People | Locations | Statistics |
---|---|---|
Naji, M. |
| |
Motta, Antonella |
| |
Aletan, Dirar |
| |
Mohamed, Tarek |
| |
Ertürk, Emre |
| |
Taccardi, Nicola |
| |
Kononenko, Denys |
| |
Petrov, R. H. | Madrid |
|
Alshaaer, Mazen | Brussels |
|
Bih, L. |
| |
Casati, R. |
| |
Muller, Hermance |
| |
Kočí, Jan | Prague |
|
Šuljagić, Marija |
| |
Kalteremidou, Kalliopi-Artemi | Brussels |
|
Azam, Siraj |
| |
Ospanova, Alyiya |
| |
Blanpain, Bart |
| |
Ali, M. A. |
| |
Popa, V. |
| |
Rančić, M. |
| |
Ollier, Nadège |
| |
Azevedo, Nuno Monteiro |
| |
Landes, Michael |
| |
Rignanese, Gian-Marco |
|
Gupta, Nikhil
in Cooperation with on an Cooperation-Score of 37%
Topics
Publications (5/5 displayed)
- 2024Laser Powder Bed Fusion and Heat Treatment of the Martensitic Age‐Hardenable Steel (1.2709)citations
- 2019Embedding Tracking Codes in Additive Manufactured Parts for Product Authenticationcitations
- 2018Failure of glass-microballoons/thermoset-matrix syntactic foams subject to hydrostatic loadingcitations
- 2018Reactive melt infiltration as synthesis route for enhanced SiC/CoSi2 composite materials for advanced armor systemscitations
- 2017Biocompatibility and degradation properties of WE43 Mg alloys with and without heat treatmentcitations
Places of action
Organizations | Location | People |
---|
article
Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication
Abstract
<p>Additive manufacturing (AM) process chain relies heavily on cloud resources and software programs. Cybersecurity has become a major concern for such resources. AM produces physical components, which can be compromised for quality by many other means and can be reverse engineered for unauthorized reproduction. This work is focused on taking advantage of layer-by-layer manufacturing process of AM to embed codes inside the components and reading them using image acquisition methods. The example of a widely used QR code format is used, but the same scheme can be used for other formats or alphanumeric strings. The code is segmented in a large number of parts for obfuscation. The results show that segmentation and embedding the code in numerous layers help in eliminating the effect of embedded features on the mechanical properties of the part. Such embedded codes can be used for parts produced by fused filament fabrication, inkjet printing, and selective laser sintering technologies for product authentication and identification of counterfeits. Post processing methods such as heat treatments and hot isostatic pressing may remove or distort these codes; therefore, analysis of AM method and threat level is required to determine if the proposed strategy can be useful for a particular product.</p>