Menu Close

Special session: Forensics and security of physical objects

Session chair: Pauline Puteaux, CNRS (France)

Friday, December 10 (3:50 PM – 4:50 PM, UTC+1)

Attend online with Zoom

Link: – Meeting ID: 990 6461 0243
Quality of Service Guarantees for Physical Unclonable Functions (3:50 PM – 4:10 PM) 
Onur Günlü (Technische Universitaet Berlin), Rafael F. Schaefer (Technische Universität Berlin) and H. Vincent Poor (Princeton University) – Virtual presentation
We consider a secret key agreement problem in which noisy physical unclonable function (PUF) outputs facilitate reliable, secure, and private key agreement with the help of public, noiseless, and authenticated storage. PUF outputs are highly correlated, so transform coding methods have been combined with scalar quantizers to extract uncorrelated bit sequences with reliability guarantees. For PUF circuits with continuous-valued outputs, the models for transformed outputs are made more realistic by replacing the fitted distributions with corresponding truncated ones. The state-of-the-art PUF methods that provide reliability guarantees to each extracted bit are shown to be inadequate to guarantee the same reliability level for all PUF outputs. Thus, a quality of service parameter is introduced to control the percentage of PUF outputs for which a target reliability level can be guaranteed. A public ring oscillator (RO) output dataset is used to illustrate that a truncated Gaussian distribution can be fitted to transformed RO outputs that are inputs to uniform scalar quantizers such that reliability guarantees can be provided for each bit extracted from any PUF device under additive Gaussian noise components by eliminating a small subset of PUF outputs. Furthermore, we conversely show that it is not possible to provide such reliability guarantees without eliminating any PUF output if no extra secrecy and privacy leakage is allowed.
3D Print-Scan Resilient Localized Mesh Watermarking (4:10 PM – 4:30 PM) 
Yanmei Chen (University of Science and Technology of China), Zehua Ma (University of Science and Technology of China), Hang Zhou (Simon Fraser University) and Weiming Zhang (University of Science and Technology of China) – Virtual presentation
Existing 3D print-scan watermarking schemes usually have some limitations, such as the use of auxiliary materials and expensive high-resolution devices, and low visual quality of watermarked models. Considering these limitations, we propose a novel localized mesh watermarking method, which is resilient to 3D print-scan process and suitable for ordinary consumer-level 3D printing and scanning devices. In our scheme, we use the geodesic distances of the model’s surface to determine the location and scope of the localized embedded watermark and construct a special tracking signal for the synchronization of the watermark. When detecting the watermark, we amplify the watermark signal through the residual mesh and achieve blind watermark detection. By evaluating various 3D mesh models, we demonstrate that the proposed localized watermarking method can ensure a high watermark extraction accuracy after the 3D print-scan process while maintaining high visual quality
Self-embedding watermarking method for G-code used in 3D printing (4:30 PM – 4:50 PM) 
Zhenyu Li (State Key Laboratory of Mathematical Engineering and Advanced Computing), Daofu Gong, Lei Tan, Xiangyang Luo (State Key Laboratory of Mathematical Engineering and Advanced Computing), Fenlin Liu (Zhengzhou Science and Technology Institute) and Adrian Bors (University of York) – Virtual presentation
3D printing is faced with a lot of security issues, such as malicious tampering, intellectual property theft and so on. This work aims to protect the G-code file which controls the 3D printing process by proposing a self-embedding watermarking method for G-code file. This method groups the G-code lines into code blocks and achieves a random mapping relationship for each code block. Each code block is divided into two parts, carrying the authentication and recovery bits, respectively. The tampered regions are detected by leveraging the authentication bits in each code block. Meanwhile, the G-code files are restored based on the recovery bits and the geometric information of the neighboring code blocks. Experimental results indicate that the proposed method can effectively detect the tampered region and restore the G-code file to a large extent, while limiting the distortion caused to the 3D printed object by the watermarking.