CAD for Assurance of Electronic Systems

Faciometric Hardware Security Tool

By: Anirban Sengupta (IIT Indore), Mahendra Rathor (IIT Indore), and Himanshu Mishra (IIT Indore)

Stage: RTL


The Faciometric hardware security tool has been developed to simulate and analyze the functionality of facial biometric based approach for securing DSP hardware accelerators against piracy and false claim of ownership threats.
The left portion of the tool shows the panel for providing required inputs to the tool, right portion shows the panel with output buttons to see the intermediate and final outputs of the facial biometric based hardware security approach. The panel in the middle shows the status of the intermediate steps (i.e. capture facial biometric with required grid size, generate nodal points and facial features set, calculation of feature dimensions for selected features, facial signature generation and conversion to hardware security constraints) in generating hardware security constraints from a captured/input facial image. Initially, these status bars remain Red. Upon applying the inputs, the respective status bar turns Green. The Faciometric hardware security tool accepts the DSP application input in the form CDFG along with the resource constraints. The tool shows all the intermediate steps of facial biometric based hardware security approach and the finally generated facial signature and corresponding hardware security constraints at the output. Further, it also shows scheduling and registers allocation pre and post embedding facial signature constraints, onto the output window. The embedded facial signature in the hardware accelerator design can be used as a unique digital evidence to secure against piracy and false claim of ownership threats.


Anirban Sengupta

Input/Output Interface

  • Input: Inputs: Input facial Image, Grid size, chosen facial features, target DSP application, resource constraints
  • Output: Outputs: Facial Image with nodal points, Image with facial features, feature dimensions, facial signature in the form of digital template, Hardware security constraints, pre-embedding register allocation, pre-embedding scheduling, post-embedding register allocation, post-embedding scheduling.


Tool is developed for 64-bit machine. The associated executable files run on a 64-bit operating system. The jdk-16 is also another dependency.


Sengupta, Anirban; Rathor, Mahendra

Facial Biometric for Securing Hardware Accelerators Journal Article

In: IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 29, no. 1, pp. 112-123, 2021, ISSN: 1557-9999.

Abstract | Links | BibTeX


  • Indian Institute of Technology Indore, India

Video Demonstration

Available at: