<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Control Technology of Integrity and Legitimacy of LUT-Oriented Information Object Usage by Self- Recovering Digital Watermark</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kostiantyn Zashcholkin</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olena Ivanova</string-name>
          <email>en.ivanova.ua@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Key terms: Information Technology</institution>
          ,
          <addr-line>Data, Object, Approach, Method</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Odessa National Polytechnic University</institution>
          ,
          <addr-line>1, Shevchenko Avenue, Odessa</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The paper proposes the technology of control of integrity and legitimacy of information object usage with the Look Up Table-oriented (LUToriented) architecture. The technology is based on embedding the self-recovery digital watermark into information objects of such kind. The technology is the composition of approaches to forming the self-recovery digital watermarks in the passive multimedia containers, and approaches to embedding the extra information into LUT-containers. The process of embedding the extra information occurs with the help of classification of container elements and their purposeful modification within the set of the formed classes. The procedure of immediate embedding the data at the level of LUT-container elementary parts includes the value inversion of current processed LUT unit and propagation of the inversion around all the inputs of LUT units connected to the current unit output. The description of practical realization of the proposed technology is represented.</p>
      </abstract>
      <kwd-group>
        <kwd>digital watermarks</kwd>
        <kwd>control of information object integrity</kwd>
        <kwd>control of information object usage</kwd>
        <kwd>information security</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>IT systems safety</kwd>
        <kwd>steganography</kwd>
        <kwd>LUT-oriented architecture</kwd>
        <kwd>FPGA</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        DWM technologies are based on steganographical technique, with the help of
which the fact of DWM presence in an information object (DWM container) is
hidden. At the same time DWM can be read in the container if someone has a
stegokey possessing the set of access rules to DWM elements [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        The control of information object integrity by DWM is based on embedding some
control data unit allowing to analyze the object integrity in an information object.
Hash sum calculated with the help of the definite hash-function is most frequently
used as such kind of data unit [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. However such kind of control unit embedding
results in information object change and consequently violates its integrity by itself.
Under these conditions the so-called self-recovering DWMs possessing the ability to
recover the initial object value (a value, which it had before DWM embedding) in the
process of DWM reading from the object are used [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In order to control the integrity
the DWM extraction from information object, hash sum calculation and this hash sum
with DWM contents comparison is performed. The analysis of integrity control
guarantees the impossibility of the information object substitution or corruption.
Finally this provides the safety of functioning the information system processing the
given information object.
      </p>
      <p>
        The control of information object usage legitimacy by DWM is based on
possibility of a copyright owner to embed DWM having the copyright owner
identifying data into the object. So it is only a copyright owner who possesses a
stegokey can check the DWM presence and its contents in the information object [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
DWM technologies are actively used in the structure of Digital Rights Management
systems (DRM – systems), but the field of their usage is commonly limited with the
multimedia content protection: graphical, audio and video files [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In performing
the tasks of control of information object usage legitimacy by DWM the recovery of
initial object value after DWM extraction is necessary.
      </p>
      <p>
        In the present paper the author proposes the information technology of
selfrecovery DWM usage in active hardware containers based on LUT-oriented
architecture (further LUT-containers). We can refer, for example, Field
Programmable Gate Array microchips (FPGA microchips) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], which at present are
often used as an element base for computer and control system design, to such kinds
of containers. The main element of such containers is LUT units, which are the data
structure used to replace the calculation with prepared data search operation [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. LUT
units in FPGA are normally represented in the form of RAM. In this case LUT unit
inputs are the address inputs of RAM. If the number of inputs equals n a LUT unit
stores 2n bits information and is capable of calculating the value of 1 n-argument
Boolean function.
      </p>
      <p>
        Self-recovering DWMs have been developed and used in the field of control of
integrity and legitimacy of usage for passive multimedia containers, e.g. graphical,
audio and video files. However it is necessary to control not only the information
objects of such kind by DWMs. But the task of self-recovering DWM usage in active
containers performing some calculating or controlling function is not realized at the
moment. In the articles [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] the techniques of DWM embedding in active
LUTcontainers are proposed. But the techniques described do not possess the possibility to
recover the container original. So the aim of the given paper is to describe the
possibility of container original recovery after DWM extraction by developing the
technique of forming the DWMs in LUT-containers.
      </p>
    </sec>
    <sec id="sec-2">
      <title>The Information Technology of Embedding the Self</title>
    </sec>
    <sec id="sec-3">
      <title>Recovering DWM in LUT-Container</title>
      <p>The information technology considered in the paper is a formal process of usage of
the proposed and already existing techniques as well as the means of information
processing, which provides DWM forming in LUT-container space.</p>
      <p>
        The proposed information technology uses a set of Fridrich-Goljan-Du method
(further Fridrich method) approaches [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] in the part, which is intended for
container recovery, and technique described in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] in the part intended for
DWM embedding in LUT-containers. Besides the represented technology uses such
peculiarities of LUT-containers as activeness, accurate data presentation,
nonautonomousness of their elementary parts [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        The methods proposed in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] are based on the change of codes of a pair of
successively integrated LUT units, which does not alter this pair functioning. Assume
there is a pair of LUT units and the output of the first one is connected directly or
through a trigger to the address input of the second one. The inversion of all the bits of
the first unit code and a definite rearrangement of the bits of the second unit code does
not change the functioning of the given pair of units. It is the consequence of
equivalence of Boolean functions realized by the pair of units before and after values
inversion. The rearrangement of bits in the second unit code of the pair is produced
according to the rules depending upon the binary weight of its address input, which the
first unit output is connected to. The inversion of bits of the first unit code of the pair
gives the possibility to achieve the required value in a definite bit of a unite code. This
peculiarity is exactly used by the methods considered in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] for DWM embedding
in a LUT-container. However these methods are not able to recover the container original.
      </p>
      <p>
        Fridrich method [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] is based on the group processing – disjoint subsets of
elementary parts of a container with the help of two functions: Flipping-function F
and function of discrimination f.
      </p>
      <p>Function of discrimination is used in Fridrich method on order to classify the
groups of elementary container parts by including them to the classes of regular,
singular and unused groups. To determine the function value in each of the container
groups we are to calculate the sum of pairwise subtractions with overlapping for
elementary container parts included in a group.</p>
      <p>
        Flipping-function is used by Fridrich method to modify the groups according to
some rule possessing the characteristic of involution. In the proposed information
technology the LUT-container architecture peculiarities are taken into account and
this fact differs it from Fridrich method in the following features:
 within the frames of the proposed technology in the course of DWM embedding
the modification of elementary parts exactly (LUT units) is performed but not the
groups of elementary parts of a container;
 within the frames of the proposed technology the calculation of Flipping-function
F(x) unlike Fridrich method contains the LUT unit value inversion according to the
procedure mentioned in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The procedure is the invention of values of the
current processed LUT unit and propagation the inversion around the inputs of all
the LUT units connecting to the current unit output. It is obvious that the Fridrich
method requirement concerning the presence of involution characteristics is
performed for the given type of Flipping-function, i.e. F(F(LUTi)) = LUTi where
LUTi is any valid value of some LUT unit;
 unlike Fridrich method within the frames of the proposed technology a principle of
container element classification without calculating any function of discrimination is
determined. The element classification is organized as a determination of zero and
one value proportion in LUT unit codes. It is performed according to the following
principle: if LUT unit contains zero values more than one values it is classified as a
regular unit (R-unit); if a unit contains more one values than zero values it is
classified as a singular unit (S-unit); if the number of zero values of LUT unit equals
the number of its one values the unit is classified as an unused unit (U-unit).
      </p>
      <p>Certainly, the rules of moving the container from one class to another defined by
Fridrich method are performed within the frame of the proposed approach as well:
F(LUTR) = LUTS;
F(LUTS) = LUTR;
F(LUTU) = LUTU,
(1)
where LUTR, LUTS, LUTU – LUT units classified as R-unit, S-unit and U-unit,
respectively; F() – Flipping-function.</p>
      <p>The succession of actions in the proposed information technology in DWM
embedding in LUT-container is as follows.</p>
      <p>Stage 1. The movement about LUT-container units in the order determined by
embedding path is realized. During this action each of the LUT units refers to the
classes R-unit, S-unit or U-unit on the basis of the above mentioned classification
rules. According to the results of classification the binary RS-vector is formed in the
following way: if the next LUT unit is classified as R-unit then zero value is fixed in
RS-vector; if the next LUT unit is classified as S-unit then one value is fixed in
RSvector; U-unit values are not fixed in RS-vector.</p>
      <p>Stage 2. The obtained RS-vector compression is performed with the help of some
lossless compression algorithm. As a result of this the compressed vector RScom is
formed. It is obvious that RScom vector length is less than RS-vector length. Difference
of length of these vectors is denoted as ΔL.</p>
      <p>Stage 3. DWM, which is a binary succession the length of which does not exceed ΔL
is added to vector RScom by concatenating. Vector RS* obtained after concatenation is
added with arbitrary binary values until it reaches the RS vector length. So:
RS* = RScom . DWM . Add,
(2)
where “.” – operation of concatenation; DWM – watermark embedded into container;
Add – optional addition of vector RS* to RS vector length.</p>
      <p>Stage 4. The movement about LUT units of container in the order determined by
embedding path is performed. In the course of this movement U-units are ignored,
and within R-units and S-units a mutual transition of one into another with the help of
Flipping-function is made according to the table.</p>
      <p>The actions at the given stage leads to vector RS* embedding in a LUT-container.
Vector RS* contains DWM and a compressed vector RS (vector RScom) version in
accordance with equation (2). Thus except for a DWM itself the information
necessary for the original container value recovery is embedded in a container. The
rules represented in table 1 describe the actions providing the vector RS* embedding
in a LUT-container. If the corresponding current bits of vectors RS and RS* coincide
then no modification for the current LUT unit is produced. In the case of mismatch of
these bits the current LUT unit transition in the class corresponding to the current bit
value of vector RS* is performed.</p>
      <p>
        Taking into account that the Flipping-function impact on LUT units occurs
according to the unit inversion rules represented in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] LUT-container
functioning does not change after DWM embedding.
3
      </p>
    </sec>
    <sec id="sec-4">
      <title>Example of DWM Embedding According to the Proposed</title>
    </sec>
    <sec id="sec-5">
      <title>Technology</title>
      <p>Let us consider the example of described stages of DWM embedding in container
technology. In table 2 the hexadecimal values of codes of twenty LUT units
(i = 1…20), which are in some embedding path of a container are shown in the lines
“Unit code”.</p>
      <p>For each of these units a number of one values (n1) in the unit code bits are
indicated. Depending on the proportion of amounts of one and zero values in the code
the unit is classified as R, S or U unit according to the above mentioned rules. In
accordance with the results of the classification a RS-vector is formed, in which zero
values correspond to R-units and one values – to S-units. U-units do not participate in
forming the RS-vector.</p>
      <p>As a result the RS-vector takes the value RS = 011100001000001000 consisting of
18 bits (the information about two U-units was not included in RS-vector). Then the
RS-vector is to be subjected to lossless compression. In the given example the
simplest way of compression on the basis of Huffman method is used for illustration
(in practice the more effective compression methods are to be used). For this purpose
the triads of RS-vector bits are taken as elementary characters and their frequency of
entering the vector is found. The triad “000” enters the vector twice, the triad “100” –
once, the triad “011” – twice. As a result of Huffman method we obtain the following
system of uneven prefix codes for the triads of RS-vector: “000”  “11”, “100” 
“100”, “011”  “101”, “001”  “0”.</p>
      <p>As a result of usage of the obtained codes we can have 12 bits vector
RScom = 101100011011 instead of the initial triads in 18 bits RS-vector. RS and RScom
vector lengths difference is ΔL = 6. This value expresses the maximum amount of
DWM bits, which can be embedded in LUT units in the given example.</p>
      <p>In table 3 the values of bits of the initial RS-vector and its compressed version
RScom are shown. Let us consider the example of addition of the 6-bits DWM –
DWM = 101010 to the vector RScom. As a result of concatenation of the vector RScom
and DWM embedded in DWM container we obtain vector RS* having the similar
length as to vector RS.</p>
      <p>RS
RScom
DWM
RS*
0
1
1
1
0
0
1
1
1
1
1
1</p>
      <p>Then according to the rules specified in table 1 the LUT-container modification is
performed. The aim of this modification is to adapt the LUT-unit classes lying in the
embedding path to the value of vector RS* containing DWM. As we see from table 1
the LUT-unit movement from one class to another is only performed when the values
of the corresponding bits of vectors RS and RS* do not coincide. The bits
characterizing with the absence of coincidence of such kind are distinguished in table
3. For the LUT-unit codes corresponding to the distinguished bits a Flipping-function
is applied and this leads to the movement of these units from one class to another.</p>
      <p>In table 4 the values of LUT-unit codes after Flipping-function application to the
distinguished units (units, for which the class is to be changed). As a result of these
actions the RS-vector of units, which are in the embedding path takes a value of the
vector RS* and DWM is embedded into the LUT-container.</p>
    </sec>
    <sec id="sec-6">
      <title>The Proposed Procedure of DWM Extraction from LUT</title>
    </sec>
    <sec id="sec-7">
      <title>Container</title>
      <p>Within the frame of the proposed technology the stego-key dedicated for data
extraction consists of the following four components:
key = (order, classification, RSrule, ΔL),
(3)
where order – the information defining the order of move around LUT units in the
container (embedding path) for DWM embedding or extracting; classification –
concrete definition of the principle of LUT-unit classification (unit is considered to be
R-unit if the amount of parts in the unit code is more or less); RSrule – the rule of
interpretation of RS, RScom, RS* vector bit values: for R-units a zero value and for
Sunits one value are fixed in the RS-vector and vice versa; ΔL – the difference between
the vector RS length and its compressed version RScom length.</p>
      <p>The succession of actions of the proposed information technology in DWM
extracting and recovering the initial value of LUT-container is as follows.</p>
      <p>Stage 1. The movement about LUT-container units in the order specified by
embedding path occurs. And along with this a binary vector RS’ is formed on the basis
of LUT-unit classification like in the case of embedding the information.</p>
      <p>Stage 2. The obtained vector RS’ structure corresponds to the one of vector RS* (2)
formed in DWM embedding in container. The last ΔL bits of vector RS’ are DWM with
the possible addition to the necessary vector length. At this stage the reading of this bits
and DWM obtaining is performed.</p>
      <p>Stage 3. The other vector bits are subjected to the procedure of decompression
opposite to compression, which is performed at the stage of embedding the
information. As a result a binary vector RSdecom is formed.</p>
      <p>Stage 4. On the basis of information contained in vector RSdecom the recovery of
original container value is performed. The movement about LUT-units of the
container in the order specified by the embedding path and successive review of
vector RSdecom values are performed for this. In the course of this movement the
Uunits are ignored and within R-units and S-units a mutual transition is made by
Flipping-function according to table 1.</p>
      <p>For the example considered above DWM extraction can be described in the
following way. As a result of analysis of LUT-unit codes lying in the embedding path
the unit classification is performed and a binary vector RS’ = 101100011011101010 is
formed. From the vector end the ΔL = 6 bits containing DWM “101010” are taking.
The rest bits of the vector “101100011011” are subjected to decompression with the
usage of the table making the match between the uneven prefix codes of compressed
vector and the triads of decompressed vector bits. This leads to creation of binary
vector RSdecom = 011100001000001000, which coincides with the container vector RS
before DWM embedding in it. The given vector has the information for the original
value recovery of LUT-container. According to the rules of table 1 the LUT-unit
classes become the original ones and the container acquires the value it had before
DWM embedding.
5</p>
    </sec>
    <sec id="sec-8">
      <title>Experimental Research of the Proposed Technology</title>
      <sec id="sec-8-1">
        <title>Aims of the experimental research:</title>
        <p>1. to show experimentally that LUT-containers, in which DWMs were embedded
with the help of the proposed technology acquire their original value after DWM
extraction;
2. to indicate the degree of change of the main characteristics of containers after
DWM embedding in them. The main characteristics are considered to be the
following ones: a) maximal clock signals frequency expressing the limits of
processing speed within the frames of one family of target chips; b) energy
consumption of the input-output system of a chip; c) energy consumption of the chip
core; d) thermal dissipation of a chip.</p>
        <p>Environment for making the experiments. The hardware-software means based
on the chips FPGA Altera Cyclone II and CAD Altera Quartus II usage have been
developed for the experimental research. The group of scripts performing the
interaction with CAD Altera Quartus II for reading and recording the LUT-unit
contents was organized in TCL language. The read data processing subsystem itself is
realized in language C# within the frame of the platform .Net in accordance with the
proposed technology. The estimation of design characteristics mentioned above were
carried out by means of CAD Altera Quartus II Timing Analyzer (estimation of the
limit processing speed) and Power Play (estimation of energy consumption and
thermal dissipation). The states of container before DWM embedding and after DWM
extraction were compared by bit-by-bit analysis of configuration files of the
corresponding containers.</p>
      </sec>
      <sec id="sec-8-2">
        <title>The Materials for experiments are 40 FPGA – projects of different</title>
        <p>complexities and purposes. The hardware complexity of devices within the frames
of the given projects varies from 1,2% to 65% resource volume (logic cells, RAM
units) of target chip FPGA.</p>
        <p>The process of making the experiments. The experiments for each of the researched
project consist of the following stages:
1. estimation of the main characteristics (processing speed, energy consumption,
thermal dissipation) for the device represented in the form of initial container;
2. embedding the random binary succession of DWM in container;
3. estimation of the main characteristics for a container having the embedded DWM;
4. DWM extraction from the filled container;
5. comparison of configuration files of the final and initial container states.</p>
      </sec>
      <sec id="sec-8-3">
        <title>The results of experimental research. As a result of experiments a complete</title>
        <p>coincidence of configuration files of the initial containers and the ones obtained after
DWM extraction for all of the 40 projects has been established. So due to the features
of self-recovery after DWM extraction from containers they take the original form
and their characteristics return to the initial values.</p>
        <p>In the part of determining the degree of changes of the main container
characteristics (after DWM embedding) the following results were obtained. We
found that insignificant changes of container characteristics occurs as a result of
DWM embedding. Along with this the dependence of this change upon hardware
complexity and its structural peculiarities is extremely low. The difference between
the changes of characteristics for devices occupying 1,2% and the ones occupying
65% resource volume of the target chip FPGA is hundredths of a percent. On average
(for all of the researched 40 projects) the processing speed characteristic change is
0,18%, changes of energy consumption and thermal dissipation characteristics –
0,22%. As we see the change values are within the limits of error value of
measurement means.</p>
        <p>
          The technology offered in the paper does not change the mutual connections of
LUT units but does change the values of the specific units codes. It is accordingly of
interest to learn whether the changes of units codes are able to influence on the FPGA
project features under such conditions. Except for the previously considered
experiment another experimental research of the influence of the values of LUT units
codes on the basic features of FPGA projects has been made with the participation of
one of the authors of the given paper. The description of this research and its results
are shown in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. In the above considered experiment a random binary succession
was embedded in various FPGA projects. This led to the fragmentary changes of LUT
units codes as in accordance with table 1 the codes of units change only in the two of
four cases of possible combinations of values of bits of vectors RS and RS*. In [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]
the extreme cases of codes change in all the involved LUT units of FPGA-project
were considered. In order to create such kinds of changes the projects of similar
structures, but with the LUT units codes containing minimum and maximum amount
of one value, respectively, were formed and compared. The projects were chosen to
deploy the resources of the corresponding FPGA chip in a maximum way. In table 5
the main results of comparison of such projects are represented. The projects with the
minimum and maximum amount of one values are marked in table 5 as Pmin and Pmax,
respectively. In the given table the following characteristics are represented:
maximum clock frequency F; dynamic and static power supply as well as the total
energy consumption of chip core obtained for the indicated clock frequencies; δ – a
relative energy consumption change in mass changes of the number of logical values
in the codes of LUT units of a project. All the families of chips used in the experiment
have the core power supply equal 1,2 V.
        </p>
        <sec id="sec-8-3-1">
          <title>Project</title>
        </sec>
        <sec id="sec-8-3-2">
          <title>Pmin</title>
          <p>Pmax
δ</p>
        </sec>
        <sec id="sec-8-3-3">
          <title>Pmin</title>
          <p>Pmax
δ</p>
        </sec>
        <sec id="sec-8-3-4">
          <title>Pmin</title>
          <p>Pmax
δ</p>
        </sec>
        <sec id="sec-8-3-5">
          <title>Pmin</title>
          <p>Pmax
δ</p>
          <p>The experiment results shown in table 5 demonstrate that in maximum mass
change of the number of one values correlation in LUT units:
1. the energy consumption of input output system for chips within a FPGA family is
retained at the same level;
2. the chip core energy consumption changes insignificantly within one family mainly
due to the dynamic component (maximum value of this change equals 0,46% for
chips EP4CE30F29C6 of family Cyclone IV E);
3. the maximum clock frequency expressing the extreme processing speed of devices
does not practically change within one FPGA family.</p>
          <p>The results show that such important characteristics as productivity and energy
consumption are not practically dependent upon the type of Software code used in
FPGA-projects with the fixed hardware realization. So we can come to the
conclusions that according to the technology proposed in the given paper the DWM
embedding in a LUT-container does not substantially impact on the FPGA project
characteristics mentioned above.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>Conclusions</title>
      <p>The information technology proposed in the paper allows to perform DWM
embedding in containers with LUT-oriented architecture. The technology gives the
possibility to recover the initial state of container after DWM extraction from it. The
technology is based on the combination of DWM embedding method into
LUTcontainers proposed in the given paper and the popular Fridrich method oriented at
the passive multimedia containers. Unlike Fridrich method the proposed technology:
 uses less complicated Flipping-function taking into account the container
peculiarities;
 does not include the discrimination function calculation in order to perform the
element classification of container;
 performs information embedding at the level of the container elementary parts
(LUT-units) but not at the level of groups of elementary parts.</p>
      <p>The degree of the proposed technology effectiveness is of qualitative nature and is
expressed in possibility to recover the initial LUT-container after DWM extraction,
which was absent before. The proposed technology can be used in developing the
hardware and software, which realize digital watermark embedding in computer and
control devices created on the LUT-oriented element base (e.g. FPGA or
programmable logic integrated circuits with the similar architecture). Such kind of
embedding allows to control the device configuration integrity makes the substitution
or corruption of configuration impossible, which is of vital importance for critical
domains. In addition it allows to control the legitimacy of usage of project
information and devices themselves at the different stages of CAD and life cycle:
synthesized FPGA project, configuration file FPGA, operating device.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Shih</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Multimedia Security: Watermarking, Steganography, and Forensics</article-title>
          . CRC Press, Boca Raton, FL (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Cox</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bloom</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fridrich</surname>
            ,
            <given-names>J.: Digital</given-names>
          </string-name>
          <string-name>
            <surname>Watermarking</surname>
          </string-name>
          and Steganography. Morgan Kaufmann Publishers, Amsterdam (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Vasu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>George</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Deepthi</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>An Integrity Verification System for Images Using Hashing and Watermarking</article-title>
          .
          <source>Proceedings of the International Conference on Communication Systems and Network Technologies</source>
          .
          <fpage>85</fpage>
          -
          <lpage>89</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Coatrieux</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hui</surname>
            <given-names>Huang</given-names>
          </string-name>
          , Huazhong Shu, Limin Luo, Roux,
          <string-name>
            <surname>C.</surname>
          </string-name>
          :
          <article-title>A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization</article-title>
          .
          <source>IEEE J. Biomed. Health Inform</source>
          .
          <volume>17</volume>
          ,
          <fpage>1057</fpage>
          -
          <lpage>1067</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Sencar</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Memon</surname>
          </string-name>
          , N.:
          <article-title>Watermarking and ownership problem</article-title>
          .
          <source>Proceedings of the 5th ACM workshop on Digital rights management - DRM'05</source>
          . (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Arnold</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmucker</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolthusen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Techniques and Applications of Digital Watermarking and Content Protection</article-title>
          .
          <source>Artech House</source>
          , Boston (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Anderson</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition</article-title>
          . Wiley, New York (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Huffmire</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Handbook of FPGA Design Security</article-title>
          . Springer, Dordrecht (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Paul</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bhunia</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Reconfigurable Computing Using Content Addressable Memory for Improved Performance and Resource Usage</article-title>
          .
          <source>In: Proc. Design Automation Conference ACM/IEEE (DAC-2008)</source>
          ,
          <fpage>786</fpage>
          -
          <lpage>791</lpage>
          , ACM,
          <string-name>
            <surname>Anaheim</surname>
          </string-name>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Zashcholkin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ivanova</surname>
          </string-name>
          , E.:
          <article-title>Method of Steganographical Hiding of Information in LUTOriented Hardware Containers</article-title>
          .
          <source>Electrical and Computer Systems</source>
          .
          <volume>12</volume>
          (
          <issue>88</issue>
          ),
          <fpage>83</fpage>
          -
          <lpage>90</lpage>
          (
          <year>2013</year>
          )
          <article-title>(in Russian)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Zashcholkin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ivanova</surname>
          </string-name>
          , E.:
          <article-title>Steganography Data Hiding in LUT-Oriented Hardware Containers Method Development</article-title>
          .
          <source>Electrical and Computer Systems</source>
          .
          <volume>13</volume>
          (
          <issue>89</issue>
          ),
          <fpage>231</fpage>
          -
          <lpage>239</lpage>
          (
          <year>2014</year>
          )
          <article-title>(in Russian)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Fridrich</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goljan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Du</surname>
          </string-name>
          , R.:
          <article-title>Lossless Data Embedding - New Paradigm in Digital Watermarking</article-title>
          .
          <source>EURASIP Journal on Adv. Signal Process</source>
          .
          <year>2002</year>
          ,
          <fpage>185</fpage>
          -
          <lpage>196</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Goljan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fridrich</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Du</surname>
          </string-name>
          , R.:
          <article-title>Distortion-Free Data Embedding for Images</article-title>
          .
          <source>In: Proc. of the 4th International Workshop on Information Hiding (IHW-01)</source>
          ,
          <fpage>27</fpage>
          -
          <lpage>41</lpage>
          , USA,
          <string-name>
            <surname>Pittsburg</surname>
          </string-name>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Zashcholkin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Drozd</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Research in Key Features of FPGA-projects in Case of Changing the Codes in LUT-blocks</article-title>
          .
          <source>Scientific Herald of Yuriy Fedkovych Chernivtsi National University: Computer Systems and Components</source>
          . Vol.
          <volume>5</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>2</given-names>
          </string-name>
          ,
          <fpage>82</fpage>
          -
          <lpage>86</lpage>
          (
          <year>2014</year>
          )
          <article-title>(in Russian)</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>