{"id":"https://openalex.org/W2796036243","doi":"https://doi.org/10.1109/mce.2018.2797620","title":"Obfuscated JPEG Image Decompression IP Core for Protecting Against Reverse Engineering [Hardware Matter]","display_name":"Obfuscated JPEG Image Decompression IP Core for Protecting Against Reverse Engineering [Hardware Matter]","publication_year":2018,"publication_date":"2018-04-06","ids":{"openalex":"https://openalex.org/W2796036243","doi":"https://doi.org/10.1109/mce.2018.2797620","mag":"2796036243"},"language":"en","primary_location":{"id":"doi:10.1109/mce.2018.2797620","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mce.2018.2797620","pdf_url":null,"source":{"id":"https://openalex.org/S2483040032","display_name":"IEEE Consumer Electronics Magazine","issn_l":"2162-2248","issn":["2162-2248","2162-2256"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Consumer Electronics Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088900896","display_name":"Dipanjan Roy","orcid":null},"institutions":[{"id":"https://openalex.org/I64295750","display_name":"Indian Institute of Technology Indore","ror":"https://ror.org/01hhf7w52","country_code":"IN","type":"education","lineage":["https://openalex.org/I64295750"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Dipanjan Roy","raw_affiliation_strings":["Software development engineer, Amazon Development Center, Bangalore, India","Computer Science & Engineering, Indian Institute of Technology, Indore, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Software development engineer, Amazon Development Center, Bangalore, India","institution_ids":[]},{"raw_affiliation_string":"Computer Science & Engineering, Indian Institute of Technology, Indore, India#TAB#","institution_ids":["https://openalex.org/I64295750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007001727","display_name":"Anirban Sengupta","orcid":"https://orcid.org/0000-0002-8215-7903"},"institutions":[{"id":"https://openalex.org/I64295750","display_name":"Indian Institute of Technology Indore","ror":"https://ror.org/01hhf7w52","country_code":"IN","type":"education","lineage":["https://openalex.org/I64295750"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anirban Sengupta","raw_affiliation_strings":["Computer science and engineering, Indian Institute of Technology, Indore","Computer Science & Engineering, Indian Institute of Technology, Indore, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer science and engineering, Indian Institute of Technology, Indore","institution_ids":["https://openalex.org/I64295750"]},{"raw_affiliation_string":"Computer Science & Engineering, Indian Institute of Technology, Indore, India#TAB#","institution_ids":["https://openalex.org/I64295750"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088900896"],"corresponding_institution_ids":["https://openalex.org/I64295750"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.04106575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"7","issue":"3","first_page":"104","last_page":"109"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13114","display_name":"Image Processing Techniques and Applications","score":0.972100019454956,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7422951459884644},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.7412410974502563},{"id":"https://openalex.org/keywords/codec","display_name":"Codec","score":0.650741457939148},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5800117254257202},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.5518003702163696},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.5443177223205566},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.43253523111343384},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3919631242752075},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.3334375023841858},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2631682753562927},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.24004560708999634},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.18119075894355774},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17419493198394775}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7422951459884644},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.7412410974502563},{"id":"https://openalex.org/C161765866","wikidata":"https://www.wikidata.org/wiki/Q184748","display_name":"Codec","level":2,"score":0.650741457939148},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5800117254257202},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.5518003702163696},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.5443177223205566},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.43253523111343384},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3919631242752075},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.3334375023841858},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2631682753562927},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.24004560708999634},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.18119075894355774},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17419493198394775},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mce.2018.2797620","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mce.2018.2797620","pdf_url":null,"source":{"id":"https://openalex.org/S2483040032","display_name":"IEEE Consumer Electronics Magazine","issn_l":"2162-2248","issn":["2162-2248","2162-2256"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Consumer Electronics Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2058283171","https://openalex.org/W2127575575","https://openalex.org/W2595054638","https://openalex.org/W2613012925"],"related_works":["https://openalex.org/W2913519194","https://openalex.org/W2007287520","https://openalex.org/W4362634109","https://openalex.org/W2055981842","https://openalex.org/W4388820743","https://openalex.org/W2793135307","https://openalex.org/W3134235726","https://openalex.org/W2906395579","https://openalex.org/W128871440","https://openalex.org/W2532550198"],"abstract_inverted_index":{"Joint":[0],"Photographic":[1],"Experts":[2],"Group":[3],"(JPEG)":[4],"compression":[5,135],"and":[6,30,43,140,151],"decompression":[7,55,119],"(CODEC)":[8],"plays":[9],"a":[10,48,72,89,100],"crucial":[11],"role":[12],"for":[13,92,145],"all":[14],"digital":[15,95],"camera":[16],"devices":[17],"in":[18,40,77,129],"consumer":[19],"electronics":[20],"(CE)":[21],"products.":[22],"Conventional":[23],"JPEG":[24,54,118],"CODEC":[25],"design":[26,50,81,87,111],"techniques":[27],"are":[28],"nontrivial":[29],"vulnerable":[31],"to":[32],"external":[33],"threats":[34],"of":[35,51,64,71,99,124,131,133],"reverse":[36,65],"engineering":[37,66],"that":[38,60],"result":[39],"cloning,":[41],"counterfeiting,":[42],"piracy.":[44],"This":[45],"article":[46],"presents":[47],"novel":[49],"an":[52],"obfuscated":[53,117],"intellectual":[56],"property":[57],"(IP)":[58],"core":[59,86,121],"enhances":[61],"the":[62,69,78,94,110,126,152],"complexity":[63],"attacks":[67],"from":[68,149],"perspective":[70],"rogue":[73],"element":[74],"present":[75],"anywhere":[76],"integrated":[79],"circuit":[80],"flow.":[82],"The":[83,115],"presented":[84],"IP":[85,113,120],"introduces":[88],"simplified":[90],"model":[91],"calculating":[93],"pixel":[96],"intensity":[97],"values":[98],"decompressed":[101],"image":[102,104],"during":[103],"reconstruction":[105],"as":[106,108],"well":[107],"protecting":[109],"against":[112],"cloning.":[114],"proposed":[116],"is":[122],"capable":[123],"achieving":[125],"desired":[127],"results":[128],"terms":[130],"strength":[132],"obfuscation,":[134],"efficiency,":[136],"mean-square":[137],"error":[138],"(MSE),":[139],"peak":[141],"signal-to-noise":[142],"ratio":[143],"(PSNR)":[144],"various":[146],"images":[147],"obtained":[148],"NASA":[150],"Cornell":[153],"University":[154],"public":[155],"database.":[156]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
