A Shamir Threshold Model Based Recoverable IP Watermarking Scheme

  • Weidong Xiao
  • Weihong HuangEmail author
  • Wei Liang
  • Xia Lei
  • Jiahong Cai
  • Yuanming Wang
  • Yanting Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11910)


In order to solve the problems of low IP capacity and low robustness in existing IP watermarking techniques, this paper proposed a novel recoverable IP watermarking algorithm based on Shamir threshold model. This method takes \( \left( {t,n} \right) \) the threshold secret sharing scheme with t as the recovery factor. By constructing a mapping relationship among n sub-keys and watermark information S, n sub-keys of watermark cross-inserted into the respective watermark information S, and finally the embedded watermark information S is reconstructed. Experiment result shows that this method greatly improves the robustness of the watermark while expanding watermark information capacity. Compared to others watermarking algorithms, this method has the advantages of large watermark embedding capacity and high watermark recovery ability.


Threshold scheme Recoverable IP watermark Recovery factor Robustness Self-recoverability 



This research was funded by the Fujian Provincial Natural Science Foundation of China (Grant 2018J01570) and the CERNET Innovation Project (Grant NGII20170411).


  1. 1.
    Liang, W., Xie, S., Li, X., Long, J., Xie, Y., Li, K.-C.: A novel lightweight PUF-based RFID mutual authentication protocol. In: Hung, J.C., Yen, N.Y., Hui, L. (eds.) FC 2017. LNEE, vol. 464, pp. 345–355. Springer, Singapore (2018). Scholar
  2. 2.
    Liang, W., Long, J., Cui, A., et al.: A new robust dual intellectual property watermarking algorithm based on field programmable gate array. J. Comput. Theor. Nanosci. 12(10), 3959–3962 (2015)CrossRefGoogle Scholar
  3. 3.
    Han, Q., Noura, H., Qiu, M., et al.: A user-centric data protection method for cloud storage based on invertible DWT. IEEE Trans. Cloud Comput., 1 (2019)Google Scholar
  4. 4.
    Anirban, S., Dipanjan, R.: Antipiracy-aware IP chipset design for CE devices: a robust watermarking approach hardware matters. IEEE Consum. Electron. Mag. 6(2), 118–124 (2017)CrossRefGoogle Scholar
  5. 5.
    Han, Q., Noura, H., et al.: All-or-nothing data protection for ubiquitous communication: challenges and perspectives. Inf. Sci. 502, 434–445 (2019)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Anirban, S., Saumya, B., Saraju, M.P.: Embedding low cost optimal watermark during high level synthesis for reusable IP core protection. In: IEEE International Symposium on Circuits & Systems, pp. 974–977. IEEE (2016)Google Scholar
  7. 7.
    Abtioglu, E., Yeniceri, R., Govem, B., et al.: Partially reconfigurable IP protection system with ring oscillator based physically unclonable functions, pp. 58–65. IEEE (2017)Google Scholar
  8. 8.
    Zhang, J., Lin, Y., Qu, G.: Reconfigurable binding against FPGA replay attacks. ACM Trans. Des. Autom. Electron. Syst. 20(2), 1–20 (2015)CrossRefGoogle Scholar
  9. 9.
    Cui, A., Qu, G., Zhang, Y.: Ultra-low overhead dynamic watermarking on scan design for hard IP protection. IEEE Trans. Inf. Forensics Secur. 10(11), 2298–2313 (2017)CrossRefGoogle Scholar
  10. 10.
    Liang, W., Huang, W., Chen, W., et al.: Hausdorff distance model-based identity authentication for IP circuits in service-centric internet-of-things environment. Sensors 19(3), 487 (2019)CrossRefGoogle Scholar
  11. 11.
    Liang, W., Long, J., Zhang, D., Li, X., Huang, Y.: Study on IP protection techniques for integrated circuit in IOT environment. In: Di Martino, B., Li, K.-C., Yang, L.T., Esposito, A. (eds.) Internet of Everything. IT, pp. 193–216. Springer, Singapore (2018). Scholar
  12. 12.
    Sengupta, A., Bhadauria, S.: Exploring low cost optimal watermark for reusable IP cores during high level synthesis. IEEE Access 4, 2198–2215 (2016)CrossRefGoogle Scholar
  13. 13.
    OpenCores Web Site. Accessed 25 Jan 2019

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Weidong Xiao
    • 1
  • Weihong Huang
    • 2
    Email author
  • Wei Liang
    • 3
  • Xia Lei
    • 4
  • Jiahong Cai
    • 1
  • Yuanming Wang
    • 1
  • Yanting Li
    • 1
  1. 1.The School of SoftwareXiamen University of TechnologyXiamenChina
  2. 2.The College of Computer Science and Electronic EngineeringHunan UniversityChangshaChina
  3. 3.The School of Opto-Electronic and Communication EngineeringXiamen University of TechnologyXiamenChina
  4. 4.The Department of Computer and TechnologyUniversity of PetroleumBeijingChina

Personalised recommendations