{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:20Z","timestamp":1750220480614,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,19]]},"DOI":"10.1145\/3462223.3485623","type":"proceedings-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T16:15:37Z","timestamp":1635437737000},"page":"31-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Information Embedding in Additive Manufacturing through Printing Speed Control"],"prefix":"10.1145","author":[{"given":"Karim A.","family":"ElSayed","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Adam","family":"Dachowicz","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Jitesh H.","family":"Panchal","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"volume-title":"Computer Graphics Forum","author":"Aliaga Daniel G","key":"e_1_3_2_1_1_1","unstructured":"Daniel G Aliaga and Mikhail J Atallah . 2009. Genuinity signatures: Designing signatures for verifying 3d object genuinity . In Computer Graphics Forum , Vol. 28 . Wiley Online Library , 437--446. Daniel G Aliaga and Mikhail J Atallah. 2009. Genuinity signatures: Designing signatures for verifying 3d object genuinity. In Computer Graphics Forum, Vol. 28. Wiley Online Library, 437--446."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/adem.201800495"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-016-9335-4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEV.2018.8640986"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2962306"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376202"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380187"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382847"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3313005"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-017-0239-8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126635"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243735"},{"volume-title":"Laser additive manufacturing","author":"Liu Renwei","key":"e_1_3_2_1_14_1","unstructured":"Renwei Liu , Zhiyuan Wang , Todd Sparks , Frank Liou , and Joseph Newkirk . 2017. Aerospace applications of laser additive manufacturing . In Laser additive manufacturing . Elsevier , 351--371. Renwei Liu, Zhiyuan Wang, Todd Sparks, Frank Liou, and Joseph Newkirk. 2017. Aerospace applications of laser additive manufacturing. In Laser additive manufacturing. Elsevier, 351--371."},{"volume-title":"Information theory, inference and learning algorithms","author":"MacKay David JC","key":"e_1_3_2_1_15_1","unstructured":"David JC MacKay and David JC Mac Kay . 2003. Information theory, inference and learning algorithms . Cambridge university press . David JC MacKay and David JC Mac Kay. 2003. Information theory, inference and learning algorithms. Cambridge university press."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3322960"},{"volume-title":"Computer Graphics Forum","author":"Peng Hao","key":"e_1_3_2_1_17_1","unstructured":"Hao Peng , Peiqing Liu , Lin Lu , Andrei Sharf , Lin Liu , Dani Lischinski , and Baoquan Chen . 2020. Fabricable Unobtrusive 3D-QR-Codes with Directional Light . In Computer Graphics Forum , Vol. 39 . Wiley Online Library , 15--27. Hao Peng, Peiqing Liu, Lin Lu, Andrei Sharf, Lin Liu, Dani Lischinski, and Baoquan Chen. 2020. Fabricable Unobtrusive 3D-QR-Codes with Directional Light. In Computer Graphics Forum, Vol. 39. Wiley Online Library, 15--27."},{"key":"e_1_3_2_1_18_1","volume-title":"Robert Cromartie, Ari Geselowitz, Trey Greer, Bart ter Haar Romeny, John B Zimmerman, and Karel Zuiderveld.","author":"Pizer Stephen M","year":"1987","unstructured":"Stephen M Pizer , E Philip Amburn , John D Austin , Robert Cromartie, Ari Geselowitz, Trey Greer, Bart ter Haar Romeny, John B Zimmerman, and Karel Zuiderveld. 1987 . Adaptive histogram equalization and its variations. Computer vision, graphics, and image processing, Vol. 39 , 3 (1987), 355--368. Stephen M Pizer, E Philip Amburn, John D Austin, Robert Cromartie, Ari Geselowitz, Trey Greer, Bart ter Haar Romeny, John B Zimmerman, and Karel Zuiderveld. 1987. Adaptive histogram equalization and its variations. Computer vision, graphics, and image processing, Vol. 39, 3 (1987), 355--368."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3214286","article-title":"My smartphone recognizes genuine QR codes! practical unclonable qr code via 3D printing","volume":"2","author":"Song Chen","year":"2018","unstructured":"Chen Song , Zhengxiong Li , Wenyao Xu , Chi Zhou , Zhanpeng Jin , and Kui Ren . 2018 . My smartphone recognizes genuine QR codes! practical unclonable qr code via 3D printing . Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies , Vol. 2 , 2 (2018), 1 -- 20 . Chen Song, Zhengxiong Li, Wenyao Xu, Chi Zhou, Zhanpeng Jin, and Kui Ren. 2018. My smartphone recognizes genuine QR codes! practical unclonable qr code via 3D printing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 2, 2 (2018), 1--20.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-317"},{"key":"e_1_3_2_1_21_1","volume-title":"PeerJ","volume":"2","author":"van der Walt St\u00e9fan","year":"2014","unstructured":"St\u00e9fan van der Walt , Johannes L. Sch\u00f6nberger , Juan Nunez-Iglesias , Franccois Boulogne , Joshua D. Warner , Neil Yager , Emmanuelle Gouillart , Tony Yu , and the scikit-image contributors. 2014. scikit-image: image processing in Python . PeerJ , Vol. 2 (6 2014 ), e453. https:\/\/doi.org\/10.7717\/peerj.453 10.7717\/peerj.453 St\u00e9fan van der Walt, Johannes L. Sch\u00f6nberger, Juan Nunez-Iglesias, Franccois Boulogne, Joshua D. Warner, Neil Yager, Emmanuelle Gouillart, Tony Yu, and the scikit-image contributors. 2014. scikit-image: image processing in Python. PeerJ, Vol. 2 (6 2014), e453. https:\/\/doi.org\/10.7717\/peerj.453"},{"key":"e_1_3_2_1_22_1","unstructured":"Geert van Kempen Michael van Ginkel Lucas van Vliet Cris Luengo and Bernd Rieger. 2021. DIPimage. https:\/\/diplib.org\/DIPimage.html  Geert van Kempen Michael van Ginkel Lucas van Vliet Cris Luengo and Bernd Rieger. 2021. DIPimage. https:\/\/diplib.org\/DIPimage.html"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1971.1090700"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.addma.2018.09.003"},{"volume-title":"Reed-Solomon codes and their applications","author":"Wicker Stephen B","key":"e_1_3_2_1_25_1","unstructured":"Stephen B Wicker and Vijay K Bhargava . 1999. Reed-Solomon codes and their applications . John Wiley & Sons . Stephen B Wicker and Vijay K Bhargava. 1999. Reed-Solomon codes and their applications. John Wiley & Sons."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2461912.2461936"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.addma.2018.03.015"},{"key":"e_1_3_2_1_28_1","volume-title":"Watermark retrieval from 3d printed objects via convolutional neural networks. arXiv preprint arXiv:1811.07640","author":"Zhang Xin","year":"2018","unstructured":"Xin Zhang , Qian Wang , Toby Breckon , and Ioannis Ivrissimtzis . 2018. Watermark retrieval from 3d printed objects via convolutional neural networks. arXiv preprint arXiv:1811.07640 ( 2018 ). Xin Zhang, Qian Wang, Toby Breckon, and Ioannis Ivrissimtzis. 2018. Watermark retrieval from 3d printed objects via convolutional neural networks. arXiv preprint arXiv:1811.07640 (2018)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462223.3485623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3462223.3485623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:54Z","timestamp":1750193334000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462223.3485623"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":27,"alternative-id":["10.1145\/3462223.3485623","10.1145\/3462223"],"URL":"https:\/\/doi.org\/10.1145\/3462223.3485623","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}