QuardTropy: Detecting and Quantifying Unauthorized Information Leakage in Hardware Designs using g-entropy.
Hasan Al ShaikhMohammad Bin MonjilKimia Zamiri AzarFarimah FarahmandiMark M. TehranipoorFahim RahmanPublished in: DFT (2023)
Keyphrases
- information leakage
- hardware designs
- secret information
- sensitive information
- personal information
- image authentication
- data hiding
- third party
- information hiding
- multimedia content
- data privacy
- copyright protection
- digital images
- digital content
- model based diagnosis
- image processing
- privacy preserving
- signal processing