Table 9 Comparison of various watermarking methods with proposed watermarking approach.
From: Bio-mimicking DNA fingerprint profiling for HLS watermarking to counter hardware IP piracy
Security/design properties | Proposed DNA fingerprint-based watermark | Hardware steganography25 | Facial biometric12 | DNA biometric30 | |
|---|---|---|---|---|---|
Numbers of security features generated | Very high | Lower | Lower | Lower | Moderate |
Strength of ownership proof | Very high | Lower | Lower | Moderate | Moderate |
Security design overhead | Zero | Lower | Lower | Lower | Lower |
Resiliency against forgery attack/tampering | Strong | Moderate | Lower | Moderate | Moderate |
Strength of the generated security constraints | Very high | Lower | Lower | Moderate | Moderate |
Number of security layers for generating hardware security constraints | Very high | Lower | Lower | Moderate | Moderate |
Robust authentication using IP vendor’s natural identity | Yes | No | No | Yes | Yes |
Usage of external hardware resources (such as camera, scanner, etc.) | No | No | No | Yes | No |
Tamper tolerance ability | Very high | Lower | Lower | Moderate | Moderate |