Authors
Zhengxiong Li, Aditya Singh Rathore, Chen Song, Sheng Wei, Yanzhi Wang, Wenyao Xu
Publication date
2018/10/15
Book
Proceedings of the 2018 ACM sigsac conference on computer and communications security
Pages
1306-1323
Description
As 3D printing technology begins to outpace traditional manufacturing, malicious users increasingly have sought to leverage this widely accessible platform to produce unlawful tools for criminal activities. Therefore, it is of paramount importance to identify the origin of unlawful 3D printed products using digital forensics. Traditional countermeasures, including information embedding or watermarking, rely on supervised manufacturing process and are impractical for identifying the origin of 3D printed tools in criminal applications. We argue that 3D printers possess unique fingerprints, which arise from hardware imperfections during the manufacturing process, causing discrepancies in the line formation of printed physical objects. These variations appear repeatedly and result in unique textures that can serve as a viable fingerprint on associated 3D printed products. To address the challenge of traditional forensics in …
Total citations
2019202020212022202320248131812115
Scholar articles
Z Li, AS Rathore, C Song, S Wei, Y Wang, W Xu - Proceedings of the 2018 ACM sigsac conference on …, 2018