Table 9 Comparison of various watermarking methods with proposed watermarking approach.

From: Bio-mimicking DNA fingerprint profiling for HLS watermarking to counter hardware IP piracy

Security/design properties

Proposed DNA fingerprint-based watermark

Hardware watermarking21,23,31

Hardware steganography25

Facial biometric12

DNA biometric30

Numbers of security features generated

Very high

Lower

Lower

Lower

Moderate

Strength of ownership proof

Very high

Lower

Lower

Moderate

Moderate

Security design overhead

Zero

Lower

Lower

Lower

Lower

Resiliency against forgery attack/tampering

Strong

Moderate

Lower

Moderate

Moderate

Strength of the generated security constraints

Very high

Lower

Lower

Moderate

Moderate

Number of security layers for generating hardware security constraints

Very high

Lower

Lower

Moderate

Moderate

Robust authentication using IP vendor’s natural identity

Yes

No

No

Yes

Yes

Usage of external hardware resources (such as camera, scanner, etc.)

No

No

No

Yes

No

Tamper tolerance ability

Very high

Lower

Lower

Moderate

Moderate