Chapter 1: Introduction to IP core protection and hardware-assisted security of consumer electronics Chapter 2: Security in consumer electronics and internet of things (IoT) Chapter 3: Trojan security aware DSP IP core and integrated circuits Chapter 4: IP core and integrated circuit protection using robust watermarking Chapter 5: Symmetrical protection of DSP IP core and integrated circuits using fingerprinting and watermarking Chapter 6: Computational forensic engineering for resolving ownership conflict of DSP IP core Chapter 7: Structural obfuscation of DSP cores used in CE devices Chapter 8: Functional obfuscation of DSP cores used in CE devices Chapter 9: Obfuscation of JPEG CODEC IP core for CE devices Chapter 10: Advanced encryption standard (AES) and its hardware watermarking for ownership protection Chapter 11: Hardware approaches for media and information protection and authentication Chapter 12: Physical unclonable functions (PUFs) n standard (AES) and its hardware watermarking for ownership protection Chapter 11: Hardware approaches for media and information protection and authentication Chapter 12: Physical unclonable functions (PUFs) n standard (AES) and its hardware watermarking for ownership protection Chapter 11: Hardware approaches for media and information protection and authentication Chapter 12: Physical unclonable functions (PUFs) n standard (AES) and its hardware watermarking for ownership protection Chapter 11: Hardware approaches for media and information protection and authentication Chapter 12: Physical unclonable functions (PUFs).
IP Core Protection and Hardware-Assisted Security for Consumer Electronics