You are on page 1of 8

JOM, Vol. 69, No.

11, 2017
DOI: 10.1007/s11837-017-2502-8
Ó 2017 The Minerals, Metals & Materials Society

Microstructure-Based Counterfeit Detection in Metal Part


Manufacturing

ADAM DACHOWICZ ,1,2 SIVA CHAITANYA CHADUVULA,1


MIKHAIL ATALLAH,1 and JITESH H. PANCHAL1

1.—Purdue University, West Lafayette, IN 47907, USA. 2.—e-mail: adachowi@purdue.edu

Counterfeiting in metal part manufacturing has become a major global con-


cern. Although significant effort has been made in detecting the implemen-
tation of such counterfeits, modern approaches suffer from high expense
during production, invasiveness during manufacture, and unreliability in
practice if parts are damaged during use. In this paper, a practical
microstructure-based counterfeit detection methodology is proposed, which
draws on inherent randomness present in the microstructure as a result of the
manufacturing process. An optical Physically Unclonable Function (PUF)
protocol is developed which takes a micrograph as input and outputs a com-
pact, unique string representation of the micrograph. The uniqueness of the
outputs and their robustness to moderate wear and tear is demonstrated by
application of the methodology to brass samples. The protocol is shown to have
good discriminatory power even between samples manufactured in the same
batch, and runs on the order of several seconds per part on inexpensive ma-
chines.

instances should differ substantially even in the


INTRODUCTION
face of adversarial attempts at making them close.
Counterfeiting is a problem that negatively As an example, a human fingerprint ID may be
impacts both the world economy and the welfare of considered a PUF since simple methods for analyz-
humans. In some countries, about 40% of auto parts ing a fingerprint exist, but predicting the exact form
are counterfeit, while the World Health Organiza- of one person’s print before making an observation
tion estimates counterfeit drugs make up 10% of the is nearly impossible. In a manufacturing scenario, a
world pharmaceutical market,1 a market that well-designed PUF captures the uniqueness in each
exceeded one trillion dollars in 2016. This causes manufactured instance.
unnecessary accidents and human suffering that is Most existing practical anti-counterfeiting tech-
often mis-attributed to legitimate manufacturers niques rely on modification of the final product by
rather than to unknown counterfeiters. re-tooling (for example, embossing) or attaching
Previous efforts towards addressing counterfeit- barcodes or RFID tags.3,7 Unfortunately, these
ing have focused on (1) monitoring of circuits in prove to be ineffective against counterfeiting of
electronics,2 (2) affixed physical attachments (e.g., general manufactured parts,8 especially after parts
radio-frequency identification (RFID) tags) that are used in service. A few non-destructive tech-
may prove authenticity,3 and (3) paper-based meth- niques such as measuring acoustic characteristics
ods (e.g., currency notes, legal contracts).4 In all or utilizing x-ray fluorescence (XRF) have also been
such cases, the proposed schemes draw on the proposed.2 However, these approaches may not be
concept of a Physically Unclonable Function feasible to apply in large scale mass production
(PUF).5,6 In essence, a PUF is some protocol applied applications. Some researchers5,9 have introduced
to a feature or set of features derived from a part PUFs based on analysis of scattered particles in
that is easy to compute, but difficult to predict. A silicon or use of dielectric materials affixed to or
PUF is presented a ‘‘challenge’’ to which it provides coating parts. In these cases, special equipment is
a response; the responses from any two distinct used to affix and capture the unique characteristics

2390 (Published online August 9, 2017)


2391

of the PUFs. Other work has used micrograph data possible micrographs.
to differentiate the counterfeit and original product. 2. Unique. PðxÞ is a unique representation of x 2 X
However, this process may be invasive and involves such that Pðxi Þ 6¼ Pðxj Þ, 8x 2 X; i 6¼ j with high
visual inspection done by experts such as forensic probability.
scientists.10 In this paper, we propose a practical 3. Reproducible. PðxÞ is consistent for small errors
microstructure-based PUF to address these  in x, that is, Pðx  Þ ¼ PðxÞ.
concerns. 4. Unclonable. Given PðxÞ, it is hard for an adver-
sary to construct some function CðxÞ  PðxÞ.
USING MATERIAL MICROSTRUCTURE TO 5. Unpredictable. Given a challenge-response set
DESIGN PUFs Q ¼ fðxi ; yi Þg of arbitrary size, it is hard for an
adversary to estimate yc  Pðxc Þ for ðxc ; yc Þ=
2Q.
The microstructure of materials plays a central
6. One-Way. Given y and P, it is hard for an
role in understanding the behavior of materials.
adversary to construct the initial x.
Material scientists have utilized microstructure to
7. Tamper-evident. Any deliberate alteration to the
characterize material properties based on the
physical part under consideration transforms
microstructure at various scales, using structure-
P ! P0 such that P0 ðxÞ 6¼ PðxÞ, 8x 2 X with high
property relationships to design new materials.11
probability.
Existing efforts in materials science are focused on
identifying microstructure descriptors that can be In this paper, we present an efficient PUF
(1) related to material properties such as strength, formulation for converting a micrograph into a
and (2) controlled through manufacturing pro- bitstring that is a unique representation of that
cesses. Examples of such microstructural descrip- micrograph. We illustrate that the approach is
tors include n-point spatial correlations, lineal path robust to minor wear-and-tear during usage. Key
functions, grain size distribution, shape distribu- advantages of the proposed approach are as follows:
tion, and orientation distribution.12 (1) our approach uses non-replicable surface
We present a different use of material microstruc- microstructure as a PUF challenge captured using
ture. We illustrate that the microstructure, and its an optical microscope, and (2) manufacturers need
descriptors can be used to uniquely identify a not modify their production processes with any
manufactured metallic product. A material’s sophisticated equipment. A manufacturer can dis-
microstructure is a result of the manufacturing credit the genuineness of the product if the derived
process, which by its nature is inherently random. A bit string cannot be verified. The proposed PUF
micrograph is a specific instance of the random formulation is discussed in the following section
microstructure,13 which is practically impossible to
duplicate even if the manufacturing process and its
APPROACH
control parameters are precisely known. Hence, the
micrograph is a unique fingerprint of the product, We illustrate the approach using 360-brass, which
and can be used as input to a properly designed under common manufacturing conditions exhibits an
Physically Unclonable Function (PUF) to determine equiaxed space-filling grain structure that allows
the authenticity of the product. Capturing such straightforward calculation of features like mean
unique features from the microstructure of each grain intercept length, L3 . Although we focus on one
manufactured product can help in differentiating material and feature, we emphasize that the frame-
authentic products from counterfeit products. work proposed is intended to generalize easily for
A naı̈ve approach to leverage this uniqueness is to general microstructures and their relevant features.
capture a micrograph from each product and store it This section discusses the relevant image capture
in a database for future comparison. However, and pre-processing details, as well as the feature
direct comparison of micrographs is impractical extraction and bit string construction methodology.
due to associated computational cost, particularly The work flow for the proposed method is summa-
when the number of products is large. Hence, the rized in Supplemental Figure 1. This is followed in
challenge is in establishing efficient representations later sections with a discussion on the results of this
of the micrograph that are efficient to compute and analysis on several brass samples.
compare. We address this challenge by designing a
PUF P that takes as input a micrograph x and Image Capture and Pre-processing
outputs a string y, such that y ¼ PðxÞ, which is a
unique, robust identifier for the microstructural Several 360-brass samples from the same manu-
region captured by the micrograph. Extensive work facturing batch were prepared for optical micro-
has been done in formalizing PUFs;2 here we scopy prior to analysis. The samples were polished
summarize the key features of well-designed PUFs using successive fine grit paper, diamond suspen-
for completeness: sion, and alumina powder polishing. Samples were
then etched by submersion in a 50% solution of
1. Evaluatable. A PUF y ¼ PðxÞ should be easy to nitric acid for 5 s. Fifty micrographs were taken at
evaluate for x 2 X, where X is the ‘‘challenge various locations at 100 magnification, as shown
space’’ of the PUF. Here, X is the space of all in Fig. 1a. Each micrograph was captured using an
2392

Fig. 1. (a) Micrograph of 360 Brass etched with 50% nitric acid solution, 100. (b) Same image after pre-processing. (c) Example test line Li ,
with Pi ¼ 10.

AmScope MU500 5.1 MP digital camera. Captured corresponding intercepts are illustrated in Fig. 1c.
images (Fig. 1b) were then pre-processed for further The mean grain intercept length for the given image
analysis using boundary-preserving median filter- is then, by Tomkeieff:
ing (radius ¼ 5) and the moments-preserving auto-
thresholding algorithm proposed by Tsai.14 Image 1
L3 ¼ : ð2Þ
processing was carried out using the ImageJ Fiji NL
distribution.15 These images are then used to This calculation is then used to formulate an
extract the relevant features and build the subse- image bit string by the following method.
quent bit string.
Image Tiling and Bit String Calculation
Feature Extraction and Bit String Construc-
tion The L3 calculation may be carried out for each
micrograph to get a characteristic value for that
Many well-established microstructure properties sample. However, this measure varies in different
may be leveraged in gathering discriminating infor- subregions of the micrographs as a consequence of
mation from the processed micrographs.12,16,17 In the random field nature of the grain structure at the
this paper, we focus on the 3-dimensional mean relevant length scale. The proposed bit string
intercept length of the grains L3 , calculated via extraction method leverages this inherent random-
performing automated lineal analysis on the pro- ness to create discriminating strings over a family of
cessed micrographs. images taken from the same brass sample.
Each image is segmented into several length
Mean Intercept Length Calculation levels, each of which consists of Regions of Interest
The mean grain intercept length is given for (ROIs) in which the L3 statistic is calculated follow-
space-filling grain structures by Tomkeieff’s Equa- ing the procedure described above. We refer to the
tion18 using experimental measures of the normal- level constituting the entire image in one ROI as the
ized intercept count NL : characteristic level, and index subsequent levels
Pm according to their relative ROI size. The level
Pi containing the largest ROIs by area is indexed 0,
NL ¼ Pmi¼1 ; ð1Þ
i¼1 jL ij with each subsequent level indexed 1, 2, and so on.
where Pi is the number of intersection points on line This tiled segmentation approach is illustrated in
Li , and jLi j is the length of Li , 1  i  m. For each Fig. 2.
image considered, m ¼ 1200 lines were applied with For each ROI across all levels, L3 is calculated.
random lengths and orientations to the processed Then, each ROI result is compared to the median
image result. Here, m was chosen to be high enough result across all ROIs, and is assigned a bit of 1 if
to guarantee convergence to a common L3 regard- above the median and 0 else. The median compar-
less of the random seed applied to the line gener- ison increases the robustness of this method when
ation algorithm. Discontinuities in each line profile considering images taken at a later time with
were taken as intercepts, with the total intercept possibly damaged parts or slight microstructural
count taken as Pi . An example Li test line and the changes. A histogram of these calculations for one
2393

Fig. 2. Example of a quad-tiled pre-processed micrograph.


Fig. 3. Histogram of L3 across 84 ROIs for a representative brass
micrograph.

sample image is provided in Fig. 3. As an illustra-


tion, a segment of one possible bit string constructed PUF PROTOCOL ANALYSIS
using three ROI levels is: In this section, the performance of this PUF
ðlevel 0Þ  ðlevel 1Þ  ðlevel 2Þ : 0011  1000000110110011 protocol is analyzed by considering the reproducibil-
 11010110101111000001 . . .
ity, evaluability, and uniqueness of the response bit
strings. The remaining PUF features, although
important, are not considered here as further
where the first four bits correspond to the results experimentation is required to provide complete
from the Level 0 ROIs, the following sixteen from analyses. However, we briefly comment on these
the Level 1 ROIs, and the remaining 64 (not all features now for completeness:
shown) are from the Level 2 ROIs.
Now, it is clear that for each low-level bit, there 1. Unclonability, Unpredictability, and One-Way-
are four corresponding bits in the higher level, ness The PUF response is highly dependent on
which should vary with greater probability as the (1) the parameters of the part’s manufacturing
microstructure changes over a part’s life cycle. process and (2) inherent randomness in the
Thus, to calculate the difference between bit strings formation of local microstructure. Thus, it is
generated by this method, we propose a modified highly unlikely an adversary could reliably
Hamming Distance metric19 which penalizes devi- reproduce a part with the necessary local
ations in lower-level bits more than those of high- microstructural properties to emulate an
level bits. For two bit strings a, b of length L and authentic instance, or predict the response
entries ai , bi , 1  i  L, taken from an image ahead of time.
segmented with a maximum K level, the proposed 2. Tamper Evidence Severe alteration of a part
Modified Hamming penalty function H is given by: would destroy the local microstructural regions
PL of interest in the part with high probability. It is
qðai ; bi ; ki Þ unlikely such a damaged part would then be
Hða; b; KÞ ¼ i¼1 PL Kk ; ð3Þ used in practice.
i¼1 4
i

where qðai ; bi ; ki Þ is the bit-wise comparison func-


tion on the bit string entries, ki is the corresponding Reproducibility and Evaluability
P
tile level of entry i, 0  ki  K, and Li¼1 4Kki is a For each of the 50 micrographs, an 84-bit string was
normalizing term. qðai ; bi ; ki Þ is given by: constructed by analysis of Level 0, 1, and 2 ROIs for
( each tiled processed image. The distance between
4Kki ; ai 6¼ bi each bit string and the strings for all other images
qðai ; bi ; ki Þ ¼ : ð4Þ
0; ai ¼ b i was calculated according to the distance metric
defined above in order to evaluate the inter-distance
Thus, the penalty function penalizes each bit dis- between non-identical image challenges. To test the
crepancy based on the relative size of the corre- robustness and reproducibility of this method, sim-
sponding level tile. A distance value Hða; b; KÞ ¼ 0 ulated ‘‘damage’’ was applied to each image in the
indicates complete agreement between strings a and form of dark striations on the raw images, simulat-
b, while Hða; b; KÞ ¼ 1 indicates complete reversal of ing scratches of width  0:05mm. The analysis was
bits between a and b. Next, we discuss the results of run with various damage severities (number of
applying this analysis to the brass data. striations), and the resulting strings were compared
2394

Fig. 4. Inter- and intra-distance results for 50 images with (a) 8, (b) 16, (c) 20, and (d) 40 dark parallel striations applied to each at random to
simulate damage.

to the original strings gathered for each image to get Note that these results indicate significant uncer-
an intra-distance measure. Inter- and intra-dis- tainty for a moderate range of H for more heavily
tance histograms for the data set across several damaged components, and thus a more discrimina-
simulated damage severities are plotted in Fig. 4, tory string construction may be desired for parts
which emphasize the PUF’s reproducibility and the likely to become heavily damaged. The discrimina-
uniqueness of the output strings. tory ability can be further enhanced by collecting
Timing data provides a method of studying the more feature measurements per image, rather than
evaluability of the proposed method. On a machine the single measure of L3 considered here. Never-
equipped with an Intel i5 3.2 GHz CPU and 8 GB theless, this analysis shows the reasonable discrim-
RAM, the protocol took on average 12.1 s to produce inatory power of very small reliable bit strings
a bit string from a 2592  1944-pixel raw micro- derived from microstructural features. How best to
graph. Note this protocol is easy to parallelize across extend this method and increase discriminatory
ROI calculations, and such parallelization will ability while maintaining robustness is an open
drastically reduce this calculation time. Individual question, and will be a major focus of future work.
ROI L3 computations take on average 0.22 s.
An Improved Scheme
Uniqueness: Enhancing Discriminatory
We now sketch an improvement to the
Ability
scheme that makes it resistant against a future
In practice, a user would compare a ‘‘challenge’’ counterfeiting adversary who has the manufactur-
image result taken from a suspect part with the ing capability to control, in any given small rectan-
‘‘original’’ enrolled image bit string using the Mod- gular patch of material, the bit-string for that
ified Hamming distance measure. Note the small particular region. The improvement that thwarts
overlap in Figs. 4a and b, which represent lesser such a future adversary consists of a simple mod-
scratch damage compared to Fig. 4c and d. For ification to our scheme: Instead of generating the
challenges resulting in distances H  0:13, across bit-string using the deterministic tiling of the
all sampled images, one can be confident that the micrograph with small squares of equal size (a
challenged image is indeed genuine. Similarly for tiling that is known to the adversary), we now use a
H  0:23 for challenge images with light to moder- tiling with rectangles that is generated using a
ate scratch damage, one can be confident that the cryptographic key that is not known to the adver-
challenged image is not genuine. sary; the rectangles we use have a bounded aspect
2395

ratio (hence, are ‘‘square-like’’ and not arbitrarily In the proposed approach we used a single
thin). An adversary who does not have the crypto- feature, L3 , towards constructing the micrograph
graphic key is unable to produce the tiling, and, bit-string. We believe that this bit string can be
therefore, unable to determine which rectangular derived from different features or a combination of
patches he should target for the use of his superior features. Such feature selection can be explored for
manufacturing prowess. different materials as well.
Future research must also address manufactur-
INTEGRATION IN MANUFACTURING ing variations, such as different starting stock,
within the same authentic batch. Further, work
Our approach can be automated and need not
towards developing set protocols for polishing and
involve experts. The genuineness of the product
etching before bit-string enrollment is necessary.
may be verified using the following steps:
These protocols, combined with future bit-string
1. Certain unique features of the microstructure enrollment prototypes, would address feasibility in
are extracted from a captured micrograph, and a integrating with existing manufacturing processes.
reliable bit string is extracted based on these
ACKNOWLEDGEMENTS
unique features.
2. The bit string is signed by the manufacturer Portions of this work were supported by National
using a private key derived from production Science Foundation Grants CPS-1329979, CNS-
details such as batch number, part number, 0915436, CMMI-1265622; and by sponsors of CER-
material supplier, etc. IAS. The authors declare that they have no conflict
3. All such signed bit strings are stored in a of interest.
database.
4. This database is made available to the entire
supply chain (including end-customers). ELECTRONIC SUPPLEMENTARY
5. Any participant in the supply chain can submit MATERIAL
the derived bit string of the suspected product
and verify it with the manufacturer’s database.
The online version of this article (doi:10.1007/
This protocol may be applied to any bit string s11837-017-2502-8) contains supplementary mate-
extraction technique considered, such as the one rial, which is available to authorized users.
presented in this paper. Economically feasible
automation of this and similar protocols, however,
will be a focus of future work. REFERENCES
1. P. Tuyls, J. Guajardo, L. Batina, and T. Kerins, in Security
FUTURE WORK AND CONCLUSION with Noisy Data: On Pri-vate Biometrics, Secure Key Stor-
age and Anti-Counterfeiting, ed. P. Tuyles and T. Keve-
The driving concern of this work is the detection naar(London: Springer, 2007), p. 293.
and prevention of counterfeiting in manufacturing. 2. R. Maes and I. Verbauwhede, in Towards Hardware-In-
In this paper, we present a new, practical approach trinsic Security, ed. A.-R. Sadeghiand D. Naccache (Hei-
to address the detection of counterfeit manufac- delberg: Springer, 2010), p. 3.
tured parts, leveraging the microstructure of the 3. A. Mitrokotsa and M. Rieback, Inform. Syst. Front. 12, 491
(2010) doi:10.1007/s10796-009-9210-z.
parts as a Physically Unclonable Function (PUF). 4. J. Buchanan, R.P. Cowburn, A.-V. Jausovec, D. Petit, P.
This microstructure serves as a mark of authentic- Seem, G. Xiong, D. Atkinson, K. Fenton, D.A. Allwood, and
ity, which may be verified by simple optical micro- M.T. Bryan, Nature, 436, 475 (2005) doi:10.1038/436475a.
scopy and the application of a robust yet 5. G.E. Suh and S. Devadas, Des. Aut. Con. 44, 9 (2007)
doi:10.1145/1278480.1278484.
discriminatory bit string extraction algorithm. We 6. R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, Science,
demonstrated the power of this technique by 297, 2026 (2002) doi:10.1126/science.1074376.
extracting unique strings from 50 micrographs of 7. P. Tuyls, G.-J. Schrijen, B. Škorić, J. Van Geloven, N,
360-brass collected from the same manufacturing Verhaegh, and B. Wolters, Lect. Notes Comput. Sci. 369
batch, which were shown to have good discrimina- (2006) doi:10.1007/11894063_29.
8. A.-R. Sadeghi, I. Visconti, and C. Wachsmann, in Towards
tory ability between different images, while also Hardware-Intrinsic Security, ed.A.-R. Sadeghi and D.
being robust to moderate simulated wear and tear Naccache (Heidelberg: Springer, 2010), p. 281.
and efficient to compute on standard hardware. 9. P. Tuyls and B. Škorić, in AmIware Hardware Technology
In the current work, only damage due to simu- Drivers of Ambient Intelligence, ed. S. Mukherjee, E. Aarts,
R. Roovers, and F. Widdershoven (Dordrecht: Springer,
lated surface striations is considered for bit-string 2006), p. 421.
robustness analysis. In practice, other damage types 10. M. Diephuis, S. Voloshynovskiy, T. Holotyak, N. Stendar-
are relevant, such as corrosion or fatigue. Further do, and B. Keel, in Proceedings of SPIE 90280T (2014)
research is needed to validate the robustness of the doi:10.1117/12.2039638.
proposed bit-string construction method for various 11. J.H. Panchal, S.R. Kalidindi, and D.L. McDowell, Comput.
Aided Des. 45, 4 (2013) doi:10.1016/j.cad.2012.06.006.
damage types. Similar studies on aged and damaged 12. B.L. Adams, S. Kalidindi, and D.T. Fullwood, in Mi-
specimens in a practical setting, and in scenarios crostructure Sensitive Design for Performance Optimiza-
with poor polishing, are also necessary. tion (Boston, MA: ButterWorth-Heinemann, 2013), p. 67.
2396

13. S.R. Niezgoda, Y.C. Yabansu, and S.R. Kalidindi, Acta 16. S. Ghosh and D.M. Dimiduk, Computational Methods for
Mater. 59, 6387 (2011) doi:10.1016/j.actamat.2011.06.051. Microstructure-Property Relationships, (New York, NY:
14. W.-H. Tsai, Comput. Gr. Image Process. 29, 377 (1985) Springer, 2011), pp. 99–150.
doi:10.1016/0734-189X(85)90133-1. 17. R.T. DeHoff and F.N. Rhines, Quantitative Microscopy,
15. J. Schindelin, I. Arganda-Carreras, E. Frise, V. Kaynig, M. (New York, NY: Mcgraw-Hill, 1968), p. 128.
Longair, T. Pietzsch, S. Preibisch, C. Rueden, S. Saalfeld, 18. S.I. Tomkeieff, Nature, 155, 107 (1945) doi:10.1038/
B. Schmid, J.-Y. Tinevez, D.J. White, V. Hartenstein, K. 155024a0.
Eliceiri, P. Tomancak, and A. Cardona, Nat. Methods, 9, 19. R.W. Hamming, Bell Sys. Tech. J. 29, 147 (1950) doi:10.
676 (2012) doi:10.1038/nmeth.2019. 1002/j.1538-7305.1950.tb00463.x.
JOM: The Journal of The Minerals, Metals & Materials Society (TMS) is a copyright of
Springer, 2017. All Rights Reserved.

You might also like