Artificial fingerprints at the nanoscale engraved on target substrates
Since ancient Babylon, fingerprints have been exploited as unique identifiers to secure commercial transactions, as testified by clay seals attached to their business documents.22 In the era of Internet of Things, fingerprint matching is largely deemed to be a secure system for both authentication (i.e., matching a person’s biometric template) and identification (i.e., determining the identity of a person), as schematized in Fig. 1a. Here, the validation and verification of a person’s identity are based on unique physical characteristics – biometrics – of their fingerprints.23 The security of this process is guaranteed by the fact that, although two or more fingerprints may share the same global features, there are currently no known pairs of fingerprints with identical pattern of local features, also called minutiae points.24 Besides the individuality of the fingerprint, the premises for fingerprint authentication/identification rely on the pattern persistence, meaning that the characteristics of fingerprints must be stable over time.25 Similarly, artificial fingerprints can be exploited as PUFs for the authentication and/or identification of a product in the supply chain (the workflow of PUF generation, database initialization and authentication is schematized in Fig. 1b). Inspired by fingerprint biometrics, we developed a process to directly transfer a nano fingerprint pattern into a wide range of target substrates, as schematized in Fig. 1c. This process is based on i) molecular self-assembly of block copolymers (BCPs) on the target substrate, ii) selective removal of one of the BCP phase, and iii) pattern transferring to the target substrate. Molecular self-assembly relies on phase separation of chemically distinct and thermodynamically incompatible polymeric components of BCPs that occurs randomly under thermal fluctuations, resulting, under proper conditions, in lamellar fingerprint-like patterns (Supplementary Note 1). After achieving the self-assembled pattern, one of the two polymers comprising the BCP can be selectively removed, resulting in the formation of a disordered nanolithographic mask. Figure 1d reports an example of self-assembled lamellar BCP showing fingerprint-like global features (fabrication details in Methods). Notably, these patterns are characterized by the presence of spatially distributed local features (defect points) closely resembling minutiae points of human fingerprints. In case of lamellar patterns, the defect taxonomy of both positive and negative phases includes terminal points, 3-way junctions and dots (Fig. 1e). It is worth mentioning that typical features of lamellar structures such as typical dimensions, periodicity, correlation length, defect density and line-edge roughness can be tailored by appropriate choice of BCP molecular weights and processing conditions.26,27 The polymeric fingerprint-like pattern can be then transferred to the target substrate through selective reactive ion etching (RIE) or wet chemical etching, depending on the material of the target substrate. Examples of patterns successfully transferred to diamond, Si, quartz and SiO2 target substrates are reported in Fig. 1f-i (details of pattern transfer on different substrates in Methods). Additionally, patterns have been demonstrated to be transferable on metallic (Cu, Cr, Co, W, CoCrPt, Permalloy),28–33 dielectric (Si3N4),34 semiconductor (ITO, graphene)28,33 and flexible substrates35,36. The ability to conduct the self-assembly process of BCP on various materials opens the potential for directly engraving artificial fingerprints at the nanoscale onto a wide range of devices and products, including screens and microchips.
Extraction of pattern morphology
As for human fingerprints, a critical step for exploiting nanoscale fingerprints as PUFs is represented by the automatic extraction of the fingerprint pattern including minutiae (defects) from input images. This process is crucial and may heavily rely on the quality of the input fingerprint micrographs. Since ridge structures in poor-quality fingerprint images can be not well defined, the pattern can be not correctly detected, and spurious defects can be created while genuine defects can be ignored. To increase the robustness of pattern extraction with respect to the quality of input fingerprint images, we adapted a fingerprint enhancement algorithm able to adaptively improve the clarity of ridge and valley structures based on estimated local ridge orientation and frequency37 (Fig. 2a, details in Methods). This allows to obtain a binarized genuine fingerprint pattern that can be exploited to investigate BCP morphological parameters including defect localization (defect maps), line period, line width, line-edge roughness, line-width roughness, and correlation length (correlation maps)38 through an automated analysis (Methods) An example of the process flow, from SEM image to fingerprint pattern enhancement and defect localization, is reported in Fig. 2b. A comparison of a binarized pattern obtained by fingerprint enhancement algorithm and other common binarization thresholding techniques on the same micrograph is reported in Fig. 2c (raw micrograph in Supplementary Figure S1). Here, the white phase of binarized images represents ridge lamellae structures, while the black phase represents valleys. Fingerprint pattern enhancement outperforms traditional thresholding techniques, allowing to obtain a binarized map with reduced noise and with a reduced number of artifacts (additional details in Supplementary Figure S2). Notably, whereas the effectiveness of traditional thresholding techniques relies on the image quality, contrast and brightness, fingerprint enhancement enables the automatized extraction of patterns even in case of poor quality and low contrast images (Supplementary Figure S3). Moreover, it eliminates the need for image-dependent adjustment of binarization parameters, thereby avoiding any potential bias from the user. As depicted in defect maps (Fig. 2c), the reduced number of artifacts in images processed with fingerprint enhancement results in a limited number of spurious defects. Also, this approach enables the generation of correlation maps with a decreased noise level (Fig. 2d). A statistical analysis, performed by considering SEM micrographs acquired on different areas of the same patterned sample, allows a quantitative evaluation on the effect of the binarization extraction of defects and correlation length of the structures. Figure 2d reports the defect density obtained by analyzing images binarized with the different techniques. As evident, fingerprint enhancement results in a lower mean defect density, quantitatively showing the possibility of reducing the counting of spurious defects through this binarization technique. Furthermore, larger defect distributions obtained by conventional binarization techniques are due to overestimation of defects in images not properly binarized through these techniques (details in Supplementary Figure S4). More in detail, the radar chart in Fig. 2e shows that conventional binarization techniques result in a higher overestimation of certain types of defects. Since defect density is inversely related to the dimensions of lamellae orientation domains,38 fingerprint enhanced images result in a higher mean value of correlation length (Fig. 2f). All these observations show that binarization through the fingerprint enhancement algorithm allows to retrieve a genuine fingerprint pattern that, besides reducing artifacts, is user independent and can automatically extract relevant information even from poor-quality images and images acquired with different contrast/brightness conditions. These are fundamental aspects for correct authentication and/or identification of PUFs based on BCP nanopatterned substrates in real-world scenarios.
Binary code matrices encoding of artificial fingerprints
These artificial fingerprints can be considered as PUF where the nanopattern represents the unique response r when the surface is scanned with a focused beam of electrons representing the input challenge c. In this context, the uniqueness of the PUF response r = f(c) is guaranteed by the intrinsic randomness of the self-assembly process of pattern formation, thereby relying on the internal and uncontrollable manufacturing variability of the system to establish the unique input/output relation f(∙). Note that the unique response of the PUF pattern can be probed also through other imaging techniques, such as atomic probe microscopy (AFM).
A first approach to exploit nanopatterns as physical unclonable functions is to generate a cryptographic binary code response of the system based on local features of nanoscale morphologies, as similarly reported in previous works.20,39 In case of BCP templated patterns, the nano fingerprint feature can be converted to a binary code matrix by defining each pixel of the matrix as 1-bit or 0-bit depending on the presence or absence of minutiae in the corresponding spatial location, respectively, as reported in Fig. 3a. In other words, the binary code map can be built based on the defect map (in this case defects of the positive phase were considered). This allows the realization of the corresponding binary code matrix reported in Fig. 3b. Here, we show that the selection of the code matrix pixel size cannot be arbitrary but should be based on morphological characteristics of the pattern. Indeed, given a pattern area, the pixel size should be selected to maximize the randomness and uniqueness of encoded binary matrices. Figure 3c reports the bit uniformity and fractional hamming distance (HD) (i.e., the percentage of bits that differs between two binary code matrices) between different binary code matrices as a function of the pixel size calculated by considering 200 different nanopattern micrographs (area of 2.38 × 2.38 µm2). As can be observed, the mean value of fractional HD of around 0.5 (meaning that code matrices are different and distinguishable) is achieved in correspondence of a pixel size of 238 nm when a bit uniformity of around 0.5 can be observed (i.e., when different binary code matrices have almost equal numbers of 0 and 1) (the relationship between fractional HD in between patterns and bit uniformity of patterns is reported in Fig. 3d). This is because bit uniformity is beneficial to achieve the maximum randomness,12 as testified by the maximum pattern entropy approaching the ideal value of 1 when bit uniformity is close to 0.5 (Fig. 3e, fractional HD between different code matrices as a function of the entropy of patterns in Supplementary Figure S5). It is noteworthy that, a bit uniformity (and fractional HD) of 0.5 can be observed when the pixel size approximately coincides with the correlation length of BCP patterns (ξ = 207 ± 18 nm, details in Methods). It turns out that through appropriate selection of the pixel size of the binary code matrix (in this case 238 nm), it is possible to obtain binary code matrices with bit uniformity close to the ideal value of 0.5 (in this case 0.52 ± 0.06) (Fig. 3f, Supplementary Figure S6), with unit entropy close to the ideal value of 1 (Supplementary Figure S7), and to achieve a distribution of fractional HD between different binary code matrices with mean value of 0.50 ± 0.06 (Fig. 3g, fractional HD for each couple of binary code matrices in Fig. 3h). These results confirm the high randomness of the binarized code matrix obtained from local nanopattern features. In this context, the encoding capacity of the system cp, defined as the number of possible responses exhibited by a random pattern where c is the number of responses for each pixel while p is the image area in pixels, is inherently related to the morphological properties of the nanopattern. The encoding capacity of the system can be therefore improved through two strategies: i) by increasing the image area (i.e., increasing the number of pixels without changing the pixel size) and/or ii) by reducing the pixel size of the binarized code matrices while maintaining bit uniformity and fractional inter-HD of ~ 0.5. Concerning the first strategy, Fig. 3i reports the maximum encoding capacity of binary code matrices (c = 2) as a function of the image area (by considering the selected pixel size of 238 nm). Interestingly, an encoding capacity of the same order of magnitude of the world population can be achieved by considering an image with area below 2 µm2, while an encoding capacity larger than the number of atoms in the known universe is achievable by considering an image area larger than 12 µm2, showing the high density of encoding capacity of the system. Concerning the second strategy that aims to increase the encoding capacity of the system for unit area, it can be achieved by proper selection of molecular weight of involved polymers and processing conditions to increase the defect density while reducing the correlation length of the system40 (examples in Supplementary Figure S8). The authentication protocols based on cryptographic codes obtained from fingerprint patterns PUFs can be further refined by considering not only the presence of defects in the pixel area but also defect density (Supplementary Figure S9) and/or defect types (Fig. 3j, additional examples in Supplementary Figure S10).
Authentication/identification in real-world scenarios through computer vision concepts
The comparison of a binarized code matrix with a database code matrix, as required for authentication/identification, implies no misalignment of the image acquired by the end user with the corresponding image stored in the database. Even small translations, rotations and/or deformations of the end user image can cause incorrect authentication/identification due to a different conversion of the fingerprint pattern to the binary code matrix. Indeed, these transformations can cause bit flips in the related binary code matrix due to the different spatial localization of defects (Supplementary Figure S11). Here, we show that the robustness of the authentication/process in real-world scenarios can be enhanced by exploiting matching algorithms based on computer vision concepts, without the need of extracting a binary code matrix from the nanopattern. For this purpose, we synthesized 100 different PUF nanopatterns engraved on a SiO2 substrate, and we built a database consisting of micrograph images of the corresponding fingerprint patterns acquired by a first scan (details in Methods, Supplementary Figure S12). To obtain a set of images used for testing (test set), in a second scan we collected micrographs of the same PUF patterns. Authentication/identification were tested by comparing an image from the test set with a database image from the database, where the genuine nanopattern is obtained through the fingerprint enhancement algorithm discussed before. Noteworthy, the obtained binarized lamellar patterns inherently endow bit uniformity close to 0.5 (0.496 ± 0.008) and unit entropy close to 1 (values evaluated on the database set of images, details in Supplementary Figure S13). For a given pair of previously binarized images, which we will refer to as database and test image, respectively, we aim at determining whether they represent the same nanopattern. As expected in real-world scenarios, slight shifts, rotations, and different magnifications are present between the database and the test set image of the same nanopattern. Given a database/test pair of images, a set of matching key points between the two images are computed through a Scale-Invariant Feature Transform (SIFT) algorithm (other methods such as Speeded Up Robust Feature, SURF, algorithm and Oriented FAST and Rotated BRIEF, ORB, were tested and give similar results) and a FLANN (Fast Library for Approximate Nearest Neighbors)-based matcher. Then we select a few points providing the best matches (we tested between 10–15, not significantly affecting the results), and use those as a guide to build a homography transformation to map the test image on top of the database one. Examples of feature matching and overlapping of images by considering two images of the same nanopattern (example of successful matching) and on two images of different nanopatterns (example of non-successful matching) are reported in Fig. 4a and b, respectively. If the two images are taken from the same nanopattern and thus only differ by slight deformations (e.g., rotation, shift, etc.), the homographic transformation automatically corrects for these effects, so that the resulting image should overlap with the database one, as can be evaluated by superimposing the test image on the top of the database image through the XOR operation (Fig. 4a, Supplementary Figure S14). On the other hand, if the two images are from unrelated samples, the transformation obtained from the matching algorithm will be unable to return an image with a reasonable overlap with the database (Fig. 4b, Supplementary Fig. 15). The quantification of the superposition is performed by considering the fractional HD calculated on the whole binary image obtained by superimposing the test image on top of the database image through XOR operation (details of the matching algorithm in Methods). Figure 4c reports the fractional HD matrix obtained by comparing images from the test set with the database. As can be observed, HD values closer to 0 can be observed while comparing images of the same PUF (i.e., the test image has a small number of bit values that differs from the database one after the homographic transformation), while HD values of approximately 0.5 can be observed while comparing images of different PUFs. A clear separation of intra and fractional inter-HD distributions can be observed in Fig. 4f, further showing the robustness of the authentication/identification protocol (mean values and std. dev. of inter and intra-HD distributions are 0.14 ± 0.01 and 0.500 ± 0.003, respectively). Here, a HD-based decision threshold of 0.45 can be identified (Supplementary Figure S16). It is worth noticing that the extraction of the binarized fingerprint pattern from the micrograph image through the fingerprint enhancement algorithm provides noise robustness to the authentication process, a crucial aspect for exploiting image based PUFs for real-world applications. In this context, clear separation of fractional intra and inter-HD distributions can be observed also by considering a test set of images acquired by different users operating with different equipment (details in Methods, Supplementary Figure S17 and Supplementary Figure S18), further corroborating the robustness of the authentication/identification protocol.
An analysis of the stability shows that PUFs can be correctly authenticated/identified even after 6 months when the sample was left in normal ambient conditions (Fig. 4d and g), revealing long-term reliable operation. Furthermore, the high thermal stability of PUFs was demonstrated by exposing samples to the harsh conditions of 200°C for 30 minutes, where the PUF also experienced a high heating rate of ~ 15°C s–1 and a high cooling rate of ~ 0.8°C s–1. Fractional intra and inter-HD distributions after thermal treatment still show clear separation (Fig. 4e and h). Details on intra and fractional inter-HD mean values and standard deviations evaluated for each test are reported in Supplementary Table 1. In all these cases, successful authentication/identification of all PUF patterns without any false positive or false negative have been achieved by exploiting the decision threshold of 0.45 previously evaluated through the comparison of the test set of images with the database.