Comparative Analysis of Hardware Obfuscation for IP Protection