ABSTRACT
As 3D printing technology begins to outpace traditional manufacturing, malicious users increasingly have sought to leverage this widely accessible platform to produce unlawful tools for criminal activities. Therefore, it is of paramount importance to identify the origin of unlawful 3D printed products using digital forensics. Traditional countermeasures, including information embedding or watermarking, rely on supervised manufacturing process and are impractical for identifying the origin of 3D printed tools in criminal applications. We argue that 3D printers possess unique fingerprints, which arise from hardware imperfections during the manufacturing process, causing discrepancies in the line formation of printed physical objects. These variations appear repeatedly and result in unique textures that can serve as a viable fingerprint on associated 3D printed products. To address the challenge of traditional forensics in identifying unlawful 3D printed products, we present PrinTracker, the 3D printer identification system, which can precisely trace the physical object to its source 3D printer based on their fingerprint. Results indicate that PrinTracker provides a high accuracy using 14 different 3D printers. Under unfavorable conditions (e.g. restricted sample area, location and process), the PrinTracker can still achieve an acceptable accuracy of 92%. Furthermore, we examine the effectiveness, robustness, reliability and vulnerabilities of the PrinTracker in multiple real-world scenarios.
Supplemental Material
- Y Abdallah and R Yousef. 2015. Augmentation of X-Rays Images using Pixel Intensity Values Adjustments. International Journal of Science and Research (IJSR), Vol. 4, 2 (2015), 2425--2430.Google Scholar
- Jerry Ajay, Chen Song, Aditya Singh Rathore, Chi Zhou, and Wenyao Xu. 2017. 3DGates: An Instruction-Level Energy Analysis and Optimization of 3D Printers Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems. ACM, 419--433. Google ScholarDigital Library
- KR Akshatha, AK Karunakar, H Anitha, U Raghavendra, and Dinesh Shetty. 2016. Digital camera identification using PRNU: A feature based approach. Digital Investigation Vol. 19 (2016), 69--77. Google ScholarDigital Library
- Patrice Rondao Alface and Benoit Macq. 2007. From 3D mesh data hiding to 3D shape blind and robust watermarking: A survey. Transactions on data hiding and multimedia security II. Springer, 91--115. Google ScholarDigital Library
- Christian Bayens, Garcia L Le T, R Beyah, M Javanmard, and S Zonouz. 2017. See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, 1181--1198. Google ScholarDigital Library
- Sevinc Bayram, H Sencar, Nasir Memon, and Ismail Avcibas. 2005. Source camera identification based on CFA interpolation Image Processing, 2005. ICIP 2005. IEEE International Conference on, Vol. Vol. 3. IEEE, III--69.Google Scholar
- Sevinc Bayram, Husrev T Sencar, and Nasir Memon. 2008. Classification of digital camera-models based on demosaicing artifacts. digital investigation, Vol. 5, 1 (2008), 49--59. Google ScholarDigital Library
- Oliver Benedens. 1999. Geometry-based watermarking of 3D models. Technical Report. FRAUNHOFER INST FOR COMPUTER GRAPHICS DARMSTADT (GERMANY) VIRTUAL REALITY DEMONSTRATION CENTRE.Google Scholar
- Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014).Google Scholar
- Ruud M Bolle, Jonathan H Connell, Sharath Pankanti, Nalini K Ratha, and Andrew W Senior. 2013. Guide to biometrics. Springer Science & Business Media. Google ScholarDigital Library
- Danton Bryans. 2015. Unlocked and loaded: government censorship of 3D-printed firearms and a proposal for more reasonable regulation of 3D-printed goods. Ind. LJ Vol. 90 (2015), 901.Google Scholar
- James DR Buchanan, Russell P Cowburn, Ana-Vanessa Jausovec, Dorothee Petit, Peter Seem, Gang Xiong, Del Atkinson, Kate Fenton, Dan A Allwood, and Matthew T Bryan. 2005. Forgery:`fingerprinting' documents and packaging. Nature, Vol. 436, 7050 (2005), 475--475.Google ScholarCross Ref
- SL Yinzhi Cao and E Wijmans. 2017. Browser Fingerprinting via OS and Hardware Level Features Proceedings of the 2017 Network & Distributed System Security Symposium, NDSS, Vol. Vol. 17.Google Scholar
- Lit-Hung Chan, Ngai-Fong Law, and Wan-Chi Siu. 2012. A two dimensional camera identification method based on image sensor noise Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on. IEEE, 1741--1744.Google ScholarCross Ref
- Wenyao Xu Chi Zhou Zhanpeng Jin Kui Ren Chen Song, Zhengxiong Li. 2018. My Smartphone Recognizes Genuine QR Codes! Practical Unclonable QR Code via 3D Printing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 2, 3 (2018). Google ScholarDigital Library
- Kyong-Tak Cho and Kang G Shin. 2016. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. USENIX Security Symposium. 911--927. Google ScholarDigital Library
- Kyong-Tak Cho and Kang G Shin. 2017. Viden: Attacker Identification on In-Vehicle Networks Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1109--1123. Google ScholarDigital Library
- William Clarkson, Tim Weyrich, Adam Finkelstein, Nadia Heninger, J Alex Halderman, and Edward W Felten. 2009. Fingerprinting blank paper using commodity scanners Security and Privacy, 2009 30th IEEE Symposium on. IEEE, 301--314. Google ScholarDigital Library
- Adam Dachowicz, Siva Chaitanya Chaduvula, Mikhail Atallah, and Jitesh H Panchal. 2017. Microstructure-Based Counterfeit Detection in Metal Part Manufacturing. JOM, Vol. 69, 11 (2017), 2390--2396.Google ScholarCross Ref
- Boris Danev, Thomas S Heydt-Benjamin, and Srdjan Capkun. 2009. Physical-layer Identification of RFID Devices.. In Usenix Security Symposium. 199--214. Google ScholarDigital Library
- Anupam Das, Nikita Borisov, and Matthew Caesar. 2014. Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 441--452. Google ScholarDigital Library
- Anupam Das, Nikita Borisov, and Matthew Caesar. 2016. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses. NDSS.Google Scholar
- Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, and Srihari Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. NDSS.Google Scholar
- Maurits Diephuis and Sviatoslav Voloshynovskiy. 2013. Physical object identification based on famos microstructure fingerprinting: comparison of templates versus invariant features Image and Signal Processing and Analysis (ISPA), 2013 8th International Symposium on. IEEE, 119--123.Google Scholar
- Maurits Diephuis, Sviatoslav Voloshynovskiy, and Taras Holotyak. 2015. Sketchprint: physical object micro-structure identification using mobile phones Signal Processing Conference (EUSIPCO), 2015 23rd European. IEEE, 834--838.Google Scholar
- Davis Doherty. 2012. Downloading infringement: patent law as a roadblock to the 3D printing revolution. Harv. JL & Tech. Vol. 26 (2012), 353.Google Scholar
- Alaa Eleyan and Hasan Demirel. 2011. Co-occurrence matrix and its statistical features as a new approach for face recognition. Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 19, 1 (2011), 97--107.Google Scholar
- Sebastian Eschweiler, Khaled Yakdan, and Elmar Gerhards-Padilla. 2016. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code. NDSS.Google Scholar
- Morten W Fagerland, Stian Lydersen, and Petter Laake. 2013. The McNemar test for binary matched-pairs data: mid-p and asymptotic are better than exact conditional. BMC medical research methodology Vol. 13, 1 (2013), 91.Google Scholar
- David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, and Raheem A Beyah. 2016. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems. NDSS.Google Scholar
- Blaise Gassend, Dwaine Clarke, Marten Van Dijk, and Srinivas Devadas. 2002. Silicon physical random functions. In Proceedings of the 9th ACM conference on Computer and communications security. ACM, 148--160. Google ScholarDigital Library
- Zeno J Geradts, Jurrien Bijhold, Martijn Kieft, Kenji Kurosawa, Kenro Kuroki, and Naoki Saitoh. 2001. Methods for identification of images acquired with digital cameras. Proc. of SPIE, Enabling Technologies for Law Enforcement and Security Vol. 4232 (2001), 505--512.Google ScholarCross Ref
- Jorge Guajardo, Sandeep S Kumar, Geert Jan Schrijen, and Pim Tuyls. 2007. FPGA intrinsic PUFs and their use for IP protection CHES, Vol. Vol. 4727. Springer, 63--80. Google ScholarDigital Library
- Julian Sommerville Hatcher, Frank J Jury, Jac Weller, and Thomas G Samworth. 1997. Firearms investigation, identification and evidence. Univ. Book Agency.Google Scholar
- David D Hernandez. 2015. Factors affecting dimensional precision of consumer 3D printing. International Journal of Aviation, Aeronautics, and Aerospace, Vol. 2, 4 (2015), 2.Google Scholar
- Daniel E Holcomb, Wayne P Burleson, and Kevin Fu. 2009. Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. Vol. 58, 9 (2009), 1198--1210. Google ScholarDigital Library
- 3D Hubs Digital Manufacturing Trends 2018. https://www.3dhubs.com/trends Accessed: 2018--2--2.Google Scholar
- Rick Hurd. 2016. Homemade gun in Stanford student's murder-suicide spurs question on 'ghost guns'. (Aug. 2016). https://www.mercurynews.com/2015/08/06/homemade-gun-in-stanford-students-murder-suicide-spurs-question-on-ghost-guns/Google Scholar
- Beau Jackson, Rushabh Haria, Michael Petch, Katie Armstrong, Michael Molitch-Hou, Alicia Miller, Jenny Shang, Lydia Mahon, and Nick Hall. 2018. AR-15 with 3D Printed Lower Receiver Seized in Oregon. (Jan. 2018). https://3dprintingindustry.com/news/ar-15-with-3d-printed-lower-receiver-seized-in-oregon-52234/Google Scholar
- Zachary C Kennedy, David E Stephenson, Josef F Christ, Timothy R Pope, Bruce W Arey, Christopher A Barrett, and Marvin G Warner. 2017. Enhanced anti-counterfeiting measures for additive manufacturing: coupling lanthanide nanomaterial chemical signatures with blockchain technology. Journal of Materials Chemistry C Vol. 5, 37 (2017), 9570--9578.Google ScholarCross Ref
- Nitin Khanna, Aravind K Mikkilineni, George T-C Chiu, Jan P Allebach, and Edward J Delp. 2008. Survey of Scanner and Printer Forensics at Purdue University. IWCF Vol. 8 (2008), 22--34. Google ScholarDigital Library
- Sandeep S Kumar, Jorge Guajardo, Roel Maes, Geert-Jan Schrijen, and Pim Tuyls. 2008. The butterfly PUF protecting IP on every FPGA. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on. IEEE, 67--70. Google ScholarDigital Library
- Jae W Lee, Daihyun Lim, Blaise Gassend, G Edward Suh, Marten Van Dijk, and Srinivas Devadas. 2004. A technique to build a secret key in integrated circuits for identification and authentication applications. In VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on. IEEE, 176--179.Google ScholarCross Ref
- Suk-Hawn Lee, Tae-Su Kim, Byung-Ju Kim, Seong-Geun Kwon, Ki-Ryong Kwon, and Kuhn-Il Lee. 2003. 3D polygonal meshes watermarking using normal vector distributions Multimedia and Expo, 2003. ICME'03. Proceedings. 2003 International Conference on, Vol. Vol. 3. IEEE, III--105. Google ScholarDigital Library
- Chang-Tsun Li. 2010. Source camera identification using enhanced sensor pattern noise. IEEE Transactions on Information Forensics and Security, Vol. 5, 2 (2010), 280--287. Google ScholarDigital Library
- Daihyun Lim, Jae W Lee, Blaise Gassend, G Edward Suh, Marten Van Dijk, and Srinivas Devadas. 2005. Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 13, 10 (2005), 1200--1205. Google ScholarDigital Library
- Benoıt Macq, Patrice Rondao Alface, and Mireia Montanola. 2015. Applicability of watermarking for intellectual property rights protection in a 3d printing scenario. In Proceedings of the 20th International Conference on 3D Web Technology. ACM, 89--95. Google ScholarDigital Library
- Eric Métois, Paul Yarin, Noah Salzman, and Joshua R Smith. 2002. FiberFingerprint identification. In Proc. 3rd Workshop on Automatic Identification. 147--154.Google Scholar
- Aravind K Mikkilineni, Osman Arslan, Pei-Ju Chiang, Roy M Kumontoy, Jan P Allebach, George T-C Chiu, and Edward J Delp. 2005. Printer forensics using svm techniques. In NIP & Digital Fabrication Conference, Vol. Vol. 2005. Society for Imaging Science and Technology, 223--226.Google Scholar
- Dieter Muhs, Herbert Wittel, Dieter Jannasch, and Joachim Voßiek. 2003. Roloff/Matek Maschinenelemente. Springer.Google Scholar
- Ke Nie, Jeon-Hor Chen, J Yu Hon, Yong Chu, Orhan Nalcioglu, and Min-Ying Su. 2008. Quantitative analysis of lesion morphology and texture features for diagnostic prediction in breast MRI. Academic radiology, Vol. 15, 12 (2008), 1513--1525.Google ScholarCross Ref
- Marios Papas, Thomas Houit, Derek Nowrouzezahrai, Markus H Gross, and Wojciech Jarosz. 2012. The magic lens: refractive steganography. ACM Trans. Graph., Vol. 31, 6 (2012), 186--1. Google ScholarDigital Library
- Hemant Sengar. 2014. VoIP Fraud: Identifying a Wolf in Sheep's Clothing Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 334--345. Google ScholarDigital Library
- Ashlesh Sharma, Lakshminarayanan Subramanian, and Eric A Brewer. 2011. PaperSpeckle: microscopic fingerprinting of paper. Proceedings of the 18th ACM conference on Computer and communications security. ACM, 99--110. Google ScholarDigital Library
- Robert L Skubic and James W Comb. 2012. Adjustable platform assembly for digital manufacturing system. (April 10. 2012). US Patent 8,153,183.Google Scholar
- Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, and Wenyao Xu. 2016. My smartphone knows what you print: Exploring smartphone-based side-channel attacks against 3d printers. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 895--907. Google ScholarDigital Library
- Yunpeng Song, Zhongmin Cai, and Zhi-Li Zhang. 2017. Multi-touch Authentication Using Hand Geometry and Behavioral Information Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 357--372.Google Scholar
- Ying Su, Jeremy Holleman, and Brian Otis. 2007. A 1.6 pJ/bit 96% stable chip-ID generating circuit using process variations Solid-State Circuits Conference, 2007. ISSCC 2007. Digest of Technical Papers. IEEE International. IEEE, 406--611.Google Scholar
- G Edward Suh and Srinivas Devadas. 2007. Physical unclonable functions for device authentication and secret key generation Proceedings of the 44th annual design automation conference. ACM, 9--14. Google ScholarDigital Library
- Daisuke Suzuki and Koichi Shimizu. 2010. The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes. CHES, Vol. Vol. 10. Springer, 366--382. Google ScholarDigital Library
- Ashwin Swaminathan, Min Wu, and KJ Ray Liu. 2008. Digital image forensics via intrinsic fingerprints. IEEE transactions on information forensics and security, Vol. 3, 1 (2008), 101--117. Google ScholarDigital Library
- Richard Szeliski. 2010. Computer vision: algorithms and applications. Springer Science & Business Media. Google ScholarDigital Library
- Ehsan Toreini, Siamak F Shahandashti, and Feng Hao. 2017. Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns. arXiv preprint arXiv:1705.02510 (2017).Google Scholar
- Jasper L Tran. 2014. The law and 3D printing. J. Marshall J. Info. Tech. & Privacy L. Vol. 31 (2014), 505.Google Scholar
- Mihran Tuceryan and Anil K Jain. 1993. Texture analysis. Handbook of pattern recognition and computer vision. World Scientific, 235--276. Google ScholarDigital Library
- Francesca Uccheddu, Massimiliano Corsini, and Mauro Barni. 2004. Wavelet-based blind watermarking of 3D models. In Proceedings of the 2004 workshop on Multimedia and security. ACM, 143--154. Google ScholarDigital Library
- Ansel Ugural. 2003. Mechanical design: an integrated approach. McGraw-Hill Science/Engineering/Math.Google Scholar
- Frerik van Beijnum, EG van Putten, KL Van der Molen, and AP Mosk. 2006. Recognition of paper samples by correlation of their speckle patterns. arXiv preprint physics/0610089 (2006).Google Scholar
- Vincent Van der Leest, Geert-Jan Schrijen, Helena Handschuh, and Pim Tuyls. 2010. Hardware intrinsic security from D flip-flops. In Proceedings of the fifth ACM workshop on Scalable trusted computing. ACM, 53--62. Google ScholarDigital Library
- Ingrid Verbauwhede and Roel Maes. 2011. Physically unclonable functions: manufacturing variability as an unclonable device identifier Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI. ACM, 455--460. Google ScholarDigital Library
- Svyatoslav Voloshynovskiy, Maurits Diephuis, Taras Holotyak, and Nabil Standardo. 2014. Physical object identification using micro-structure images. (2014).Google Scholar
- Gerald Walther. 2015. Printing insecurity? The security implications of 3d-printing of weapons. Science and engineering ethics Vol. 21, 6 (2015), 1435--1445.Google Scholar
- BT Wang. 2014. A temperature analysis control strategy on 3D printing nozzle. Hunan Normal University (2014).Google Scholar
- Mark Yampolskiy, Todd R Andel, J Todd McDonald, William B Glisson, and Alec Yasinsac. 2014. Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop. ACM, 7. Google ScholarDigital Library
- D-S Yan, Z-Q Cao, and G-R Kong. 2003. Analysis of the driving force by friction in a driving structure of FDM. Journal of Beijing University of Chemical Technology(Natural Science Edition), Vol. 30, 3 (2003), 71--73.Google Scholar
- Xiaofeng Yang, Srini Tridandapani, Jonathan J Beitler, David S Yu, Emi J Yoshida, Walter J Curran, and Tian Liu. 2012. Ultrasound GLCM texture analysis of radiation-induced parotid-gland injury in head-and-neck cancer radiotherapy: An in vivo study of late toxicity. Medical physics, Vol. 39, 9 (2012), 5732--5739.Google Scholar
- Wenyao Xu Chi Zhou Zhanpeng Jin Yang Gao, Borui Li. 2018. Watching and Safeguarding Your 3D Printer: Online Process Monitoring Against Cyber-Physical Attacks. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 2, 3 (2018). Google ScholarDigital Library
- Soweon Yoon. 2014. Fingerprint recognition: models and applications. Michigan State University.Google Scholar
- Robert J Young and Peter A Lovell. 2011. Introduction to polymers. CRC press.Google Scholar
- Longyu Zhang, Haiwei Dong, and Abdulmotaleb El Saddik. 2016. From 3D sensing to printing: A survey. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Vol. 12, 2 (2016), 27. Google ScholarDigital Library
- Zhe Zhou, Wenrui Diao, Xiangyu Liu, and Kehuan Zhang. 2014. Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 429--440. Google ScholarDigital Library
- Baoshi Zhu, Jiankang Wu, and Mohan S Kankanhalli. 2003. Print signatures for document authentication. In Proceedings of the 10th ACM conference on Computer and communications security. ACM, 145--154. Google ScholarDigital Library
- Sebastian Zimmeck, Jie S Li, Hyungtae Kim, Steven M Bellovin, and Tony Jebara. 2017. A privacy analysis of cross-device tracking. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, 1391--1408. Google ScholarDigital Library
Index Terms
- PrinTracker: Fingerprinting 3D Printers using Commodity Scanners
Recommendations
Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida
SAC '06: Proceedings of the 2006 ACM symposium on Applied computingThe purpose of this article is to highlight efforts by the Computer Crime Center at the Florida Department of Law Enforcement (FDLE) to prosecute ICAC cases under their jurisdiction. Section 1 presents an overview of the FDLE ICAC Initiative, a project ...
A survey of cyber crimes
With the advancement of computer and information technology, cyber crime is now becoming one of the most significant challenges facing law enforcement organizations. Cyber crimes are generally referred as criminal activities that use computers or ...
Latent Fingerprint Matching
Latent fingerprint identification is of critical importance to law enforcement agencies in identifying suspects: Latent fingerprints are inadvertent impressions left by fingers on surfaces of objects. While tremendous progress has been made in plain and ...
Comments