skip to main content
research-article

My Smartphone Recognizes Genuine QR Codes!: Practical Unclonable QR Code via 3D Printing

Authors Info & Claims
Published:05 July 2018Publication History
Skip Abstract Section

Abstract

Additive manufacturing, or 3D printing, has been widely applied in product manufacturing. However, the emerging unauthorized access of 3D printing data, as well as the growth in the pervasiveness and capability of 3D printing devices have raised serious concerns about 3D printing product anti-counterfeit. Electronic product tags are the current standard for authentication purposes; however, often this technology is neither secure nor cost-effective, and fails to take advantage of other unique 3D printing features. Considering the great usability of the QR code, we are motivated to enhance the QR code for the practical and cost-effective 3D printing product identification. Particularly, we bring up the all-in-one design, all-in-one manufacturing concept incorporating the QR code in the complete 3D printing paradigm. In detail, we explore the possibility of leveraging the random and uncontrollable process variations in the 3D printing system to generate a unique fingerprint for the integrated QR code. To this end, we present an end-to-end 3D-printed QR code verification framework, which does not change the original QR protocol and functionality. The entire solution can be implemented with commodity 3D printers and smartphones. Specifically, we first investigate the inevitable and random process variations in the 3D printing mechanism and analyze the causality between the variations and detectable geometric deformation. We further develop a fingerprint extraction algorithm taking into account both the QR code property and the 3D printer characteristics. The system evaluation indicates that our solution is secure and robust in multiple scenarios.

References

  1. First edition in 1950s. G-code (RS-274). http://reprap.org/wiki/G-code.Google ScholarGoogle Scholar
  2. First edition in 1950s. Materialise Magics. http://software.materialise.com/magics.Google ScholarGoogle Scholar
  3. Sung-Hoon Ahn, Michael Montero, Dan Odell, Shad Roundy, and Paul K Wright. 2002. Anisotropic Material Properties of Fused Deposition Modeling ABS. Rapid Prototyping Journal 8, 4 (2002), 248--257.Google ScholarGoogle ScholarCross RefCross Ref
  4. Jerry Ajay, Chen Song, Aditya Singh Rathore, Chi Zhou, and Wenyao Xu. 2017. 3DGates: An Instruction-Level Energy Analysis and Optimization of 3D Printers. In Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2017, Xi'an, China, April 8-12, 2017. 419--433. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Mohammad Abdullah Al Faruque, Sujit Rokka Chhetri, Arquimedes Canedo, and Jiang Wan. 2016. Acoustic Side-Channel Attacks on Additive Manufacturing Systems. In 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS). IEEE, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Samuel N Bernier, Bertier Luyt, and Tatiana Reinhard. 2015. Design for 3D Printing: Scanning, Creating, Editing, Remixing, and Making in Three Dimensions. Maker Media, Inc.Google ScholarGoogle Scholar
  7. VB Bhandari. 2010. Design of Machine Elements. Tata McGraw-Hill Education.Google ScholarGoogle Scholar
  8. James DR Buchanan, Russell P Cowburn, Ana-Vanessa Jausovec, Dorothee Petit, Peter Seem, Gang Xiong, Del Atkinson, Kate Fenton, Dan A Allwood, and Matthew T Bryan. 2005. Forgery: "Fingerprinting" Documents and Packaging. Nature 436, 7050 (2005), 475.Google ScholarGoogle Scholar
  9. Philippe Bulens, F-X Standaert, and J-J Quisquater. 2010. How to Strongly Link Data and Its Medium: The Paper Case. IET Information Security 4, 3 (2010), 125--136.Google ScholarGoogle ScholarCross RefCross Ref
  10. John Canny. 1986. A Computational Approach to Edge Detection. IEEE Transactions on Pattern Analysis and Machine Intelligence 6 (1986), 679--698. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gregor Čepon and Miha Boltežar. 2009. Dynamics of A Belt-drive System Using A Linear Complementarity problem for the Belt-pulley Contact Description. Journal of Sound and Vibration 319, 3 (2009), 1019--1035.Google ScholarGoogle ScholarCross RefCross Ref
  12. Chee Kai Chua and Kah Fai Leong. 2003. Rapid Prototyping: Principles and Applications. Vol. 1. World Scientific. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Scott Cohen and L Guibasm. 1999. The Earth Mover's Distance under Transformation Sets. In Computer Vision, 1999. The proceedings of the seventh IEEE International Conference on, Vol. 2. IEEE, 1076--1083. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Robert Collier. 2013. Optical Holography. Elsevier.Google ScholarGoogle Scholar
  15. Apple Worldwide Developers Conference. 2017. Capturing Depth in iPhone Photography. Retrieved 2018-4-17 from https://developer.apple.com/videos/play/wwdc2017/507/Google ScholarGoogle Scholar
  16. Anupam Das, Nikita Borisov, and Matthew Caesar. 2014. Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 441--452. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Vincent Del Toro. 1985. Electric Machines and Power Systems. (1985).Google ScholarGoogle Scholar
  18. ADC Denso. 2011. QR Code Essentials. Denso Wave 900 (2011).Google ScholarGoogle Scholar
  19. Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, and Srihari Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. In The 2014 Network and Distributed System Security (NDSS) Symposium.Google ScholarGoogle Scholar
  20. Hu Ding and Jinhui Xu. 2014. Finding Median Point-Set Using Earth Mover's Distance. In The 28th AAAI Conference on Artificial Intelligence (AAAI-14). 1781--1787. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. André Dolenc and Ismo Mäkelä. 1994. Slicing Procedures for Layered Manufacturing Techniques. Computer-Aided Design 26, 2 (1994), 119--126.Google ScholarGoogle ScholarCross RefCross Ref
  22. FGAE. 2018. Camera FV-5. Retrieved 2018-4-2 from https://play.google.com/store/apps/details?id=com.flavionet.android.camera.proGoogle ScholarGoogle Scholar
  23. Jay Gao. 2008. Digital Analysis of Remotely Sensed Imagery. McGraw-Hill Professional. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Ian Gibson, David W Rosen, and Brent Stucker. 2010. Design for Additive Manufacturing. In Additive Manufacturing Technologies. Springer, 299--332.Google ScholarGoogle Scholar
  25. Frank L Hitchcock. 1941. The Distribution of A Product from Several Sources to Numerous Localities. Journal of Mathematics and Physics 20, 1 (1941), 224--230.Google ScholarGoogle ScholarCross RefCross Ref
  26. Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne S Winslett, Carl A Gunter, and William P King. 2016. Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 883--894. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Ari Juels. 2006. RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24, 2 (2006), 381--394. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Amruta L. Kabade. 2016. Canny Edge Detection Algorithm. (2016).Google ScholarGoogle Scholar
  29. William Morrow Kays, Michael E Crawford, and Bernhard Weigand. 2012. Convective Heat and Mass Transfer. Tata McGraw-Hill Education.Google ScholarGoogle Scholar
  30. Liza Wallach Kloski and Nick Kloski. 2016. Getting Started with 3D Printing: A Hands-on Guide to the Hardware, Software, and Services Behind the New Manufacturing Revolution. Maker Media, Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Paul C Krause, Oleg Wasynczuk, and Steven D Pekarek. 2012. Electromechanical Motion Devices. Vol. 90. John Wiley 8 Sons.Google ScholarGoogle Scholar
  32. BC Kuo and J Tal. 1978. Incremental Motion Step Motors and Control Systems, Volume II. SRL. Publishing (1978).Google ScholarGoogle Scholar
  33. John H Lienhard. 2013. A Heat Transfer Textbook. Courier Corporation.Google ScholarGoogle Scholar
  34. Jan Lukas, Jessica Fridrich, and Miroslav Goljan. 2006. Digital Camera Identification from Sensor Pattern Noise. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 205--214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. James Manyika, Michael Chui, Jacques Bughin, Richard Dobbs, Peter Bisson, and Alex Marrs. 2013. Disruptive Technologies: Advances that Will Transform Life, Business, and The Global Economy. Vol. 180. McKinsey Global Institute San Francisco, CA.Google ScholarGoogle Scholar
  36. Nanoscribe. 2016. Photonic Professional GT. Retrieved 2017-08-11 from https://www.photonics.com/pr61179/Photonic_Professional_GTGoogle ScholarGoogle Scholar
  37. Sani R Nassif. 2001. Modeling and Analysis of Manufacturing Variations. In Custom Integrated Circuits, 2001, IEEE Conference on. IEEE, 223--228.Google ScholarGoogle ScholarCross RefCross Ref
  38. Newsweek. 2015. Counterfeit Drug Industry. Retrieved 2018-4-17 from http://www.newsweek.com/2015/09/25/fake-drug-industry-exploding-and-we-cant-do-anything-about-it-373088.htmlGoogle ScholarGoogle Scholar
  39. The Global Language of Business. 2017. Universal Product Code (UPC). Retrieved 2018-4-17 from http://www.gs1us.org/resources/standards/ean-upc-visualsGoogle ScholarGoogle Scholar
  40. Tom Page. 2011. Design for Additive Manufacturing. (2011).Google ScholarGoogle Scholar
  41. Jantana Panyavaraporn, Paramate Horkaew, and Wannaree Wongtrairat. 2013. QR Code Watermarking Algorithm Based on Wavelet Transform. In Communications and Information Technologies (ISCIT), 2013 13th International Symposium on. IEEE, 791--796.Google ScholarGoogle ScholarCross RefCross Ref
  42. Ravikanth Pappu, Ben Recht, Jason Taylor, and Neil Gershenfeld. 2002. Physical One-way Functions. Science 297, 5589 (2002), 2026--2030.Google ScholarGoogle Scholar
  43. Zhenbo Ren, Ping Su, Jianshe Ma, and Guofan Jin. 2014. Secure and Noise-free Holographic Encryption with A Quick-Response Code. Chinese Optics Letters 12, 1 (2014), 010601.Google ScholarGoogle ScholarCross RefCross Ref
  44. Yossi Rubner and Carlo Tomasi. 2001. The Earth Mover's Distance. In Perceptual Metrics for Image Database Navigation. Springer, 13--28.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Yossi Rubner, Carlo Tomasi, and Leonidas J Guibas. 2000. The Earth Mover's Distance as A Metric for Image Retrieval. International Journal of Computer Vision 40, 2 (2000), 99--121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. David Salomon. 2004. Data Compression: the Complete Reference. Springer Science 8 Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Samsung. 2017. Samsung Galaxy S8 Specifications. Retrieved 2018-4-17 from http://www.samsung.com/global/galaxy/galaxy-s8/specs/Google ScholarGoogle Scholar
  48. Science. 2018. Drug Manufacturing via 3D Printing. Retrieved 2018-4-17 from http://www.sciencemag.org/news/2018/01/you-could-soon-be-manufacturing-your-own-drugs-thanks-3d-printingGoogle ScholarGoogle Scholar
  49. Vellaisamy Seenivasagam and Ramesh Velumani. 2013. A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud. Computational and Mathematical Methods in Medicine 2013 (2013).Google ScholarGoogle Scholar
  50. Tiziano Serra, Josep A Planell, and Melba Navarro. 2013. High-resolution PLA-based Composite Scaffolds via 3D Printing Technology. Acta Biomaterialia 9, 3 (2013), 5521--5530.Google ScholarGoogle ScholarCross RefCross Ref
  51. Ruchir Y Shah, Prajesh N Prajapati, and YK Agrawal. 2010. Anticounterfeit Packaging Technologies. Journal of Advanced Pharmaceutical Technology 8 Research 1, 4 (2010), 368.Google ScholarGoogle ScholarCross RefCross Ref
  52. Joseph E Shigley, Charles R Mischke, and Richard G Budynas. 2004. Mechanical Engineering Design. McGraw-Hill.Google ScholarGoogle Scholar
  53. Boris Škorić, Stefan Maubach, Tom Kevenaar, and Pim Tuyls. 2006. Information-theoretic Analysis of Capacitive Physical Unclonable Functions. Journal of Applied Physics 100, 2 (2006), 024902.Google ScholarGoogle ScholarCross RefCross Ref
  54. Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, and Wenyao Xu. 2016. My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 895--907. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Chen Song, Aosen Wang, Kui Ren, and Wenyao Xu. 2016. EyeVeri: A Secure and Usable Approach for Smartphone User Authentication. In Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on. IEEE, 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  56. Stefan H Steiner and R Jock MacKay. 2005. Statistical Engineering: An Algorithm for Reducing Variation in Manufacturing Processes. Vol. 1. ASQ Quality Press.Google ScholarGoogle Scholar
  57. Madhu Sudan. 1997. Decoding of Reed Solomon Codes Beyond the Error-correction Bound. Journal of Complexity 13, 1 (1997), 180--193. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. G Edward Suh and Srinivas Devadas. 2007. Physical Unclonable Functions for Device Authentication and Secret Key Generation. In Proceedings of the 44th Annual Design Automation Conference. ACM, 9--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Iuliia Tkachenko, William Puech, Christophe Destruel, Olivier Strauss, Jean-Marc Gaudin, and Christian Guichard. 2016. Two-Level QR Code for Private Message Sharing and Document Authentication. IEEE Transactions on Information Forensics and Security 11, 3 (2016), 571--583.Google ScholarGoogle ScholarCross RefCross Ref
  60. Keith M Tolk. 1992. Reflective Particle Technology for Identification of Critical Components. Technical Report. Sandia National Labs., Albuquerque, NM (United States).Google ScholarGoogle Scholar
  61. Pim Tuyls, Geert-Jan Schrijen, Boris Škorić, Jan Van Geloven, Nynke Verhaegh, and Rob Wolters. 2006. Read-proof Hardware from Protective Coatings. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 369--383. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Pim Tuyls and Boris Škoric. 2006. Physical Unclonable Functions for Enhanced Security of Tokens and Tags. In ISSE 2006-Securing Electronic Busines Processes. Springer, 30--37.Google ScholarGoogle Scholar
  63. Ultimaker. 2013. As 3D Printing Becomes More Accessible, Copyright Questions Arise. Retrieved 2017-5-1 from http://www.npr.org/sections/alltechconsidered/2013/02/19/171912826/as-3-d-printing-become-more-accessible-copyright-questions-ariseGoogle ScholarGoogle Scholar
  64. Ultimaker. 2017. Ultimaker Cura Software. Retrieved 2018-4-17 from https://ultimaker.com/en/products/cura-softwareGoogle ScholarGoogle Scholar
  65. Shinji Umeyama. 1991. Least-squares Estimation of Transformation Parameters Between Two Point Patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence 13, 4 (1991), 376--380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Ron G Van Schyndel, Andrew Z Tirkel, and Charles F Osborne. 1994. A Digital Watermark. In Image Processing, 1994. Proceedings. ICIP-94., IEEE International Conference, Vol. 2. IEEE, 86--90.Google ScholarGoogle ScholarCross RefCross Ref
  67. Sartid Vongpradhip and Suppat Rungraungsilp. 2012. QR Code Using Invisible Watermarking in Frequency Domain. In 2011 Ninth International Conference on ICT and Knowledge Engineering. IEEE, 47--52.Google ScholarGoogle Scholar
  68. Aosen Wang, Tianjiao Wang, Chi Zhou, and Wenyao Xu. 2017. LuBan: Low-Cost and In-Situ Droplet Micro-Sensing for Inkjet 3D Printing Quality Assurance. In Proceedings of the 15th ACM Conference on Embedded Networked Sensor Systems (SenSys '17). ACM, Delft, Netherlands, 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Bing Wang and ShaoSheng Fan. 2009. An Improved CANNY Edge Detection Algorithm. In Computer Science and Engineering, 2009. WCSE'09. Second International Workshop on, Vol. 1. IEEE, 497--500. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Ian H Witten, Radford M Neal, and John G Cleary. 1987. Arithmetic Coding for Data Compression. Commun. ACM 30, 6 (1987), 520--540. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Terry Wohlers. 2017. Wohlers report 2017: 3D Printing and Additive Manufacturing State of the Industry. Wohlers Associates.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 2, Issue 2
    June 2018
    741 pages
    EISSN:2474-9567
    DOI:10.1145/3236498
    Issue’s Table of Contents

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 5 July 2018
    • Accepted: 1 April 2018
    • Revised: 1 January 2018
    • Received: 1 November 2017
    Published in imwut Volume 2, Issue 2

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader