Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (23)

Search Parameters:
Keywords = intellectual property modules

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 14390 KB  
Article
Customized Chromosomal Microarrays for Neurodevelopmental Disorders
by Martina Rincic, Lukrecija Brecevic, Thomas Liehr, Kristina Gotovac Jercic, Ines Doder and Fran Borovecki
Genes 2025, 16(8), 868; https://doi.org/10.3390/genes16080868 - 24 Jul 2025
Viewed by 598
Abstract
Background: Neurodevelopmental disorders (NDDs), including autism spectrum disorder (ASD), are genetically complex and often linked to structural genomic variations such as copy number variants (CNVs). Current diagnostic strategies face challenges in interpreting the clinical significance of such variants. Methods: We developed a customized, [...] Read more.
Background: Neurodevelopmental disorders (NDDs), including autism spectrum disorder (ASD), are genetically complex and often linked to structural genomic variations such as copy number variants (CNVs). Current diagnostic strategies face challenges in interpreting the clinical significance of such variants. Methods: We developed a customized, gene-oriented chromosomal microarray (CMA) targeting 6026 genes relevant to neurodevelopment, aiming to improve diagnostic yield and candidate gene prioritization. A total of 39 patients with unexplained developmental delay, intellectual disability, and/or ASD were analyzed using this custom platform. Systems biology approaches were employed for downstream interpretation, including protein–protein interaction networks, centrality measures, and tissue-specific functional module analysis. Results: Pathogenic or likely pathogenic CNVs were identified in 31% of cases (9/29). Network analyses revealed candidate genes with key topological properties, including central “hubs” (e.g., NPEPPS, PSMG1, DOCK8) and regulatory “bottlenecks” (e.g., SLC15A4, GLT1D1, TMEM132C). Tissue- and cell-type-specific network modeling demonstrated widespread gene involvement in both prenatal and postnatal developmental modules, with glial and astrocytic networks showing notable enrichment. Several novel CNV regions with high pathogenic potential were identified and linked to neurodevelopmental phenotypes in individual patient cases. Conclusions: Customized CMA offers enhanced detection of clinically relevant CNVs and provides a framework for prioritizing novel candidate genes based on biological network integration. This approach improves diagnostic accuracy in NDDs and identifies new targets for future functional and translational studies, highlighting the importance of glial involvement and immune-related pathways in neurodevelopmental pathology. Full article
(This article belongs to the Section Neurogenomics)
Show Figures

Figure 1

16 pages, 7294 KB  
Article
Differential Regulation of Nav1.1 and SCN1A Disease Mutant Sodium Current Properties by Fibroblast Growth Factor Homologous Factors
by Ashley Frazee, Agnes Zybura and Theodore R. Cummins
Cells 2025, 14(4), 291; https://doi.org/10.3390/cells14040291 - 15 Feb 2025
Viewed by 1306
Abstract
Fibroblast growth factor homologous factors (FHFs) regulate the activity of several different voltage-gated sodium channels (Navs). However, more work is needed to determine how specific FHF isoforms and variants affect the properties of different Nav isoforms. In addition, it is [...] Read more.
Fibroblast growth factor homologous factors (FHFs) regulate the activity of several different voltage-gated sodium channels (Navs). However, more work is needed to determine how specific FHF isoforms and variants affect the properties of different Nav isoforms. In addition, it is not known if FHFs can differentially modulate the properties of Nav variants associated with disease. Here, we investigated the effects of FHF2A and FHF2B on Nav1.1 properties as well as on a familial hemiplegic migraine 3 (FHM3) causing mutation in this channel, F1774S. We found that FHF2A, but not 2B, induced prominent long-term inactivation (LTI) in the wild-type (WT) Nav1.1. Interestingly, FHF2A induced LTI in the F1774S FHM3 mutant channel to a greater extent than in the WT. Furthermore, persistent currents caused by the F1774S mutation were attenuated by the co-expression of FHF2A, leading to a possible rescue of the mutant channel phenotype. By contrast, the P1894L mutation, which is associated with epilepsy and mild intellectual disability, greatly attenuated the LTI induced by FHF2A. Overall, our data show for the first time that FHF2A might be a significant modulator of Nav1.1 that can differentially modulate the impact of Nav1.1 disease-associated mutations. Full article
(This article belongs to the Special Issue Ion Channels in Pain: Mechanisms and Therapeutics)
Show Figures

Figure 1

20 pages, 732 KB  
Article
VCONV: A Convolutional Neural Network Accelerator for FPGAs
by Srikanth Neelam and A. Amalin Prince
Electronics 2025, 14(4), 657; https://doi.org/10.3390/electronics14040657 - 8 Feb 2025
Cited by 2 | Viewed by 2029
Abstract
Field Programmable Gate Arrays (FPGAs), with their wide portfolio of configurable resources such as Look-Up Tables (LUTs), Block Random Access Memory (BRAM), and Digital Signal Processing (DSP) blocks, are the best option for custom hardware designs. Their low power consumption and cost-effectiveness give [...] Read more.
Field Programmable Gate Arrays (FPGAs), with their wide portfolio of configurable resources such as Look-Up Tables (LUTs), Block Random Access Memory (BRAM), and Digital Signal Processing (DSP) blocks, are the best option for custom hardware designs. Their low power consumption and cost-effectiveness give them an advantage over Graphics Processing Units (GPUs) and Central Processing Units (CPUs) in providing efficient accelerator solutions for compute-intensive Convolutional Neural Network (CNN) models. CNN accelerators are dedicated hardware modules capable of performing compute operations such as convolution, activation, normalization, and pooling with minimal intervention from a host. Designing accelerators for deeper CNN models requires FPGAs with vast resources, which impact its advantages in terms of power and price. In this paper, we propose the VCONV Intellectual Property (IP), an efficient and scalable CNN accelerator architecture for applications where power and cost are constraints. VCONV, with its configurable design, can be deployed across multiple smaller FPGAs instead of a single large FPGA to provide better control over cost and parallel processing. VCONV can be deployed across heterogeneous FPGAs, depending on the performance requirements of each layer. The IP’s performance can be evaluated using embedded monitors to ensure that the accelerator is configured to achieve the best performance. VCONV can be configured for data type format, convolution engine (CE) and convolution unit (CU) configurations, as well as the sequence of operations based on the CNN model and layer. VCONV can be interfaced through the Advanced Peripheral Bus (APB) for configuration and the Advanced eXtensible Interface (AXI) stream for data transfers. The IP was implemented and validated on the Avnet Zedboard and tested on the first layer of AlexNet, VGG16, and ResNet18 with multiple CE configurations, demonstrating 100% performance from MAC units with no idle time. We also synthesized multiple VCONV instances required for AlexNet, achieving the lowest BRAM utilization of just 1.64 Mb and deriving a performance of 56GOPs. Full article
(This article belongs to the Special Issue Convolutional Neural Networks and Vision Applications, 3rd Edition)
Show Figures

Figure 1

24 pages, 1924 KB  
Article
Efficient Embedded System for Drowsiness Detection Based on EEG Signals: Features Extraction and Hardware Acceleration
by Aymen Zayed, Emanuel Trabes, Jimmy Tarrillo, Khaled Ben Khalifa and Carlos Valderrama
Electronics 2025, 14(3), 404; https://doi.org/10.3390/electronics14030404 - 21 Jan 2025
Viewed by 2455
Abstract
Drowsiness detection is crucial for ensuring the safety of individuals engaged in high-risk activities. Numerous studies have explored drowsiness detection techniques based on EEG signals, but these have typically been validated on computers, which limits their portability. In this paper, we introduce the [...] Read more.
Drowsiness detection is crucial for ensuring the safety of individuals engaged in high-risk activities. Numerous studies have explored drowsiness detection techniques based on EEG signals, but these have typically been validated on computers, which limits their portability. In this paper, we introduce the design and implementation of a drowsiness detection technique utilizing EEG signals, executed on a Zynq7020 System on Chip (SoC) as part of a Pynq-Z2 module. This approach is more suitable for portable applications. We have implemented the Discrete Wavelet Transform (DWT) and feature extraction functions as intellectual property (IP) cores, while other functions run on the ARM processor of the Zynq7020. Full article
Show Figures

Figure 1

33 pages, 2291 KB  
Article
Hardware-Efficient Configurable Ring-Oscillator-Based Physical Unclonable Function/True Random Number Generator Module for Secure Key Management
by Santiago Sánchez-Solano, Luis F. Rojas-Muñoz, Macarena C. Martínez-Rodríguez and Piedad Brox
Sensors 2024, 24(17), 5674; https://doi.org/10.3390/s24175674 - 31 Aug 2024
Cited by 5 | Viewed by 2404
Abstract
The use of physical unclonable functions (PUFs) linked to the manufacturing process of the electronic devices supporting applications that exchange critical data over the Internet has made these elements essential to guarantee the authenticity of said devices, as well as the confidentiality and [...] Read more.
The use of physical unclonable functions (PUFs) linked to the manufacturing process of the electronic devices supporting applications that exchange critical data over the Internet has made these elements essential to guarantee the authenticity of said devices, as well as the confidentiality and integrity of the information they process or transmit. This paper describes the development of a configurable PUF/TRNG module based on ring oscillators (ROs) that takes full advantage of the structure of modern programmable devices offered by Xilinx 7 Series families. The proposed architecture improves the hardware efficiency with two main objectives. On the one hand, we perform an exhaustive statistical characterization of the results derived from the exploitation of RO configurability. On the other hand, we undertake the development of a new version of the module that requires a smaller amount of resources while considerably increasing the number of output bits compared to other proposals previously reported in the literature. The design as a highly parameterized intellectual property (IP) module connectable through a standard interface to a soft- or hard-core general-purpose processor greatly facilitates its integration into embedded solutions while accelerating the validation and characterization of this element on the same electronic device that implements it. The studies carried out reveal adequate values of reliability, uniqueness, and unpredictability when the module acts as a PUF, as well as acceptable levels of randomness and entropy when it acts as a true random number generator (TRNG). They also illustrate the ability to obfuscate and recover identifiers or cryptographic keys of up to 4096 bits using an implementation of the PUF/TRNG module that requires only an array of 4×4 configurable logic blocks (CLBs) to accommodate the RO bank. Full article
(This article belongs to the Collection Cryptography and Security in IoT and Sensor Networks)
Show Figures

Figure 1

16 pages, 3314 KB  
Article
A New Drug Discovery Platform: Application to DNA Polymerase Eta and Apurinic/Apyrimidinic Endonuclease 1
by Debanu Das, Matthew A. J. Duncton, Taxiarchis M. Georgiadis, Patricia Pellicena, Jennifer Clark, Robert W. Sobol, Millie M. Georgiadis, John King-Underwood, David V. Jobes, Caleb Chang, Yang Gao, Ashley M. Deacon and David M. Wilson
Int. J. Mol. Sci. 2023, 24(23), 16637; https://doi.org/10.3390/ijms242316637 - 23 Nov 2023
Cited by 4 | Viewed by 3060
Abstract
The ability to quickly discover reliable hits from screening and rapidly convert them into lead compounds, which can be verified in functional assays, is central to drug discovery. The expedited validation of novel targets and the identification of modulators to advance to preclinical [...] Read more.
The ability to quickly discover reliable hits from screening and rapidly convert them into lead compounds, which can be verified in functional assays, is central to drug discovery. The expedited validation of novel targets and the identification of modulators to advance to preclinical studies can significantly increase drug development success. Our SaXPyTM (“SAR by X-ray Poses Quickly”) platform, which is applicable to any X-ray crystallography-enabled drug target, couples the established methods of protein X-ray crystallography and fragment-based drug discovery (FBDD) with advanced computational and medicinal chemistry to deliver small molecule modulators or targeted protein degradation ligands in a short timeframe. Our approach, especially for elusive or “undruggable” targets, allows for (i) hit generation; (ii) the mapping of protein–ligand interactions; (iii) the assessment of target ligandability; (iv) the discovery of novel and potential allosteric binding sites; and (v) hit-to-lead execution. These advances inform chemical tractability and downstream biology and generate novel intellectual property. We describe here the application of SaXPy in the discovery and development of DNA damage response inhibitors against DNA polymerase eta (Pol η or POLH) and apurinic/apyrimidinic endonuclease 1 (APE1 or APEX1). Notably, our SaXPy platform allowed us to solve the first crystal structures of these proteins bound to small molecules and to discover novel binding sites for each target. Full article
(This article belongs to the Section Molecular Genetics and Genomics)
Show Figures

Figure 1

20 pages, 13132 KB  
Article
FPGA-Based CNN for Eye Detection in an Iris Recognition at a Distance System
by Camilo A. Ruiz-Beltrán, Adrián Romero-Garcés, Martín González-García, Rebeca Marfil and Antonio Bandera
Electronics 2023, 12(22), 4713; https://doi.org/10.3390/electronics12224713 - 20 Nov 2023
Cited by 7 | Viewed by 3941
Abstract
Neural networks are the state-of-the-art solution to image-processing tasks. Some of these neural networks are relatively simple, but the popular convolutional neural networks (CNNs) can consist of hundreds of layers. Unfortunately, the excellent recognition accuracy of CNNs comes at the cost of very [...] Read more.
Neural networks are the state-of-the-art solution to image-processing tasks. Some of these neural networks are relatively simple, but the popular convolutional neural networks (CNNs) can consist of hundreds of layers. Unfortunately, the excellent recognition accuracy of CNNs comes at the cost of very high computational complexity, and one of the current challenges is managing the power, delay and physical size limitations of hardware solutions dedicated to accelerating their inference process. In this paper, we describe the embedding of an eye detection system on a Zynq XCZU4EV UltraScale+ multiprocessor system-on-chip (MPSoC). This eye detector is used in the application framework of a remote iris recognition system, which requires high resolution images captured at high speed as input. Given the high rate of eye regions detected per second, it is also important that the detector only provides as output images eyes that are in focus, discarding all those seriously affected by defocus blur. In this proposal, the network will be trained only with correctly focused eye images to assess whether it can differentiate this pattern from that associated with the out-of-focus eye image. Exploiting the neural network’s advantage of being able to work with multi-channel input, the inputs to the CNN will be the grey level image and a high-pass filtered version, typically used to determine whether the iris is in focus or not. The complete system synthetises other cores and implements CNN using the so-called Deep Learning Processor Unit (DPU), the intellectual property (IP) block released by AMD/Xilinx. Compared to previous hardware designs for implementing FPGA-based CNNs, the DPU IP supports extensive deep learning core functions, and developers can leverage DPUs to conveniently accelerate CNN inference. Experimental validation has been successfully addressed in a real-world scenario working with walking subjects, demonstrating that it is possible to detect only eye images that are in focus. This prototype module includes a CMOS digital image sensor that provides 16 Mpixel images, and outputs a stream of detected eyes as 640 × 480 images. The module correctly discards up to 95% of the eyes present in the input images as not being correctly focused. Full article
(This article belongs to the Special Issue Convolutional Neural Networks and Vision Applications, 3rd Edition)
Show Figures

Figure 1

20 pages, 10162 KB  
Article
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V
by Geraldine Shirley Nicholas, Dhruvakumar Vikas Aklekar, Bhavin Thakar and Fareena Saqib
Cryptography 2023, 7(4), 58; https://doi.org/10.3390/cryptography7040058 - 16 Nov 2023
Cited by 5 | Viewed by 3366
Abstract
With the proliferation of electronic devices, third-party intellectual property (3PIP) integration in the supply chain of the semiconductor industry and untrusted actors/fields have raised hardware security concerns that enable potential attacks, such as unauthorized access to data, fault injection and privacy invasion. Different [...] Read more.
With the proliferation of electronic devices, third-party intellectual property (3PIP) integration in the supply chain of the semiconductor industry and untrusted actors/fields have raised hardware security concerns that enable potential attacks, such as unauthorized access to data, fault injection and privacy invasion. Different security techniques have been proposed to provide resilience to secure devices from potential vulnerabilities; however, no one technique can be applied as an overarching solution. We propose an integrated Information Flow Tracking (IFT) technique to enable runtime security to protect system integrity by tracking the flow of data from untrusted communication channels. Existing hardware-based IFT schemes are either fine-, which are resource-intensive, or coarse-grained models, which have minimal precision logic, providing either control-flow or data-flow integrity. No current security model provides multi-granularity due to the difficulty in balancing both the flexibility and hardware overheads at the same time. This study proposes a multi-level granularity IFT model that integrates a hardware-based IFT technique with a gate-level-based IFT (GLIFT) technique, along with flexibility, for better precision and assessments. Translation from the instruction level to the data level is based on module instantiation with security-critical data for accurate information flow behaviors without any false conservative flows. A simulation-based IFT model is demonstrated, which translates the architecture-specific extensions into a compiler-specific simulation model with toolchain extensions for Reduced Instruction Set Architecture (RISC-V) to verify the security extensions. This approach provides better precision logic by enhancing the tagged mechanism with 1-bit tags and implementing an optimized shadow logic that eliminates the area overhead by tracking the data for only security-critical modules. Full article
(This article belongs to the Special Issue Feature Papers in Hardware Security II)
Show Figures

Figure 1

21 pages, 572 KB  
Article
Fine-Grained Access Control with User Revocation in Smart Manufacturing
by Ernesto Gómez-Marín, Davide Martintoni, Valerio Senni, Encarnación Castillo and Luis Parrilla
Electronics 2023, 12(13), 2843; https://doi.org/10.3390/electronics12132843 - 27 Jun 2023
Cited by 2 | Viewed by 2248
Abstract
Collaborative manufacturing is a key enabler of Industry 4.0 that requires secure data sharing among multiple parties. However, intercompany data-sharing raises important privacy and security concerns, particularly given intellectual property and business-sensitive information collected by many devices. In this paper, we propose a [...] Read more.
Collaborative manufacturing is a key enabler of Industry 4.0 that requires secure data sharing among multiple parties. However, intercompany data-sharing raises important privacy and security concerns, particularly given intellectual property and business-sensitive information collected by many devices. In this paper, we propose a solution that combines four technologies to address these challenges: Attribute-Based Encryption for data access control, blockchain for data integrity and non-repudiation, Hardware Security Modules for authenticity, and the Interplanetary File System for data scalability. We also use OpenID for dynamic client identification and propose a new method for user revocation in Attribute-Based Encryption. Our evaluation shows that the solution can scale up to 2,000,000 clients while maintaining all security guarantees. Full article
Show Figures

Figure 1

18 pages, 4007 KB  
Article
FPGA-Flux Proprietary System for Online Detection of Outer Race Faults in Bearings
by Jonathan Cureño-Osornio, Israel Zamudio-Ramirez, Luis Morales-Velazquez, Arturo Yosimar Jaen-Cuellar, Roque Alfredo Osornio-Rios and Jose Alfonso Antonino-Daviu
Electronics 2023, 12(8), 1924; https://doi.org/10.3390/electronics12081924 - 19 Apr 2023
Cited by 7 | Viewed by 2563
Abstract
Online fault detection in industrial machinery, such as induction motors or their components (e.g., bearings), continues to be a priority. Most commercial equipment provides general measurements and not a diagnosis. On the other hand, commonly, research works that focus on fault detection are [...] Read more.
Online fault detection in industrial machinery, such as induction motors or their components (e.g., bearings), continues to be a priority. Most commercial equipment provides general measurements and not a diagnosis. On the other hand, commonly, research works that focus on fault detection are tested offline or over processors that do not comply with an online diagnosis. In this sense, the present work proposes a system based on a proprietary field programmable gate array (FPGA) platform with several developed intellectual property cores (IPcores) and tools. The FPGA platform together with a stray magnetic flux sensor are used for the online detection of faults in the outer race of bearings in induction motors. The integrated parts comprising the monitoring system are the stray magnetic flux triaxial sensor, several developed IPcores, an embedded processor for data processing, and a user interface where the diagnosis is visualized. The system performs the fault diagnosis through a statistical analysis as follows: First, a triaxial sensor measures the stray magnetic flux in the motor’s surroundings (this flux will vary as symptoms of the fault). Second, an embedded processor in an FPGA-based proprietary board drives the developed IPcores in calculating the statistical features. Third, a set of ranges is defined for the statistical features values, and it is used to indicate the condition of the bearing in the motor. Therefore, if the value of a statistical feature belongs to a specific range, the system will return a diagnosis of whether a fault is present and, if so, the severity of the damage in the outer race. The results demonstrate that the values of the root mean square (RMS) and kurtosis, extracted from the stray magnetic field from the motor, provide a reliable diagnostic of the analyzed bearing. The results are provided online and displayed for the user through interfaces developed on the FPGA platform, such as in a liquid crystal display or through serial communication by a Bluetooth module. The platform is based on an FPGA XC6SLX45 Spartan 6 of Xilinx, and the architecture of the modules used are described through hardware description language. This system aims to be an online tool that can help users of induction motors in maintenance tasks and for the early detection of faults related to bearings. Full article
(This article belongs to the Special Issue Applications Enabled by FPGA-Based Technology)
Show Figures

Figure 1

25 pages, 11174 KB  
Article
DycSe: A Low-Power, Dynamic Reconfiguration Column Streaming-Based Convolution Engine for Resource-Aware Edge AI Accelerators
by Weison Lin, Yajun Zhu and Tughrul Arslan
J. Low Power Electron. Appl. 2023, 13(1), 21; https://doi.org/10.3390/jlpea13010021 - 16 Mar 2023
Cited by 5 | Viewed by 3496
Abstract
Edge AI accelerators are utilized to accelerate the computation in edge AI devices such as image recognition sensors on robotics, door lockers, drones, and remote sensing satellites. Instead of using a general-purpose processor (GPP) or graphic processing unit (GPU), an edge AI accelerator [...] Read more.
Edge AI accelerators are utilized to accelerate the computation in edge AI devices such as image recognition sensors on robotics, door lockers, drones, and remote sensing satellites. Instead of using a general-purpose processor (GPP) or graphic processing unit (GPU), an edge AI accelerator brings a customized design to meet the requirements of the edge environment. The requirements include real-time processing, low-power consumption, and resource-awareness, including resources on field programmable gate array (FPGA) or limited application-specific integrated circuit (ASIC) area. The system’s reliability (e.g., permanent fault tolerance) is essential if the devices target radiation fields such as space and nuclear power stations. This paper proposes a dynamic reconfigurable column streaming-based convolution engine (DycSe) with programmable adder modules for low-power and resource-aware edge AI accelerators to meet the requirements. The proposed DycSe design does not target the FPGA platform only. Instead, it is an intellectual property (IP) core design. The FPGA platform used in this paper is for prototyping the design evaluation. This paper uses the Vivado synthesis tool to evaluate the power consumption and resource usage of DycSe. Since the synthesis tool is limited to giving the final complete system result in the designing stage, we compare DycSe to a commercial edge AI accelerator for cross-reference with other state-of-the-art works. The commercial architecture shares the competitive performance within the low-power ultra-small (LPUS) edge AI scopes. The result shows that DycSe contains 3.56% less power consumption and slight resources (1%) overhead with reconfigurable flexibility. Full article
(This article belongs to the Special Issue Low-Power Computation at the Edge)
Show Figures

Figure 1

24 pages, 241265 KB  
Article
Novel Hybrid Fusion-Based Technique for Securing Medical Images
by Hanaa A. Abdallah, Reem Alkanhel and Abdelhamied A. Ateya
Electronics 2022, 11(20), 3421; https://doi.org/10.3390/electronics11203421 - 21 Oct 2022
Cited by 1 | Viewed by 2150
Abstract
The security of images has gained great interest in modern communication systems. This is due to the massive critical applications that are based on images. Medical imaging is at the top of these applications. However, the rising number of heterogenous attacks push toward [...] Read more.
The security of images has gained great interest in modern communication systems. This is due to the massive critical applications that are based on images. Medical imaging is at the top of these applications. However, the rising number of heterogenous attacks push toward the development of securing algorithms and methods for imaging systems. To this end, this work considers developing a novel authentication, intellectual property protection, ownership, and security technique for imaging systems, mainly for medical imaging. The developed algorithm includes two security modules for safeguarding various picture kinds. The first unit is accomplished by applying watermarking authentication in the frequency domain. The singular value decomposition (SVD) is performed for the host image’s discrete cosine transform (DCT) coefficients. The singular values (S) are divided into 64 × 64 non-overlapping blocks, followed by embedding the watermark in each block to be robust to any attack. The second unit is made up of two encryption layers to provide double-layer security to the watermarked image. The double random phase encryption (DRPE) and chaotic encryption have been tested and examined in the encryption unit. The suggested approach is resistant to common image processing attacks, including rotation, cropping, and adding Gaussian noise, according to the findings of the experiments. The encryption of watermarked images in the spatial and DCT domains and fused watermarked images in the DCT domain are all discussed. The transparency and security of the method are assessed using various measurements. The proposed approach achieves high-quality reconstructed watermarks and high security by using encryption to images and achieves robustness against any obstructive attacks. The developed hybrid algorithm recovers the watermark even in the presence of an attack with a correlation near 0.8. Full article
(This article belongs to the Special Issue Multimedia Processing: Challenges and Prospects)
Show Figures

Figure 1

20 pages, 1338 KB  
Article
Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems
by Macarena C. Martínez-Rodríguez, Luis F. Rojas-Muñoz, Eros Camacho-Ruiz, Santiago Sánchez-Solano and Piedad Brox
Cryptography 2022, 6(4), 51; https://doi.org/10.3390/cryptography6040051 - 5 Oct 2022
Cited by 11 | Viewed by 4862
Abstract
The generation of unique identifiers extracted from the physical characteristics of the underlying hardware ensures the protection of electronic devices against counterfeiting and provides security to the data they store and process. This work describes the design of an efficient Physical Unclonable Function [...] Read more.
The generation of unique identifiers extracted from the physical characteristics of the underlying hardware ensures the protection of electronic devices against counterfeiting and provides security to the data they store and process. This work describes the design of an efficient Physical Unclonable Function (PUF) based on the differences in the frequency of Ring Oscillators (ROs) with identical layout due to variations in the technological processes involved in the manufacture of the integrated circuit. The logic resources available in the Xilinx Series-7 programmable devices are exploited in the design to make it more compact and achieve an optimal bit-per-area rate. On the other hand, the design parameters can also be adjusted to provide a high bit-per-time rate for a particular target device. The PUF has been encapsulated as a configurable Intellectual Property (IP) module, providing it with an AXI4-Lite interface to ease its incorporation into embedded systems in combination with soft- or hard-core implementations of general-purpose processors. The capability of the proposed RO-PUF to generate implementation-dependent identifiers has been extensively tested, using a series of metrics to evaluate its reliability and robustness for different configuration options. Finally, in order to demonstrate its utility to improve system security, the identifiers provided by RO-PUFs implemented on different devices have been used in a Helper Data Algorithm (HDA) to obfuscate and retrieve a secret key. Full article
(This article belongs to the Special Issue Emerging Trends on Physical Security)
Show Figures

Figure 1

18 pages, 413 KB  
Article
Time- and Amplitude-Controlled Power Noise Generator against SPA Attacks for FPGA-Based IoT Devices
by Luis Parrilla, Antonio García, Encarnación Castillo, Salvador Rodríguez-Bolívar and Juan Antonio López-Villanueva
J. Low Power Electron. Appl. 2022, 12(3), 48; https://doi.org/10.3390/jlpea12030048 - 10 Sep 2022
Cited by 2 | Viewed by 3162
Abstract
Power noise generation for masking power traces is a powerful countermeasure against Simple Power Analysis (SPA), and it has also been used against Differential Power Analysis (DPA) or Correlation Power Analysis (CPA) in the case of cryptographic circuits. This technique makes use of [...] Read more.
Power noise generation for masking power traces is a powerful countermeasure against Simple Power Analysis (SPA), and it has also been used against Differential Power Analysis (DPA) or Correlation Power Analysis (CPA) in the case of cryptographic circuits. This technique makes use of power consumption generators as basic modules, which are usually based on ring oscillators when implemented on FPGAs. These modules can be used to generate power noise and to also extract digital signatures through the power side channel for Intellectual Property (IP) protection purposes. In this paper, a new power consumption generator, named Xored High Consuming Module (XHCM), is proposed. XHCM improves, when compared to others proposals in the literature, the amount of current consumption per LUT when implemented on FPGAs. Experimental results show that these modules can achieve current increments in the range from 2.4 mA (with only 16 LUTs on Artix-7 devices with a power consumption density of 0.75 mW/LUT when using a single HCM) to 11.1 mA (with 67 LUTs when using 8 XHCMs, with a power consumption density of 0.83 mW/LUT). Moreover, a version controlled by Pulse-Width Modulation (PWM) has been developed, named PWM-XHCM, which is, as XHCM, suitable for power watermarking. In order to build countermeasures against SPA attacks, a multi-level XHCM (ML-XHCM) is also presented, which is capable of generating different power consumption levels with minimal area overhead (27 six-input LUTS for generating 16 different amplitude levels on Artix-7 devices). Finally, a randomized version, named RML-XHCM, has also been developed using two True Random Number Generators (TRNGs) to generate current consumption peaks with random amplitudes at random times. RML-XHCM requires less than 150 LUTs on Artix-7 devices. Taking into account these characteristics, two main contributions have been carried out in this article: first, XHCM and PWM-XHCM provide an efficient power consumption generator for extracting digital signatures through the power side channel, and on the other hand, ML-XHCM and RML-XHCM are powerful tools for the protection of processing units against SPA attacks in IoT devices implemented on FPGAs. Full article
(This article belongs to the Special Issue Low-Power Hardware Security)
Show Figures

Figure 1

27 pages, 2913 KB  
Article
Multi-Unit Serial Polynomial Multiplier to Accelerate NTRU-Based Cryptographic Schemes in IoT Embedded Systems
by Santiago Sánchez-Solano, Eros Camacho-Ruiz, Macarena C. Martínez-Rodríguez and Piedad Brox
Sensors 2022, 22(5), 2057; https://doi.org/10.3390/s22052057 - 7 Mar 2022
Cited by 8 | Viewed by 3840
Abstract
Concern for the security of embedded systems that implement IoT devices has become a crucial issue, as these devices today support an increasing number of applications and services that store and exchange information whose integrity, privacy, and authenticity must be adequately guaranteed. Modern [...] Read more.
Concern for the security of embedded systems that implement IoT devices has become a crucial issue, as these devices today support an increasing number of applications and services that store and exchange information whose integrity, privacy, and authenticity must be adequately guaranteed. Modern lattice-based cryptographic schemes have proven to be a good alternative, both to face the security threats that arise as a consequence of the development of quantum computing and to allow efficient implementations of cryptographic primitives in resource-limited embedded systems, such as those used in consumer and industrial applications of the IoT. This article describes the hardware implementation of parameterized multi-unit serial polynomial multipliers to speed up time-consuming operations in NTRU-based cryptographic schemes. The flexibility in selecting the design parameters and the interconnection protocol with a general-purpose processor allow them to be applied both to the standardized variants of NTRU and to the new proposals that are being considered in the post-quantum contest currently held by the National Institute of Standards and Technology, as well as to obtain an adequate cost/performance/security-level trade-off for a target application. The designs are provided as AXI4 bus-compliant intellectual property modules that can be easily incorporated into embedded systems developed with the Vivado design tools. The work provides an extensive set of implementation and characterization results in devices of the Xilinx Zynq-7000 and Zynq UltraScale+ families for the different sets of parameters defined in the NTRUEncrypt standard. It also includes details of their plug and play inclusion as hardware accelerators in the C implementation of this public-key encryption scheme codified in the LibNTRU library, showing that acceleration factors of up to 3.1 are achieved when compared to pure software implementations running on the processing systems included in the programmable devices. Full article
(This article belongs to the Special Issue Advances in Cybersecurity for the Internet of Things)
Show Figures

Figure 1

Back to TopTop