Abstract
Additive manufacturing, or 3D printing, has been widely applied in product manufacturing. However, the emerging unauthorized access of 3D printing data, as well as the growth in the pervasiveness and capability of 3D printing devices have raised serious concerns about 3D printing product anti-counterfeit. Electronic product tags are the current standard for authentication purposes; however, often this technology is neither secure nor cost-effective, and fails to take advantage of other unique 3D printing features. Considering the great usability of the QR code, we are motivated to enhance the QR code for the practical and cost-effective 3D printing product identification. Particularly, we bring up the all-in-one design, all-in-one manufacturing concept incorporating the QR code in the complete 3D printing paradigm. In detail, we explore the possibility of leveraging the random and uncontrollable process variations in the 3D printing system to generate a unique fingerprint for the integrated QR code. To this end, we present an end-to-end 3D-printed QR code verification framework, which does not change the original QR protocol and functionality. The entire solution can be implemented with commodity 3D printers and smartphones. Specifically, we first investigate the inevitable and random process variations in the 3D printing mechanism and analyze the causality between the variations and detectable geometric deformation. We further develop a fingerprint extraction algorithm taking into account both the QR code property and the 3D printer characteristics. The system evaluation indicates that our solution is secure and robust in multiple scenarios.
- First edition in 1950s. G-code (RS-274). http://reprap.org/wiki/G-code.Google Scholar
- First edition in 1950s. Materialise Magics. http://software.materialise.com/magics.Google Scholar
- Sung-Hoon Ahn, Michael Montero, Dan Odell, Shad Roundy, and Paul K Wright. 2002. Anisotropic Material Properties of Fused Deposition Modeling ABS. Rapid Prototyping Journal 8, 4 (2002), 248--257.Google ScholarCross Ref
- Jerry Ajay, Chen Song, Aditya Singh Rathore, Chi Zhou, and Wenyao Xu. 2017. 3DGates: An Instruction-Level Energy Analysis and Optimization of 3D Printers. In Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2017, Xi'an, China, April 8-12, 2017. 419--433. Google ScholarDigital Library
- Mohammad Abdullah Al Faruque, Sujit Rokka Chhetri, Arquimedes Canedo, and Jiang Wan. 2016. Acoustic Side-Channel Attacks on Additive Manufacturing Systems. In 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS). IEEE, 1--10. Google ScholarDigital Library
- Samuel N Bernier, Bertier Luyt, and Tatiana Reinhard. 2015. Design for 3D Printing: Scanning, Creating, Editing, Remixing, and Making in Three Dimensions. Maker Media, Inc.Google Scholar
- VB Bhandari. 2010. Design of Machine Elements. Tata McGraw-Hill Education.Google Scholar
- James DR Buchanan, Russell P Cowburn, Ana-Vanessa Jausovec, Dorothee Petit, Peter Seem, Gang Xiong, Del Atkinson, Kate Fenton, Dan A Allwood, and Matthew T Bryan. 2005. Forgery: "Fingerprinting" Documents and Packaging. Nature 436, 7050 (2005), 475.Google Scholar
- Philippe Bulens, F-X Standaert, and J-J Quisquater. 2010. How to Strongly Link Data and Its Medium: The Paper Case. IET Information Security 4, 3 (2010), 125--136.Google ScholarCross Ref
- John Canny. 1986. A Computational Approach to Edge Detection. IEEE Transactions on Pattern Analysis and Machine Intelligence 6 (1986), 679--698. Google ScholarDigital Library
- Gregor Čepon and Miha Boltežar. 2009. Dynamics of A Belt-drive System Using A Linear Complementarity problem for the Belt-pulley Contact Description. Journal of Sound and Vibration 319, 3 (2009), 1019--1035.Google ScholarCross Ref
- Chee Kai Chua and Kah Fai Leong. 2003. Rapid Prototyping: Principles and Applications. Vol. 1. World Scientific. Google ScholarDigital Library
- Scott Cohen and L Guibasm. 1999. The Earth Mover's Distance under Transformation Sets. In Computer Vision, 1999. The proceedings of the seventh IEEE International Conference on, Vol. 2. IEEE, 1076--1083. Google ScholarDigital Library
- Robert Collier. 2013. Optical Holography. Elsevier.Google Scholar
- Apple Worldwide Developers Conference. 2017. Capturing Depth in iPhone Photography. Retrieved 2018-4-17 from https://developer.apple.com/videos/play/wwdc2017/507/Google Scholar
- Anupam Das, Nikita Borisov, and Matthew Caesar. 2014. Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 441--452. Google ScholarDigital Library
- Vincent Del Toro. 1985. Electric Machines and Power Systems. (1985).Google Scholar
- ADC Denso. 2011. QR Code Essentials. Denso Wave 900 (2011).Google Scholar
- Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, and Srihari Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. In The 2014 Network and Distributed System Security (NDSS) Symposium.Google Scholar
- Hu Ding and Jinhui Xu. 2014. Finding Median Point-Set Using Earth Mover's Distance. In The 28th AAAI Conference on Artificial Intelligence (AAAI-14). 1781--1787. Google ScholarDigital Library
- André Dolenc and Ismo Mäkelä. 1994. Slicing Procedures for Layered Manufacturing Techniques. Computer-Aided Design 26, 2 (1994), 119--126.Google ScholarCross Ref
- FGAE. 2018. Camera FV-5. Retrieved 2018-4-2 from https://play.google.com/store/apps/details?id=com.flavionet.android.camera.proGoogle Scholar
- Jay Gao. 2008. Digital Analysis of Remotely Sensed Imagery. McGraw-Hill Professional. Google ScholarDigital Library
- Ian Gibson, David W Rosen, and Brent Stucker. 2010. Design for Additive Manufacturing. In Additive Manufacturing Technologies. Springer, 299--332.Google Scholar
- Frank L Hitchcock. 1941. The Distribution of A Product from Several Sources to Numerous Localities. Journal of Mathematics and Physics 20, 1 (1941), 224--230.Google ScholarCross Ref
- Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne S Winslett, Carl A Gunter, and William P King. 2016. Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 883--894. Google ScholarDigital Library
- Ari Juels. 2006. RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24, 2 (2006), 381--394. Google ScholarDigital Library
- Amruta L. Kabade. 2016. Canny Edge Detection Algorithm. (2016).Google Scholar
- William Morrow Kays, Michael E Crawford, and Bernhard Weigand. 2012. Convective Heat and Mass Transfer. Tata McGraw-Hill Education.Google Scholar
- Liza Wallach Kloski and Nick Kloski. 2016. Getting Started with 3D Printing: A Hands-on Guide to the Hardware, Software, and Services Behind the New Manufacturing Revolution. Maker Media, Inc. Google ScholarDigital Library
- Paul C Krause, Oleg Wasynczuk, and Steven D Pekarek. 2012. Electromechanical Motion Devices. Vol. 90. John Wiley 8 Sons.Google Scholar
- BC Kuo and J Tal. 1978. Incremental Motion Step Motors and Control Systems, Volume II. SRL. Publishing (1978).Google Scholar
- John H Lienhard. 2013. A Heat Transfer Textbook. Courier Corporation.Google Scholar
- Jan Lukas, Jessica Fridrich, and Miroslav Goljan. 2006. Digital Camera Identification from Sensor Pattern Noise. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 205--214. Google ScholarDigital Library
- James Manyika, Michael Chui, Jacques Bughin, Richard Dobbs, Peter Bisson, and Alex Marrs. 2013. Disruptive Technologies: Advances that Will Transform Life, Business, and The Global Economy. Vol. 180. McKinsey Global Institute San Francisco, CA.Google Scholar
- Nanoscribe. 2016. Photonic Professional GT. Retrieved 2017-08-11 from https://www.photonics.com/pr61179/Photonic_Professional_GTGoogle Scholar
- Sani R Nassif. 2001. Modeling and Analysis of Manufacturing Variations. In Custom Integrated Circuits, 2001, IEEE Conference on. IEEE, 223--228.Google ScholarCross Ref
- Newsweek. 2015. Counterfeit Drug Industry. Retrieved 2018-4-17 from http://www.newsweek.com/2015/09/25/fake-drug-industry-exploding-and-we-cant-do-anything-about-it-373088.htmlGoogle Scholar
- The Global Language of Business. 2017. Universal Product Code (UPC). Retrieved 2018-4-17 from http://www.gs1us.org/resources/standards/ean-upc-visualsGoogle Scholar
- Tom Page. 2011. Design for Additive Manufacturing. (2011).Google Scholar
- Jantana Panyavaraporn, Paramate Horkaew, and Wannaree Wongtrairat. 2013. QR Code Watermarking Algorithm Based on Wavelet Transform. In Communications and Information Technologies (ISCIT), 2013 13th International Symposium on. IEEE, 791--796.Google ScholarCross Ref
- Ravikanth Pappu, Ben Recht, Jason Taylor, and Neil Gershenfeld. 2002. Physical One-way Functions. Science 297, 5589 (2002), 2026--2030.Google Scholar
- Zhenbo Ren, Ping Su, Jianshe Ma, and Guofan Jin. 2014. Secure and Noise-free Holographic Encryption with A Quick-Response Code. Chinese Optics Letters 12, 1 (2014), 010601.Google ScholarCross Ref
- Yossi Rubner and Carlo Tomasi. 2001. The Earth Mover's Distance. In Perceptual Metrics for Image Database Navigation. Springer, 13--28.Google ScholarDigital Library
- Yossi Rubner, Carlo Tomasi, and Leonidas J Guibas. 2000. The Earth Mover's Distance as A Metric for Image Retrieval. International Journal of Computer Vision 40, 2 (2000), 99--121. Google ScholarDigital Library
- David Salomon. 2004. Data Compression: the Complete Reference. Springer Science 8 Business Media. Google ScholarDigital Library
- Samsung. 2017. Samsung Galaxy S8 Specifications. Retrieved 2018-4-17 from http://www.samsung.com/global/galaxy/galaxy-s8/specs/Google Scholar
- Science. 2018. Drug Manufacturing via 3D Printing. Retrieved 2018-4-17 from http://www.sciencemag.org/news/2018/01/you-could-soon-be-manufacturing-your-own-drugs-thanks-3d-printingGoogle Scholar
- Vellaisamy Seenivasagam and Ramesh Velumani. 2013. A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud. Computational and Mathematical Methods in Medicine 2013 (2013).Google Scholar
- Tiziano Serra, Josep A Planell, and Melba Navarro. 2013. High-resolution PLA-based Composite Scaffolds via 3D Printing Technology. Acta Biomaterialia 9, 3 (2013), 5521--5530.Google ScholarCross Ref
- Ruchir Y Shah, Prajesh N Prajapati, and YK Agrawal. 2010. Anticounterfeit Packaging Technologies. Journal of Advanced Pharmaceutical Technology 8 Research 1, 4 (2010), 368.Google ScholarCross Ref
- Joseph E Shigley, Charles R Mischke, and Richard G Budynas. 2004. Mechanical Engineering Design. McGraw-Hill.Google Scholar
- Boris Škorić, Stefan Maubach, Tom Kevenaar, and Pim Tuyls. 2006. Information-theoretic Analysis of Capacitive Physical Unclonable Functions. Journal of Applied Physics 100, 2 (2006), 024902.Google ScholarCross Ref
- Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, and Wenyao Xu. 2016. My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 895--907. Google ScholarDigital Library
- Chen Song, Aosen Wang, Kui Ren, and Wenyao Xu. 2016. EyeVeri: A Secure and Usable Approach for Smartphone User Authentication. In Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on. IEEE, 1--9.Google ScholarCross Ref
- Stefan H Steiner and R Jock MacKay. 2005. Statistical Engineering: An Algorithm for Reducing Variation in Manufacturing Processes. Vol. 1. ASQ Quality Press.Google Scholar
- Madhu Sudan. 1997. Decoding of Reed Solomon Codes Beyond the Error-correction Bound. Journal of Complexity 13, 1 (1997), 180--193. Google ScholarDigital Library
- G Edward Suh and Srinivas Devadas. 2007. Physical Unclonable Functions for Device Authentication and Secret Key Generation. In Proceedings of the 44th Annual Design Automation Conference. ACM, 9--14. Google ScholarDigital Library
- Iuliia Tkachenko, William Puech, Christophe Destruel, Olivier Strauss, Jean-Marc Gaudin, and Christian Guichard. 2016. Two-Level QR Code for Private Message Sharing and Document Authentication. IEEE Transactions on Information Forensics and Security 11, 3 (2016), 571--583.Google ScholarCross Ref
- Keith M Tolk. 1992. Reflective Particle Technology for Identification of Critical Components. Technical Report. Sandia National Labs., Albuquerque, NM (United States).Google Scholar
- Pim Tuyls, Geert-Jan Schrijen, Boris Škorić, Jan Van Geloven, Nynke Verhaegh, and Rob Wolters. 2006. Read-proof Hardware from Protective Coatings. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 369--383. Google ScholarDigital Library
- Pim Tuyls and Boris Škoric. 2006. Physical Unclonable Functions for Enhanced Security of Tokens and Tags. In ISSE 2006-Securing Electronic Busines Processes. Springer, 30--37.Google Scholar
- Ultimaker. 2013. As 3D Printing Becomes More Accessible, Copyright Questions Arise. Retrieved 2017-5-1 from http://www.npr.org/sections/alltechconsidered/2013/02/19/171912826/as-3-d-printing-become-more-accessible-copyright-questions-ariseGoogle Scholar
- Ultimaker. 2017. Ultimaker Cura Software. Retrieved 2018-4-17 from https://ultimaker.com/en/products/cura-softwareGoogle Scholar
- Shinji Umeyama. 1991. Least-squares Estimation of Transformation Parameters Between Two Point Patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence 13, 4 (1991), 376--380. Google ScholarDigital Library
- Ron G Van Schyndel, Andrew Z Tirkel, and Charles F Osborne. 1994. A Digital Watermark. In Image Processing, 1994. Proceedings. ICIP-94., IEEE International Conference, Vol. 2. IEEE, 86--90.Google ScholarCross Ref
- Sartid Vongpradhip and Suppat Rungraungsilp. 2012. QR Code Using Invisible Watermarking in Frequency Domain. In 2011 Ninth International Conference on ICT and Knowledge Engineering. IEEE, 47--52.Google Scholar
- Aosen Wang, Tianjiao Wang, Chi Zhou, and Wenyao Xu. 2017. LuBan: Low-Cost and In-Situ Droplet Micro-Sensing for Inkjet 3D Printing Quality Assurance. In Proceedings of the 15th ACM Conference on Embedded Networked Sensor Systems (SenSys '17). ACM, Delft, Netherlands, 1--14. Google ScholarDigital Library
- Bing Wang and ShaoSheng Fan. 2009. An Improved CANNY Edge Detection Algorithm. In Computer Science and Engineering, 2009. WCSE'09. Second International Workshop on, Vol. 1. IEEE, 497--500. Google ScholarDigital Library
- Ian H Witten, Radford M Neal, and John G Cleary. 1987. Arithmetic Coding for Data Compression. Commun. ACM 30, 6 (1987), 520--540. Google ScholarDigital Library
- Terry Wohlers. 2017. Wohlers report 2017: 3D Printing and Additive Manufacturing State of the Industry. Wohlers Associates.Google Scholar
Recommendations
3D printed perforated QR codes
Highlights- A problem for carving a QR code on a surface such that the 3D printed QR code with homogeneous material is decodable.
Graphical abstractDisplay Omitted
AbstractQR codes are machine-readable optical 2D matrix barcodes which can be easily displayed physically on printed media or digitally on a screen. In recent years, artists and researchers have paid much attention to beautify and enhance QR ...
Embedding QR codes onto B-spline surfaces for 3D printing
AbstractRecent advance of Additive Manufacturing technologies allows us to manufacture various parts used in real-world products. Consequently, product tracking of such 3D printed parts is an important issue. Quick Response (QR) code which is ...
Graphical abstractDisplay Omitted
Highlights- A concept called 3D QR code that can be printed directly on parts is introduced.
Fundamental characteristics of printed gelatin utilizing micro 3D printer
Gelatin is useful for biofabrication, because it can be used for cell scaffolds and it has unique properties. Therefore, we attempted to fabricate biodevices of gelatin utilizing micro 3D printer which is able to print with high precision. However, it ...
Comments