Secure Information Embedding and Extraction in Forensic 3D Fingerprinting
- URL: http://arxiv.org/abs/2403.04918v3
- Date: Wed, 12 Jun 2024 21:07:22 GMT
- Title: Secure Information Embedding and Extraction in Forensic 3D Fingerprinting
- Authors: Canran Wang, Jinwen Wang, Mi Zhou, Vinh Pham, Senyue Hao, Chao Zhou, Ning Zhang, Netanel Raviv,
- Abstract summary: The prevalence of 3D printing poses a significant risk to public safety.
Several approaches have been taken to tag 3D-prints with identifying information.
Known as fingerprints, this information is written into the object using various bit embedding techniques.
- Score: 15.196378932114518
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The prevalence of 3D printing poses a significant risk to public safety, as any individual with internet access and a commodity printer is able to produce untraceable firearms, keys, counterfeit products, etc. To aid government authorities in combating these new security threats, several approaches have been taken to tag 3D-prints with identifying information. Known as fingerprints, this information is written into the object using various bit embedding techniques; examples include varying the height of the molten thermoplastic layers, and depositing metallic powder with different magnetic properties. Yet, the practicality of theses techniques in real-world forensic settings is hindered by the adversarial nature of this problem. That is, the 3D-printing process is out of reach of any law enforcement agencies; it is the adversary who controls all aspects of printing and possesses the printed object. To combat these threats, law enforcement agencies can regulate the manufacturing of 3D printers, on which they may enforce a fingerprinting scheme, and collect adversarially tampered remains (e.g., fragments of a broken 3D-printed firearm) during forensic investigation. Therefore, it is important to devise fingerprinting techniques so that the fingerprint could be extracted even if printing is carried out by the adversary. To this end, we present SIDE (Secure Information Embedding and Extraction), a fingerprinting framework that tackles the adversarial nature of forensic fingerprinting in 3D prints by offering both secure information embedding and secure information extraction.
Related papers
- QuietPrint: Protecting 3D Printers Against Acoustic Side-Channel Attacks [0.5729426778193398]
Cyber-attacks targeting the 3D printing process are becoming increasingly common.<n>One major concern is intellectual property (IP) theft, where a malicious attacker gains access to the design file.<n>In this work, we investigate the possibility of IP theft via acoustic side channels and propose a novel method to protect 3D printers.
arXiv Detail & Related papers (2026-02-02T15:04:00Z) - Turning Hearsay into Discovery: Industrial 3D Printer Side Channel Information Translated to Stealing the Object Design [46.740145853674875]
We show for the first time that side-channel attacks are a serious threat to industrial grade 3D printers.<n>We reconstruct the 3D printed model solely from the collected power side-channel data.
arXiv Detail & Related papers (2025-09-22T19:46:21Z) - FingerSplat: Contactless Fingerprint 3D Reconstruction and Generation based on 3D Gaussian Splatting [24.010110861990373]
We introduce a novel contactless fingerprint 3D registration, reconstruction and generation framework by integrating 3D Gaussian Splatting.<n>Experiments on 3D fingerprint registration, reconstruction, and generation prove that our method can accurately align and reconstruct 3D fingerprints from 2D images.
arXiv Detail & Related papers (2025-09-19T06:18:08Z) - One Video to Steal Them All: 3D-Printing IP Theft through Optical Side-Channels [6.082508741253127]
We show that an adversary with access to video recordings of the 3D printing process can reverse engineer the underlying 3D print instructions.<n>Our model tracks the printer nozzle movements during the printing process and maps the corresponding trajectory into G-code instructions.<n>It identifies the correct parameters such as feed rate and extrusion rate, enabling successful intellectual property theft.
arXiv Detail & Related papers (2025-06-27T04:34:07Z) - Browser Fingerprint Detection and Anti-Tracking [0.0]
Digital fingerprints pose a significant threat to the privacy and security of ordinary users.
In this paper, we investigate the effectiveness of current anti-tracking methods against digital fingerprints and design a browser extension that can effectively resist digital fingerprints.
arXiv Detail & Related papers (2025-02-20T07:23:22Z) - Fingerprinting and Tracing Shadows: The Development and Impact of Browser Fingerprinting on Digital Privacy [55.2480439325792]
Browser fingerprinting is a growing technique for identifying and tracking users online without traditional methods like cookies.
This paper gives an overview by examining the various fingerprinting techniques and analyzes the entropy and uniqueness of the collected data.
arXiv Detail & Related papers (2024-11-18T20:32:31Z) - Practitioner Paper: Decoding Intellectual Property: Acoustic and Magnetic Side-channel Attack on a 3D Printer [3.0832643041058607]
This work demonstrates the feasibility of reconstructing G-codes by performing side-channel attacks on a 3D printer.
By training models using Gradient Boosted Decision Trees, our prediction results for each axial movement, stepper, nozzle, and rotor speed achieve high accuracy.
We effectively deploy the model in a real-world examination, achieving a Mean Tendency Error (MTE) of 4.47% on a plain G-code design.
arXiv Detail & Related papers (2024-11-16T21:05:25Z) - Contactless Fingerprint Recognition Using 3D Graph Matching [12.092701535950097]
Most existing contactless fingerprint algorithms treat contactless fingerprints as 2D plain fingerprints.
This recognition approach does not consider the modality difference between contactless and contact fingerprints.
This paper proposes a novel contactless fingerprint recognition algorithm that captures the revealed 3D feature of contactless fingerprints.
arXiv Detail & Related papers (2024-09-13T12:39:57Z) - PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound [23.149939556959772]
We propose a new side-channel attack on the minutiae-based Automatic Fingerprint Identification System (AFIS)
The attack scenario of PrintListener is extensive and covert. It only needs to record users' fingertip friction sound and can be launched by leveraging a large number of social media platforms.
arXiv Detail & Related papers (2024-04-14T10:55:15Z) - Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files [56.96539046813698]
steganographic channels can allow additional data to be embedded within the STL files without changing the printed model.
This paper addresses this security threat by designing and evaluating a emphsanitizer that erases hidden content where steganographic channels might exist.
arXiv Detail & Related papers (2024-04-07T23:28:35Z) - RFDforFin: Robust Deep Forgery Detection for GAN-generated Fingerprint
Images [45.73061833269094]
We propose the first deep forgery detection approach for fingerprint images, which combines unique ridge features of fingerprint and generation artifacts of the GAN-generated images.
Our proposed approach is effective and robust with low complexities.
arXiv Detail & Related papers (2023-08-18T04:05:18Z) - A Universal Latent Fingerprint Enhancer Using Transformers [47.87570819350573]
This study aims to develop a fast method, which we call ULPrint, to enhance various latent fingerprint types.
In closed-set identification accuracy experiments, the enhanced image was able to improve the performance of the MSU-AFIS from 61.56% to 75.19%.
arXiv Detail & Related papers (2023-05-31T23:01:11Z) - X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item
Detection [113.10386151761682]
Adversarial attacks targeting texture-free X-ray images are underexplored.
In this paper, we take the first step toward the study of adversarial attacks targeted at X-ray prohibited item detection.
We propose X-Adv to generate physically printable metals that act as an adversarial agent capable of deceiving X-ray detectors.
arXiv Detail & Related papers (2023-02-19T06:31:17Z) - Comprint: Image Forgery Detection and Localization using Compression
Fingerprints [19.54952278001317]
Comprint is a novel forgery detection and localization method based on the compression fingerprint or comprint.
We propose a fusion of Comprint with the state-of-the-art Noiseprint, which utilizes a complementary camera model fingerprint.
Comprint and the fusion Comprint+Noiseprint represent a promising forensics tool to analyze in-the-wild tampered images.
arXiv Detail & Related papers (2022-10-05T13:05:18Z) - Hierarchical Perceptual Noise Injection for Social Media Fingerprint
Privacy Protection [106.5308793283895]
fingerprint leakage from social media raises a strong desire for anonymizing shared images.
To guard the fingerprint leakage, adversarial attack emerges as a solution by adding imperceptible perturbations on images.
We propose FingerSafe, a hierarchical perceptual protective noise injection framework to address the mentioned problems.
arXiv Detail & Related papers (2022-08-23T02:20:46Z) - On the vulnerability of fingerprint verification systems to fake
fingerprint attacks [57.36125468024803]
A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it.
Results for an optical and a thermal sweeping sensors are given.
arXiv Detail & Related papers (2022-07-11T12:22:52Z) - PrintsGAN: Synthetic Fingerprint Generator [39.804969475699345]
PrintsGAN is a synthetic fingerprint generator capable of generating unique fingerprints along with multiple impressions for a given fingerprint.
We show the utility of the PrintsGAN generated by training a deep network to extract a fixed-length embedding from a fingerprint.
arXiv Detail & Related papers (2022-01-10T22:25:10Z) - Responsible Disclosure of Generative Models Using Scalable
Fingerprinting [70.81987741132451]
Deep generative models have achieved a qualitatively new level of performance.
There are concerns on how this technology can be misused to spoof sensors, generate deep fakes, and enable misinformation at scale.
Our work enables a responsible disclosure of such state-of-the-art generative models, that allows researchers and companies to fingerprint their models.
arXiv Detail & Related papers (2020-12-16T03:51:54Z) - Fingerprint Orientation Estimation: Challenges and Opportunities [2.28438857884398]
A person has a limited number of fingerprints and it remains unchanged throughout his lifetime, once leaked to the adversary, it leaks for a lifetime.
This survey provides a comprehensive study of template protection techniques for fingerprint biometric systems.
arXiv Detail & Related papers (2020-10-22T09:41:18Z) - Artificial Fingerprinting for Generative Models: Rooting Deepfake
Attribution in Training Data [64.65952078807086]
Photorealistic image generation has reached a new level of quality due to the breakthroughs of generative adversarial networks (GANs)
Yet, the dark side of such deepfakes, the malicious use of generated media, raises concerns about visual misinformation.
We seek a proactive and sustainable solution on deepfake detection by introducing artificial fingerprints into the models.
arXiv Detail & Related papers (2020-07-16T16:49:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.