{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T12:49:41Z","timestamp":1753879781822,"version":"3.41.2"},"reference-count":34,"publisher":"ASME International","issue":"5","license":[{"start":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T00:00:00Z","timestamp":1588550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.asme.org\/publications-submissions\/publishing-information\/legal-policies"}],"content-domain":{"domain":["asmedigitalcollection.asme.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>We propose a method for ensuring traceability of metal goods in an efficient and secure manner that leverages data obtained from micrographs of a part\u2019s surface that is instance specific (i.e., different for another instance of that same part). All stakeholders in modern supply chains face a growing need to ensure quality and trust in the goods they produce. Complex supply chains open many opportunities for counterfeiters, saboteurs, or other attackers to infiltrate supply networks, and existing methods for preventing such attacks can be costly, invasive, and ineffective. The proposed method extracts discriminatory-yet-robust intrinsic strings using features extracted from the two-point autocorrelation data of surface microstructures, as well as from local volume fraction data. By using a synthetic dataset of three-phase micrographs similar to those obtained from metal alloy systems using low-cost optical microscopy techniques, we discuss tailoring the method with respect to cost and security and discuss the performance of the method in the context of anticounterfeiting and how similar methods may be evaluated for performance. Cryptographic extensions of this methodology are also discussed.<\/jats:p>","DOI":"10.1115\/1.4046891","type":"journal-article","created":{"date-parts":[[2020,4,14]],"date-time":"2020-04-14T13:48:25Z","timestamp":1586872105000},"update-policy":"https:\/\/doi.org\/10.1115\/crossmarkpolicy-asme","source":"Crossref","is-referenced-by-count":0,"title":["Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing"],"prefix":"10.1115","volume":"20","author":[{"given":"Adam","family":"Dachowicz","sequence":"first","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907"}]},{"given":"Mikhail","family":"Atallah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University, West Lafayette, IN 47907"}]},{"given":"Jitesh H.","family":"Panchal","sequence":"additional","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907"}]}],"member":"33","published-online":{"date-parts":[[2020,5,4]]},"reference":[{"key":"2021022704041378900_CIT0001","doi-asserted-by":"crossref","DOI":"10.21236\/ADA613231","article-title":"Addressing Counterfeit Parts in the DOD Supply Chain","author":"Gansler","year":"2014"},{"issue":"1","key":"2021022704041378900_CIT0002","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1108\/IJOPM-04-2012-0174","article-title":"An Exploratory Analysis of Counterfeiting Strategies: Towards Counterfeit-Resilient Supply Chains","volume":"35","author":"Stevenson","year":"2015","journal-title":"Int. J. Oper. Prod. Manage."},{"key":"2021022704041378900_CIT0003","first-page":"V01BT02A035","article-title":"Optical Puf Design for Anti-Counterfeiting in Manufacturing of Metallic Goods","author":"Dachowicz","year":"2018"},{"key":"2021022704041378900_CIT0004","first-page":"43","article-title":"Towards Reproducible Results in Authentication Based on Physical Non-Cloneable Functions: The Forensic Authentication Microstructure Optical Set (famos)","author":"Voloshynovskiy","year":"2012"},{"key":"2021022704041378900_CIT0005","first-page":"9","article-title":"Physical Unclonable Functions for Device Authentication and Secret Key Generation","author":"Suh","year":"2007"},{"key":"2021022704041378900_CIT0006","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/1-4020-4198-5_20","volume-title":"AmIware Hardware Technology Drivers of Ambient Intelligence","author":"Tuyls","year":"2006"},{"issue":"5589","key":"2021022704041378900_CIT0007","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical One-Way Functions","volume":"297","author":"Pappu","year":"2002","journal-title":"Science"},{"issue":"18","key":"2021022704041378900_CIT0008","doi-asserted-by":"crossref","first-page":"5285","DOI":"10.1016\/j.actamat.2008.07.005","article-title":"Delineation of the Space of 2-Point Correlations in a Composite Material System","volume":"56","author":"Niezgoda","year":"2008","journal-title":"Acta Mater."},{"issue":"1","key":"2021022704041378900_CIT0009","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40192-015-0044-x","article-title":"Versatile Algorithms for the Computation of 2-Point Spatial Correlations in Quantifying Material Structure","volume":"5","author":"Cecen","year":"2016","journal-title":"Integrating Mater. Manuf. Innovation"},{"article-title":"Pymks: Materials Knowledge System in Python","year":"2014","author":"Wheeler","key":"2021022704041378900_CIT0010"},{"issue":"2","key":"2021022704041378900_CIT0011","first-page":"103","article-title":"A Novel Framework for Building Materials Knowledge Systems","volume":"17","author":"Kalidindi","year":"2010","journal-title":"Comput. Mater. Continua"},{"key":"2021022704041378900_CIT0012","first-page":"69440K","article-title":"Fingerprint Verification Using Sift Features","author":"Park","year":"2008"},{"key":"2021022704041378900_CIT0013","doi-asserted-by":"crossref","DOI":"10.1109\/ICCV.2011.6126544","article-title":"Orb: An Efficient Alternative to Sift or Surf","author":"Rublee","year":"2011"},{"key":"2021022704041378900_CIT0014","first-page":"404","article-title":"Fast Matching of Binary Features","author":"Muja","year":"2012"},{"issue":"16","key":"2021022704041378900_CIT0015","doi-asserted-by":"crossref","first-page":"6387","DOI":"10.1016\/j.actamat.2011.06.051","article-title":"Understanding and Visualizing Microstructure and Microstructure Variance as a Stochastic Process","volume":"59","author":"Niezgoda","year":"2011","journal-title":"Acta Mater."},{"key":"2021022704041378900_CIT0016","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-14452-3_1","volume-title":"Towards Hardware-Intrinsic Security","author":"Maes","year":"2010"},{"key":"2021022704041378900_CIT0017","first-page":"211","article-title":"Physically Unclonable Function-Based Security and Privacy in Rfid Systems","author":"Bolotnyy","year":"2007"},{"issue":"11","key":"2021022704041378900_CIT0018","doi-asserted-by":"crossref","first-page":"2390","DOI":"10.1007\/s11837-017-2502-8","article-title":"Microstructure-Based Counterfeit Detection in Metal Part Manufacturing","volume":"69","author":"Dachowicz","year":"2017","journal-title":"JOM"},{"key":"2021022704041378900_CIT0019","first-page":"99","article-title":"Paperspeckle: Microscopic Fingerprinting of Paper","author":"Sharma","year":"2011"},{"issue":"3","key":"2021022704041378900_CIT0020","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1016\/S1359-6454(02)00447-0","article-title":"Analysis of Grain Boundary Networks and Their Evolution During Grain Boundary Engineering","volume":"51","author":"Schuh","year":"2003","journal-title":"Acta Mater."},{"issue":"5","key":"2021022704041378900_CIT0021","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1016\/j.actamat.2007.10.044","article-title":"Microstructure Reconstructions From 2-Point Statistics Using Phase-Recovery Algorithms","volume":"56","author":"Fullwood","year":"2008","journal-title":"Acta Mater."},{"issue":"13\u201314","key":"2021022704041378900_CIT0022","doi-asserted-by":"crossref","first-page":"5284","DOI":"10.1016\/j.actamat.2012.06.026","article-title":"Estimating the Response of Polycrystalline Materials Using Sets of Weighted Statistical Volume Elements","volume":"60","author":"Qidwai","year":"2012","journal-title":"Acta Mater."},{"key":"2021022704041378900_CIT0023","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.actamat.2017.03.009","article-title":"Reduced-Order Structure-Property Linkages for Polycrystalline Microstructures Based on 2-Point Statistics","volume":"129","author":"Paulson","year":"2017","journal-title":"Acta Mater."},{"key":"2021022704041378900_CIT0024","first-page":"186","article-title":"Machine Learning in Materials Science: Recent Progress and Emerging Applications","volume":"29","author":"Mueller","year":"2016","journal-title":"Rev. Comput. Chem."},{"key":"2021022704041378900_CIT0025","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/j.jcp.2017.06.013","article-title":"Data-Driven Reduced Order Models for Effective Yield Strength and Partitioning of Strain in Multiphase Materials","volume":"346","author":"Latypov","year":"2017","journal-title":"J. Comput. Phys."},{"issue":"8","key":"2021022704041378900_CIT0026","doi-asserted-by":"crossref","first-page":"2126","DOI":"10.1007\/s11837-016-2036-5","article-title":"Vision for Data and Informatics in the Future Materials Innovation Ecosystem","volume":"68","author":"Kalidindi","year":"2016","journal-title":"JOM"},{"key":"2021022704041378900_CIT0027","unstructured":"Huber, S.\n          , 2019, \u201clibstick. Software Package for Persistent Homology Calculation,\u201d https:\/\/www.sthu.org\/code\/libstick\/"},{"issue":"85","key":"2021022704041378900_CIT0028","first-page":"2825","article-title":"Scikit-Learn: Machine Learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"2021022704041378900_CIT0029","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1090\/S0273-0979-07-01191-3","article-title":"Barcodes: The Persistent Topology of Data","volume":"45","author":"Ghrist","year":"2008","journal-title":"Bull. Am. Math. Soc."},{"issue":"2","key":"2021022704041378900_CIT0030","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1090\/S0273-0979-09-01249-X","article-title":"Topology and Data","volume":"46","author":"Carlsson","year":"2009","journal-title":"Bull. Am. Math. Soc."},{"volume-title":"Computational Topology: An Introduction","year":"2010","author":"Edelsbrunner","key":"2021022704041378900_CIT0031"},{"issue":"8","key":"2021022704041378900_CIT0032","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","article-title":"Feature Selection Based on Mutual Information Criteria of Max-Dependency, Max-Relevance, and Min-Redundancy","volume":"27","author":"Peng","year":"2005","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"20","key":"2021022704041378900_CIT0033","doi-asserted-by":"crossref","first-page":"4625","DOI":"10.1016\/j.ins.2010.05.037","article-title":"mr2pso: A Maximum Relevance Minimum Redundancy Feature Selection Method Based on Swarm Intelligence for Support Vector Machine Classification","volume":"181","author":"Unler","year":"2011","journal-title":"Inf. Sci."},{"issue":"6","key":"2021022704041378900_CIT0034","doi-asserted-by":"crossref","first-page":"066138","DOI":"10.1103\/PhysRevE.69.066138","article-title":"Estimating Mutual Information","volume":"69","author":"Kraskov","year":"2004","journal-title":"Phys. Rev. E"}],"container-title":["Journal of Computing and Information Science in Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/doi\/10.1115\/1.4046891\/6647518\/jcise_20_5_051004.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/doi\/10.1115\/1.4046891\/6647518\/jcise_20_5_051004.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T04:04:35Z","timestamp":1614398675000},"score":1,"resource":{"primary":{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article\/doi\/10.1115\/1.4046891\/1082607\/Extraction-and-Analysis-of-Spatial-Correlation"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,4]]},"references-count":34,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,10,1]]}},"URL":"https:\/\/doi.org\/10.1115\/1.4046891","relation":{},"ISSN":["1530-9827","1944-7078"],"issn-type":[{"type":"print","value":"1530-9827"},{"type":"electronic","value":"1944-7078"}],"subject":[],"published":{"date-parts":[[2020,5,4]]},"article-number":"051004"}}