Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing.
Nidish VashisthaM. Tanjidur RahmanHao-Ting ShenDamon L. WoodardNavid AsadizanjaniMark M. TehranipoorPublished in: J. Hardw. Syst. Secur. (2018)
Keyphrases
- image processing
- machine vision
- signal processing
- low cost
- pattern recognition
- surface inspection
- third party
- hardware and software
- digital image processing
- hardware implementation
- image segmentation
- edge detection
- real time
- image denoising
- computer vision
- image analysis
- image enhancement
- real world
- feature extraction
- denoising
- remote sensing
- visual inspection
- computing systems
- color images
- digital signal processing
- image processing algorithms
- automatic detection
- vlsi implementation
- computer systems
- database
- data sets
- physical world
- high end
- quality control
- web intelligence
- partial differential equations
- data acquisition
- hough transform
- computer graphics
- privacy preserving
- image restoration
- image registration