leaked. It will be considered in our future work.
Footnotes
Handling Editor: Fei Yu
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work is supported by the National Science Foundation of China (Grant 61572188), Xiamen Science and Technology Foundation (Grant 3502Z20173035), Scientific Research Program of New Century Excellent Talents in Fujian Province University, Fujian Provincial Natural Science Foundation of China (Grant 2018J01570), in part by the CERNET Innovation Project under Grant NGII20170411, the National Nature Science Foundation of Fujian Province (Grant 2018J01544), National Natural Science Foundation of China (Grant 61872138), the Scientific Research Program of Outstanding Young Talents in Universities of Fujian Province, the Key Project of Natural Foundation for Young in Colleges of Fujian Province (Grant JZ160466).
