{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T12:55:20Z","timestamp":1753880120441,"version":"3.41.2"},"reference-count":38,"publisher":"ASME International","issue":"6","license":[{"start":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T00:00:00Z","timestamp":1686268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.asme.org\/publications-submissions\/publishing-information\/legal-policies"}],"content-domain":{"domain":["asmedigitalcollection.asme.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The digitization of manufacturing has transformed the product realization process across many industries, from aerospace and automotive to medicine and healthcare. While this progress has accelerated product development cycles and enabled designers to create products with previously unachievable complexity and precision, it has also opened the door to a broad array of unique security concerns, from theft of intellectual property to supply chain attacks and counterfeiting. To address these concerns, information embedding (e.g., watermarks and fingerprints) has emerged as a promising solution that enhances product security and traceability. Information embedding techniques involve storing unique and secure information within parts, making these parts easier to track and to verify for authenticity. However, a successful information embedding scheme requires information to be transmitted in physical parts both securely and in a way that is accessible to end sers. Ensuring these qualities introduces unique computational and engineering challenges. For instance, these qualities require the designer of the embedding scheme to have an accurate model of the cyber-physical processes needed to embed information during manufacturing and read it later in the product life cycle, as well as models of the phenomena that may degrade that information through natural wear-and-tear, or through adversarial attacks. This article discusses challenges and research opportunities for the engineering design and manufacturing community in developing methods for efficient information embedding in manufactured products.<\/jats:p>","DOI":"10.1115\/1.4062600","type":"journal-article","created":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T08:05:40Z","timestamp":1684829140000},"update-policy":"https:\/\/doi.org\/10.1115\/crossmarkpolicy-asme","source":"Crossref","is-referenced-by-count":3,"title":["Information Embedding for Secure Manufacturing: Challenges and Research Opportunities"],"prefix":"10.1115","volume":"23","author":[{"given":"Karim A.","family":"ElSayed","sequence":"first","affiliation":[{"name":"Purdue University School of Mechanical Engineering, , West Lafayette, IN 47907"}]},{"given":"Adam","family":"Dachowicz","sequence":"additional","affiliation":[{"name":"Purdue University School of Mechanical Engineering, , West Lafayette, IN 47907"}]},{"given":"Mikhail J.","family":"Atallah","sequence":"additional","affiliation":[{"name":"Purdue University Department of Computer Science, , West Lafayette, IN 47907"}]},{"given":"Jitesh H.","family":"Panchal","sequence":"additional","affiliation":[{"name":"Purdue University School of Mechanical Engineering, , West Lafayette, IN 47907"}]}],"member":"33","published-online":{"date-parts":[[2023,6,9]]},"reference":[{"key":"2023060915195771500_CIT0001","first-page":"431","article-title":"Security of Additive Manufacturing: Attack Taxonomy and Survey","volume":"21","author":"Yampolskiy","year":"2018","journal-title":"Addit. Manuf."},{"issue":"3","key":"2023060915195771500_CIT0002","first-page":"45","article-title":"Taxonomies for Reasoning About Cyber-Physical Attacks in IOT-Based Manufacturing Systems","volume":"4","author":"Pan","year":"2017","journal-title":"Int. J. Interactive Multimedia Artificial Intell."},{"issue":"2","key":"2023060915195771500_CIT0003","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.mfglet.2014.01.005","article-title":"Cyber-Physical Security Challenges in Manufacturing Systems","volume":"2","author":"Wells","year":"2014","journal-title":"Manuf. Lett."},{"year":"2022","author":"IBM Seurity","key":"2023060915195771500_CIT0004"},{"issue":"4","key":"2023060915195771500_CIT0005","doi-asserted-by":"publisher","first-page":"040802","DOI":"10.1115\/1.4040341","article-title":"Security in Cyber-Enabled Design and Manufacturing: A Survey","volume":"18","author":"Chaduvula","year":"2018","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"4","key":"2023060915195771500_CIT0006","doi-asserted-by":"publisher","first-page":"041010","DOI":"10.1115\/1.4036615","article-title":"Secure Collaboration in Engineering Systems Design","volume":"17","author":"Wang","year":"2017","journal-title":"ASME J. Computing Inform. Sci. Eng."},{"key":"2023060915195771500_CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7","volume-title":"Physically Unclonable Functions: Constructions, Properties and Applications","author":"Maes","year":"2013"},{"issue":"1","key":"2023060915195771500_CIT0008","first-page":"243","article-title":"A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications","volume":"28","author":"Hong","year":"2013","journal-title":"J. Inform. Syst."},{"issue":"4","key":"2023060915195771500_CIT0009","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3322960","article-title":"LayerCode: Optical Barcodes for 3D Printed Shapes","volume":"38","author":"Maia","year":"2019","journal-title":"ACM Trans. Graphics (TOG)"},{"key":"2023060915195771500_CIT0010","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.cad.2018.04.025","article-title":"Embedding Qr Codes Onto B-spline Surfaces for 3d Printing","volume":"102","author":"Kikuchi","year":"2018","journal-title":"Computer-Aided Design"},{"issue":"11","key":"2023060915195771500_CIT0011","doi-asserted-by":"publisher","first-page":"2780","DOI":"10.1109\/TMM.2019.2962306","article-title":"Blind Watermarking for 3D Printed Objects by Locally Modifying Layer Thickness","volume":"22","author":"Delmotte","year":"2019","journal-title":"IEEE Trans. Multimedia"},{"key":"2023060915195771500_CIT0012","first-page":"1","article-title":"3d-Printed Object Identification Method Using Inner Structure Patterns Configured by Slicer Software","author":"Kubo","year":"2020"},{"key":"2023060915195771500_CIT0013","first-page":"449","article-title":"Aircode: Unobtrusive Physical Tags for Digital Fabrication","author":"Li","year":"2017"},{"key":"2023060915195771500_CIT0014","first-page":"31","article-title":"Information Embedding in Additive Manufacturing Through Printing Speed Control","author":"ElSayed","year":"2021"},{"issue":"7","key":"2023060915195771500_CIT0015","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","article-title":"Information Hiding\u2014A Survey","volume":"87","author":"Petitcolas","year":"1999","journal-title":"Proc. IEEE"},{"volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"1999","author":"Katzenbeisser","key":"2023060915195771500_CIT0016"},{"key":"2023060915195771500_CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5040-5","volume-title":"Physical Unclonable Functions in Theory and Practice","author":"Boehm","year":"2012"},{"key":"2023060915195771500_CIT0018","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-3-642-14452-3_2","volume-title":"Towards Hardware-Intrinsic Security","author":"Handschuh","year":"2010"},{"key":"2023060915195771500_CIT0019","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-14452-3_1","volume-title":"Towards Hardware-Intrinsic Security: Foundations and Practice","author":"Maes","year":"2010"},{"issue":"8","key":"2023060915195771500_CIT0020","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","article-title":"Physical Unclonable Functions and Applications: A Tutorial","volume":"102","author":"Herder","year":"2014","journal-title":"Proc. IEEE"},{"issue":"2","key":"2023060915195771500_CIT0021","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1038\/s41928-020-0372-5","article-title":"Physical Unclonable Functions","volume":"3","author":"Gao","year":"2020","journal-title":"Nature Electronics"},{"issue":"11","key":"2023060915195771500_CIT0022","doi-asserted-by":"publisher","first-page":"2390","DOI":"10.1007\/s11837-017-2502-8","article-title":"Microstructure-Based Counterfeit Detection in Metal Part Manufacturing","volume":"69","author":"Dachowicz","year":"2017","journal-title":"JOM"},{"key":"2023060915195771500_CIT0023","doi-asserted-by":"crossref","DOI":"10.1115\/DETC2018-85714","article-title":"Optical Puf Design for Anti-Counterfeiting in Manufacturing of Metallic Goods","author":"Dachowicz","year":"2018"},{"key":"2023060915195771500_CIT0024","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jmsy.2021.01.003","article-title":"Towards Secure Cyber-Physical Information Association for Parts","volume":"59","author":"Sandborn","year":"2021","journal-title":"J. Manuf. Syst."},{"key":"2023060915195771500_CIT0025","first-page":"1","article-title":"G-id: Identifying 3d Prints Using Slicing Parameters","author":"Dogan","year":"2020"},{"issue":"5","key":"2023060915195771500_CIT0026","first-page":"15","article-title":"Fabricable Unobtrusive 3D-QR-Codes with Directional Light","volume":"39","author":"Peng","year":"2020","journal-title":"Comput. Geom. Fabr."},{"key":"2023060915195771500_CIT0027","first-page":"563","article-title":"Acoustic Barcodes: Passive, Durable and Inexpensive Notched Identification Tags","author":"Harrison","year":"2012"},{"year":"2018","author":"Zhang","key":"2023060915195771500_CIT0028","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1811.07640"},{"issue":"Dec.","key":"2023060915195771500_CIT0029","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.addma.2018.09.003","article-title":"Embedding Anti-Counterfeiting Features in Metallic Components Via Multiple Material Additive Manufacturing","volume":"24","author":"Wei","year":"2018","journal-title":"Additive Manuf."},{"key":"2023060915195771500_CIT0030","doi-asserted-by":"publisher","DOI":"10.2312\/cgvc.20181215","volume-title":"Computer Graphics and Visual Computing (CGVC)","author":"Zhang","year":"2018"},{"issue":"4","key":"2023060915195771500_CIT0031","doi-asserted-by":"publisher","first-page":"1800495","DOI":"10.1002\/adem.201800495","article-title":"Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication","volume":"21","author":"Chen","year":"2019","journal-title":"Adv. Eng. Mater."},{"issue":"4","key":"2023060915195771500_CIT0032","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2461912.2461936","article-title":"Infrastructs: Fabricating Information Inside Physical Objects for Imaging in the Terahertz Region","volume":"32","author":"Willis","year":"2013","journal-title":"ACM Trans. Graphics (TOG)"},{"key":"2023060915195771500_CIT0033","first-page":"103261","article-title":"Embedding Hidden Information in Additively Manufactured Metals Via Magnetic Property Grading for Traceability","volume":"60","author":"Salas","year":"2022","journal-title":"Addit. Manuf."},{"issue":"9\u201312","key":"2023060915195771500_CIT0034","doi-asserted-by":"publisher","first-page":"3713","DOI":"10.1007\/s00170-017-0809-9","article-title":"Surface Texturing of Rolling Elements by Hard Ball-End Milling and Burnishing","volume":"93","author":"Denkena","year":"2017","journal-title":"Int. J. Adv. Manuf. Technol."},{"issue":"1","key":"2023060915195771500_CIT0035","doi-asserted-by":"publisher","first-page":"145","DOI":"10.2478\/mms-2014-0014","article-title":"Surface Texture Analysis After Ball End Milling With Various Surface Inclination of Hardened Steel","volume":"21","author":"Wojciechowski","year":"2014","journal-title":"Metrology Measurement Syst."},{"issue":"1","key":"2023060915195771500_CIT0036","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S0019-9958(57)90039-6","article-title":"Certain Results in Coding Theory for Noisy Channels","volume":"1","author":"Shannon","year":"1957","journal-title":"Inform. Control"},{"key":"2023060915195771500_CIT0037","unstructured":"Dachowicz, A. P.\n          , 2020, \u201cTailored Traceability and Provenance Determination in Manufacturing,\u201d Ph.d. thesis, Purdue University, West Lafayette, IN."},{"issue":"1","key":"2023060915195771500_CIT0038","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/25.350282","article-title":"Finite-State Markov Channel\u2014A Useful Model for Radio Communication Channels","volume":"44","author":"Wang","year":"1995","journal-title":"IEEE Trans. Vehicular Technol."}],"container-title":["Journal of Computing and Information Science in Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/23\/6\/060813\/7017191\/jcise_23_6_060813.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/23\/6\/060813\/7017191\/jcise_23_6_060813.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T15:20:35Z","timestamp":1686324035000},"score":1,"resource":{"primary":{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article\/23\/6\/060813\/1163544\/Information-Embedding-for-Secure-Manufacturing"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,9]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12,1]]}},"URL":"https:\/\/doi.org\/10.1115\/1.4062600","relation":{},"ISSN":["1530-9827","1944-7078"],"issn-type":[{"type":"print","value":"1530-9827"},{"type":"electronic","value":"1944-7078"}],"subject":[],"published":{"date-parts":[[2023,6,9]]},"article-number":"060813"}}