{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T12:54:17Z","timestamp":1753880057061,"version":"3.41.2"},"reference-count":51,"publisher":"ASME International","issue":"7","license":[{"start":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T00:00:00Z","timestamp":1713225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.asme.org\/publications-submissions\/publishing-information\/legal-policies"}],"content-domain":{"domain":["asmedigitalcollection.asme.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Information lithography in manufacturing is a broad set of techniques for encoding sequences of bits as physical or behavioral features in physical parts. It is an effective approach for part traceability and anti-counterfeiting. Several techniques have recently been proposed for embedding 2D codes in 3D printed parts by local control of geometry or material. This paper presents an approach to embed and retrieve information in additive manufacturing (AM) parts by controlling the printing process parameters. The approach leverages variations in printing speed to encode information on the surface of AM parts. Optical imaging devices, such as 2D scanners and optical profilometers, are employed to read the embedded information, enabling the capture of local height differences on the part surfaces that embody 2D codes such as QR codes. The retrieved information is processed using computer vision techniques such as morphological segmentation and binary classification. First, the impact of variations in the encoding parameters on the information retrieval accuracy is characterized. Then, the feasibility and effectiveness of the proposed scheme are demonstrated through experimental results, showcasing a high accuracy in retrieving encoded messages and successfully distinguishing subtle surface features resulting from varying printing speeds. The proposed approach offers an inexpensive and efficient method for information lithography, allowing for the secure embedding of information, e.g., serial numbers and watermarks, while addressing counterfeiting and security concerns in diverse industries.<\/jats:p>","DOI":"10.1115\/1.4065089","type":"journal-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T16:17:27Z","timestamp":1710778647000},"update-policy":"https:\/\/doi.org\/10.1115\/crossmarkpolicy-asme","source":"Crossref","is-referenced-by-count":0,"title":["Information Embedding in Additively Manufactured Parts Through Printing Speed Control"],"prefix":"10.1115","volume":"24","author":[{"given":"Karim A.","family":"ElSayed","sequence":"first","affiliation":[{"name":"Purdue University School of Mechanical Engineering, , West Lafayette, IN 47907"}]},{"given":"Jitesh H.","family":"Panchal","sequence":"additional","affiliation":[{"name":"Purdue University School of Mechanical Engineering, , West Lafayette, IN 47907"}]}],"member":"33","published-online":{"date-parts":[[2024,4,16]]},"reference":[{"issue":"9\u201312","key":"2024041616290845000_CIT0001","doi-asserted-by":"publisher","first-page":"3651","DOI":"10.1007\/s00170-016-9335-4","article-title":"The Research Status and Development Trend of Additive Manufacturing Technology","volume":"89","author":"Chen","year":"2017","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"2024041616290845000_CIT0002","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/B978-0-08-100433-3.00013-0","article-title":"Aerospace Applications of Laser Additive Manufacturing","volume-title":"Laser Additive Manufacturing","author":"Liu","year":"2017"},{"issue":"5\u20138","key":"2024041616290845000_CIT0003","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1007\/s00170-017-0239-8","article-title":"Additive Manufacturing Tooling for the Automotive Industry","volume":"92","author":"Leal","year":"2017","journal-title":"Int. J. Adv. Manuf. Technol."},{"issue":"3","key":"2024041616290845000_CIT0004","doi-asserted-by":"publisher","first-page":"45","DOI":"10.9781\/ijimai.2017.437","article-title":"Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems","volume":"4","author":"Pan","year":"2017","journal-title":"International Journal of Interactive Multimedia and Artificial Intelligence"},{"issue":"2","key":"2024041616290845000_CIT0005","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.mfglet.2014.01.005","article-title":"Cyber-physical Security Challenges in Manufacturing Systems","volume":"2","author":"Wells","year":"2014","journal-title":"Manuf. Lett."},{"key":"2024041616290845000_CIT0006","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.addma.2018.03.015","article-title":"Security of Additive Manufacturing: Attack Taxonomy and Survey","volume":"21","author":"Yampolskiy","year":"2018","journal-title":"Addit. Manuf."},{"article-title":"X-Force Threat Intelligence Index 2022","year":"2022","author":"IBM","key":"2024041616290845000_CIT0007"},{"issue":"4","key":"2024041616290845000_CIT0008","doi-asserted-by":"publisher","first-page":"040802","DOI":"10.1115\/1.4040341","article-title":"Security in Cyber-enabled Design and Manufacturing: A Survey","volume":"18","author":"Chaduvula","year":"2018","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"key":"2024041616290845000_CIT0009","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","article-title":"From Information Security to Cyber Security","volume":"38","author":"Von Solms","year":"2013","journal-title":"Comput. Secur."},{"key":"2024041616290845000_CIT0010","doi-asserted-by":"crossref","DOI":"10.1115\/DETC2018-85714","article-title":"Optical Puf Design for Anti-counterfeiting in Manufacturing of Metallic Goods","author":"Dachowicz","year":"2018"},{"issue":"1","key":"2024041616290845000_CIT0011","doi-asserted-by":"publisher","first-page":"243","DOI":"10.2308\/isys-50692","article-title":"A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications","volume":"28","author":"Hong","year":"2013","journal-title":"J. Inf. Syst."},{"issue":"6","key":"2024041616290845000_CIT0012","doi-asserted-by":"publisher","first-page":"060813","DOI":"10.1115\/1.4062600","article-title":"Information Embedding for Secure Manufacturing: Challenges and Research Opportunities","volume":"23","author":"ElSayed","year":"2023","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"7","key":"2024041616290845000_CIT0013","doi-asserted-by":"publisher","first-page":"6","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-317","article-title":"Embedding Information Into Objects Fabricated With 3-d Printers by Forming Fine Cavities Inside Them","volume":"2017","author":"Suzuki","year":"2017","journal-title":"Electron. Imag."},{"key":"2024041616290845000_CIT0014","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.addma.2018.09.003","article-title":"Embedding Anti-counterfeiting Features in Metallic Components Via Multiple Material Additive Manufacturing","volume":"24","author":"Wei","year":"2018","journal-title":"Addit. Manuf."},{"key":"2024041616290845000_CIT0015","first-page":"563","article-title":"Acoustic Barcodes: Passive, Durable and Inexpensive Notched Identification Tags","author":"Harrison","year":"2012"},{"key":"2024041616290845000_CIT0016","doi-asserted-by":"publisher","first-page":"103261","DOI":"10.1016\/j.addma.2022.103261","article-title":"Embedding Hidden Information in Additively Manufactured Metals Via Magnetic Property Grading for Traceability","volume":"60","author":"Salas","year":"2022","journal-title":"Addit. Manuf."},{"key":"2024041616290845000_CIT0017","doi-asserted-by":"crossref","unstructured":"ElSayed, K. A., Dachowicz, A., and Panchal, J. H., 2021, \u201cInformation Embedding in Additive Manufacturing Through Printing Speed Control,\u201d AMSec \u201921, Virtual Event, South Korea, Nov. 19, Association for Computing Machinery, pp. 31\u201337.","DOI":"10.1145\/3462223.3485623"},{"issue":"4","key":"2024041616290845000_CIT0018","doi-asserted-by":"publisher","first-page":"1800495","DOI":"10.1002\/adem.201800495","article-title":"Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication","volume":"21","author":"Chen","year":"2019","journal-title":"Adv. Eng. Mater."},{"key":"2024041616290845000_CIT0019","first-page":"1306","article-title":"Printracker: Fingerprinting 3D Printers Using Commodity Scanners","author":"Li","year":"2018"},{"key":"2024041616290845000_CIT0020","first-page":"282","article-title":"Blind Watermarking for 3-d Printed Objects Using Surface Norm Distribution","author":"Delmotte","year":"2018"},{"issue":"11","key":"2024041616290845000_CIT0021","doi-asserted-by":"publisher","first-page":"2780","DOI":"10.1109\/TMM.2019.2962306","article-title":"Blind Watermarking for 3D Printed Objects by Locally Modifying Layer Thickness","volume":"22","author":"Delmotte","year":"2019","journal-title":"IEEE Trans. Multimedia"},{"key":"2024041616290845000_CIT0022","first-page":"1","article-title":"G-id: Identifying 3D Prints Using Slicing Parameters","author":"Dogan","year":"2020"},{"key":"2024041616290845000_CIT0023","first-page":"1","article-title":"3d-Printed Object Identification Method Using Inner Structure Patterns Configured by Slicer Software","author":"Kubo","year":"2020"},{"key":"2024041616290845000_CIT0024","first-page":"15","article-title":"Fabricable Unobtrusive 3D-QR-Codes With Directional Light","author":"Peng","year":"2020"},{"issue":"2","key":"2024041616290845000_CIT0025","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214286","article-title":"My Smartphone Recognizes Genuine QR Codes! Practical Unclonable QR Code Via 3d Printing","volume":"2","author":"Song","year":"2018","journal-title":"Proc. ACM Inter. Mob. Wearable Ubiquitous Technol."},{"key":"2024041616290845000_CIT0026","first-page":"437","article-title":"Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity","author":"Aliaga","year":"2009"},{"issue":"4","key":"2024041616290845000_CIT0027","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3322960","article-title":"LayerCode: Optical Barcodes for 3D Printed Shapes","volume":"38","author":"Maia","year":"2019","journal-title":"ACM Trans. Graph."},{"key":"2024041616290845000_CIT0028","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.cad.2018.04.025","article-title":"Embedding QR Codes Onto B-Spline Surfaces for 3d Printing","volume":"102","author":"Kikuchi","year":"2018","journal-title":"Comput. Aided Des."},{"issue":"4","key":"2024041616290845000_CIT0029","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2461912.2461936","article-title":"Infrastructs: Fabricating Information Inside Physical Objects for Imaging in the Terahertz Region","volume":"32","author":"Willis","year":"2013","journal-title":"ACM Trans. Graph."},{"key":"2024041616290845000_CIT0030","first-page":"180","article-title":"Copyright Protection for 3d Printing by Embedding Information Inside Real Fabricated Objects","author":"Suzuki","year":"2015"},{"key":"2024041616290845000_CIT0031","first-page":"95992V","article-title":"Non-destructively Reading Out Information Embedded Inside Real Objects by Using Far-Infrared Light","author":"Okada","year":"2015"},{"key":"2024041616290845000_CIT0032","first-page":"449","article-title":"Aircode: Unobtrusive Physical Tags for Digital Fabrication","author":"Li","year":"2017"},{"key":"2024041616290845000_CIT0033","first-page":"1","article-title":"Fabauth: Printed Objects Identification Using Resonant Properties of Their Inner Structures","author":"Kubo","year":"2019"},{"key":"2024041616290845000_CIT0034","first-page":"02023","article-title":"Watermarking for Fused Deposition Modeling by Seam Placement","author":"Baumann","year":"2017"},{"issue":"6","key":"2024041616290845000_CIT0035","doi-asserted-by":"publisher","first-page":"230","DOI":"10.18178\/ijmmm.2019.7.6.465","article-title":"Embedding Information in 3D Printed Objects Using Double Layered Near Infrared Fluorescent Dye","volume":"7","author":"Silapasuphakornwong","year":"2019","journal-title":"Int. J. Mater. Manuf."},{"issue":"37","key":"2024041616290845000_CIT0036","doi-asserted-by":"publisher","first-page":"9570","DOI":"10.1039\/C7TC03348F","article-title":"Enhanced Anti-counterfeiting Measures for Additive Manufacturing: Coupling Lanthanide Nanomaterial Chemical Signatures With Blockchain Technology","volume":"5","author":"Kennedy","year":"2017","journal-title":"J. Mater. Chem. C"},{"issue":"Online","key":"2024041616290845000_CIT0037","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TIFS.2021.3065225","article-title":"Thermotag: A Hidden ID of 3D Printers for Fingerprinting and Watermarking","volume":"16","author":"Gao","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"volume-title":"Single Image Watermark Retrieval From 3D Printed Surfaces Via Convolutional Neural Networks","year":"2018","author":"Zhang","key":"2024041616290845000_CIT0038"},{"issue":"15","key":"2024041616290845000_CIT0039","doi-asserted-by":"publisher","first-page":"3081","DOI":"10.3390\/polym14153081","article-title":"Numerical Simulation and Experimental Study the Effects of Process Parameters on Filament Morphology and Mechanical Properties of FDM 3D Printed PLA\/GNPs Nanocomposite","volume":"14","author":"Lei","year":"2022","journal-title":"Polymers"},{"key":"2024041616290845000_CIT0040","doi-asserted-by":"publisher","first-page":"110793","DOI":"10.1016\/j.compositesb.2023.110793","article-title":"Influence of Printing Conditions on the Extrudate Shape and Fiber Orientation in Extrusion Deposition Additive Manufacturing","volume":"261","author":"Pibulchinda","year":"2023","journal-title":"Compos. Part B: Eng."},{"issue":"6","key":"2024041616290845000_CIT0041","doi-asserted-by":"publisher","first-page":"5462","DOI":"10.1016\/j.matpr.2021.02.137","article-title":"Effect of Print Speed and Extrusion Temperature on Properties of 3d Printed PLA Using Fused Deposition Modeling Process","volume":"45","author":"Ansari","year":"2021","journal-title":"Mater. Today: Proc."},{"article-title":"DIPimage","year":"2021","author":"van Kempen","key":"2024041616290845000_CIT0042"},{"issue":"3","key":"2024041616290845000_CIT0043","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/S0734-189X(87)80186-X","article-title":"Adaptive Histogram Equalization and Its Variations","volume":"39","author":"Pizer","year":"1987","journal-title":"Comput. Vis. Graph. Image Process."},{"key":"2024041616290845000_CIT0044","doi-asserted-by":"publisher","first-page":"e453","DOI":"10.7287\/peerj.preprints.336v2","article-title":"scikit-Image: Image Processing in Python","volume":"2","author":"van der Walt","year":"2014","journal-title":"PeerJ"},{"issue":"7","key":"2024041616290845000_CIT0045","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1016\/S0031-3203(96)00142-2","article-title":"The Use of the Area Under the ROC Curve in the Evaluation of Machine Learning Algorithms","volume":"30","author":"Bradley","year":"1997","journal-title":"Pattern Recogn."},{"issue":"1\/2","key":"2024041616290845000_CIT0046","first-page":"1","article-title":"Data Security Through QR Code Encryption and Steganography","volume":"7","author":"Rani","year":"2016","journal-title":"Adv. Comput.: Int. J."},{"key":"2024041616290845000_CIT0047","doi-asserted-by":"crossref","DOI":"10.1115\/DETC2023-116880","article-title":"Process Control-Based Embedding and Computer Vision-Based Retrieval of 2d Codes in Fused Deposition Modeling","author":"ElSayed","year":"2023"},{"key":"2024041616290845000_CIT0048","first-page":"770","article-title":"Deep Residual Learning for Image Recognition","author":"He","year":"2016"},{"key":"2024041616290845000_CIT0049","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","article-title":"Imagenet Large Scale Visual Recognition Challenge","volume":"115","author":"Russakovsky","year":"2015","journal-title":"Int. J. Comput. Vis."},{"issue":"1\u201351","key":"2024041616290845000_CIT0050","first-page":"3","article-title":"Announcing the Advanced Encryption Standard (AES)","volume":"197","author":"Standard","year":"2001","journal-title":"Federal Inf. Process. Standards Pub."},{"key":"2024041616290845000_CIT0051","first-page":"343","article-title":"The Security and Performance of the Galois\/Counter Mode (GCM) of Operation","author":"McGrew","year":"2004"}],"container-title":["Journal of Computing and Information Science in Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/24\/7\/071005\/7328454\/jcise_24_7_071005.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/24\/7\/071005\/7328454\/jcise_24_7_071005.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T16:29:38Z","timestamp":1713284978000},"score":1,"resource":{"primary":{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article\/24\/7\/071005\/1198717\/Information-Embedding-in-Additively-Manufactured"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,16]]},"references-count":51,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,7,1]]}},"URL":"https:\/\/doi.org\/10.1115\/1.4065089","relation":{},"ISSN":["1530-9827","1944-7078"],"issn-type":[{"type":"print","value":"1530-9827"},{"type":"electronic","value":"1944-7078"}],"subject":[],"published":{"date-parts":[[2024,4,16]]},"article-number":"071005"}}