Secure Information Embedding in Forensic 3D Fingerprinting

Canran Wang,Jinwen Wang,Mi Zhou,Vinh Pham,Senyue Hao,Chao Zhou,Ning Zhang,Netanel Raviv
2024-12-15
Abstract:The prevalence of 3D printing poses a significant risk to public safety, as any individual with internet access and a commodity printer is able to produce untraceable firearms, keys, counterfeit products, etc. To aid government authorities in combating these new security threats, several approaches have been taken to tag 3D-prints with identifying information. Known as fingerprints, this information is written into the object using various bit embedding techniques; examples include varying the height of the molten thermoplastic layers, and depositing metallic powder with different magnetic properties. Yet, the practicality of theses techniques in real-world forensic settings is hindered by the adversarial nature of this problem. That is, the 3D-printing process is out of reach of any law enforcement agencies; it is the adversary who controls all aspects of printing and possesses the printed object. To combat these threats, law enforcement agencies can regulate the manufacturing of 3D printers, on which they may enforce a fingerprinting scheme, and collect adversarially tampered remains (e.g., fragments of a broken 3D-printed firearm) during forensic investigation. Therefore, it is important to devise fingerprinting techniques so that the fingerprint could be extracted even if printing is carried out by the adversary. To this end, we present SIDE (Secure Information Embedding and Extraction), a fingerprinting framework that tackles the adversarial nature of forensic fingerprinting in 3D prints by offering both secure information embedding and secure information extraction.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is: embedding fingerprint information in 3D - printed objects to ensure that this information can be reliably extracted in forensic identification scenarios, even if the printing process and the printed objects are completely controlled by potential adversaries. Specifically, the paper aims to overcome the following two main challenges: 1. **Secure information embedding**: Ensure the success of information embedding even in the face of adaptive adversaries who fully understand and are able to interfere with the embedding process. 2. **Secure information extraction**: Ensure the success of information extraction even if the 3D - printed object is maliciously tampered with or destroyed by the adversary. ### Detailed Explanation #### Background and Motivation With the popularization of 3D printing technology, individuals can manufacture untraceable items such as guns and keys through the Internet and commercial 3D printers, which brings new threats to public safety. To address these threats, researchers have proposed the fingerprinting technology for 3D - printed objects, that is, embedding uniquely traceable data (such as timestamps, geographical locations, printer IDs, etc.) in the printed objects so that this information can be subsequently extracted to track criminal behavior. However, existing fingerprinting technologies face a fundamental obstacle: the adversary completely controls the printing process and the printed objects. This means that the adversary can destroy the printed object after a crime, making the embedded information unrecoverable. Therefore, a new method is required to ensure that fingerprint information can be successfully embedded and extracted even under the adversary's control. #### Solution Overview To this end, the paper proposes a framework named SIDE (Secure Information Embedding and Extraction), which solves the above problems in the following ways: 1. **Secure information embedding**: - Utilize trusted execution environments (TEE) such as ARM TrustZone to protect the integrity of the control flow of the printing process and ensure that the information embedding process will not be interfered with by the adversary. - This can ensure that the printed object will definitely be marked with the correct fingerprint information, even if the adversary can crack the printer's operating system. 2. **Secure information extraction**: - Develop break - resilient coding techniques (BRC), which allow the correct extraction of fingerprint information from printed objects that are divided into at most a certain number of parts. - Even if the adversary breaks the printed object into multiple parts, as long as these parts do not exceed a certain threshold, BRC can still correctly decode the original information. #### Experimental Verification The authors implemented the SIDE prototype on a Creality Ender 3 3D printer and verified its effectiveness through multiple experiments. The experimental results show that even if the printed object is damaged, SIDE can still successfully read the embedded information. ### Summary The main contribution of this paper is to design and implement a highly robust fingerprint embedding and extraction framework SIDE, which can not only resist the attacks of adaptive adversaries but also ensure the correct extraction of information when the printed object is damaged. This result is of great significance for 3D - printing supervision in the fields of forensic identification and public safety.