University of Connecticut Automated Counterfeit IC Physical Defect Characterization Team 176 Wesley Stevens Dan Guerrera Ryan Nesbit Advisors: Professor.

Slides:



Advertisements
Similar presentations
By: Mani Baghaei Fard.  During recent years number of moving vehicles in roads and highways has been considerably increased.
Advertisements

QR Code Recognition Based On Image Processing
Content-Based Image Retrieval
MatchIT Color Inspection System Copyright 2003 – 2006 Vision Machines Inc.
TEMPLATE DESIGN © TEMPLATE 2013 by Jifeng Chen Center for Hardware Assurance, Security, and Engineering University.
INTRODUCTION ABOUT OMR. INDEX  Concept/Definition  Form Design  Scanners & Software  Storage  Accuracy  OMR Advantages  Commercial Suppliers.
Face Recognition Method of OpenCV
Project Closure Report Basker George. Project Closure When does a project end? Does it end when the software has been delivered to customer & acceptance-tested?
Ping Gallivan Xiang Gao Eric Heinen Akarsh Sakalaspur Automated Coin Grader.
Jon Schendt University of Wisconsin-Platteville Image Processing – A Computational Approach.
Virtual Dart: An Augmented Reality Game on Mobile Device Supervisor: Professor Michael R. Lyu Prepared by: Lai Chung Sum Siu Ho Tung.
Image Search Presented by: Samantha Mahindrakar Diti Gandhi.
Processing Digital Images. Filtering Analysis –Recognition Transmission.
Mathematics in Everyday Life Gilad Lerman Department of Mathematics University of Minnesota Highland park elementary (6 th graders)
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
Automatic 2D-3D Registration Student: Lingyun Liu Advisor: Prof. Ioannis Stamos.
1 Information Retrieval and Extraction 資訊檢索與擷取 Chia-Hui Chang, Assistant Professor Dept. of Computer Science & Information Engineering National Central.
Traffic Sign Recognition Jacob Carlson Sean St. Onge Advisor: Dr. Thomas L. Stewart.
REALTIME OBJECT-OF-INTEREST TRACKING BY LEARNING COMPOSITE PATCH-BASED TEMPLATES Yuanlu Xu, Hongfei Zhou, Qing Wang*, Liang Lin Sun Yat-sen University,
What Is Machine Vision? PreviousNext X. What Is Machine Vision? Formal definition: Machine vision is the use of devices for optical non- contact sensing.
Facial Recognition CSE 391 Kris Lord.
Introduction to Machine Vision Systems
MITRE Corporation is a federally-funded research-and- development corporation that has developed their own facial recognition system, known as MITRE Matcher.
Presented by: Kamakhaya Argulewar Guided by: Prof. Shweta V. Jain
Image Pattern Recognition The identification of animal species through the classification of hair patterns using image pattern recognition: A case study.
1 Template-Based Classification Method for Chinese Character Recognition Presenter: Tienwei Tsai Department of Informaiton Management, Chihlee Institute.
Efficient Editing of Aged Object Textures By: Olivier Clément Jocelyn Benoit Eric Paquette Multimedia Lab.
Mining Discriminative Components With Low-Rank and Sparsity Constraints for Face Recognition Qiang Zhang, Baoxin Li Computer Science and Engineering Arizona.
Automatic Registration of Color Images to 3D Geometry Computer Graphics International 2009 Yunzhen Li and Kok-Lim Low School of Computing National University.
University of Connecticut Automated IC Defect Characterization Wesley Stevens Dan Guerrera Ryan Nesbit Professor Mohammad Tehranipoor Electrical and Computer.
CSCE 5013 Computer Vision Fall 2011 Prof. John Gauch
Scatterfield Zero Order Imaging
Compiled By: Raj G Tiwari.  A pattern is an object, process or event that can be given a name.  A pattern class (or category) is a set of patterns sharing.
University of Connecticut Virtual Lab Carl DiFederico, Shane Tobey, Kasim Ward Graduate Student Advisor: Qihang Shi Senior Faculty Advisors: Mohammed Tehranipoor.
Obtaining Data for Face Recognition from the web By Tal blum Advisor: Henry Schneiderman.
3M Brand Identity System © 3M All Rights Reserved.
AUTOMATIZATION OF COMPUTED TOMOGRAPHY PATHOLOGY DETECTION Semyon Medvedik Elena Kozakevich.
Visual Inspection Product reliability is of maximum importance in most mass-production facilities.  100% inspection of all parts, subassemblies, and.
Dan Rosenbaum Nir Muchtar Yoav Yosipovich Faculty member : Prof. Daniel LehmannIndustry Representative : Music Genome.
University of Connecticut CDEB Goals Carl DiFederico, Kasim Ward, Shane Tobey Graduate Student Advisor: Qihang Shi Senior Faculty Advisor: Mohammed Tehranipoor.
MACHINE VISION Machine Vision System Components ENT 273 Ms. HEMA C.R. Lecture 1.
University of Connecticut Automated Counterfeit IC Physical Defect Characterization Team 176 Wesley Stevens Dan Guerrera Ryan Nesbit Advisors: Professor.
Bo QIN, Zongshun MA, Zhenghua FANG, Shengke WANG Computer-Aided Design and Computer Graphics, th IEEE International Conference on, p Presenter.
Geodesic Saliency Using Background Priors
Automatic License Plate Location Using Template Matching University of Wisconsin - Madison ECE 533 Image Processing Fall 2004 Project Kerry Widder.
Rick Bassett Automated Coin Grader Dissertation Status Update Last Updated: December 9, 2015.
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
In-Sight 5100 Vision System. What is a Vision System?  Devices that capture and analyze visual information, and are used to automate tasks that require.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
Image features and properties. Image content representation The simplest representation of an image pattern is to list image pixels, one after the other.
1 Review and Summary We have covered a LOT of material, spending more time and more detail on 2D image segmentation and analysis, but hopefully giving.
LSM733-PRODUCTION OPERATIONS MANAGEMENT By: OSMAN BIN SAIF LECTURE 30 1.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Technical Support Seminar Using the Cisco Technical Support Website.
License Plate Recognition of A Vehicle using MATLAB
OCR Reading.
Automated OTMS Raghav Malik.
Submitted by: Ala Berawi Sujod Makhlof Samah Hanani Supervisor:
IC Counterfeit Detection Using Physical Inspection Methods
By Pradeep C.Venkat Srinath Srinivasan
Machine Vision Acquisition of image data, followed by the processing and interpretation of these data by computer for some useful application like inspection,
By: Kevin Yu Ph.D. in Computer Engineering
Face Recognition and Detection Using Eigenfaces
Feature based vs. holistic processing
Scale-Space Representation of 3D Models and Topological Matching
IC Counterfeit Detection Using Physical Inspection Methods
Lawson-Hemphill EST Entanglement Strength Tester.
Cognitive Processes PSY 334
Statistical Process Control
Higher School of Economics , Moscow, 2016
Statistical Process Control
Presentation transcript:

University of Connecticut Automated Counterfeit IC Physical Defect Characterization Team 176 Wesley Stevens Dan Guerrera Ryan Nesbit Advisors: Professor Mohammad Tehranipoor Professor Domenic Forte Electrical and Computer Engineering

All Rights Reserved 2 Summary Automated system for identifying physical defects Analyze various images (Optical, X-Ray, SEM) Return relevant data regarding counterfeit status

All Rights Reserved 3 Background Threat of counterfeit ICs increasing Over 1 million counterfeit ICs found in military supplies Can cause critical failure of systems Leads to loss of life in military and medical applications Current physical defect analysis done manually Need expert to spend time on tests Tests can be destructive Subject to human error

All Rights Reserved 4 Image Capture Several GB of optical and SEM images obtained already Needs to be consistent in terms of lighting as well as distance from lens to chip Image capture of the top, bottom, and sides of the chip Different algorithms can be used for specific parts of chip

All Rights Reserved 5 Project Overview

All Rights Reserved 6 Project Overview Three main steps Acquire images of suspect and/or “golden” ICs Run different algorithms based on image location Algorithms return altered images with highlighted defects Uses images from different locations to find defects Leads/Pins – scratches, bends, corrosion Surface – scratches, discoloration, pattern variation Markings – missing, faded, different location

All Rights Reserved 7 Image Groupings Golden-IC Analysis Take identically positioned images for one golden IC and one suspect IC Use comparison algorithm to determine inconsistencies Self-Reference Analysis Take images from different locations of the package of a suspect IC Use comparison algorithm to determine inconsistencies Group Comparison Analysis Compare data of individual ICs to group average Large variation suggests counterfeit

All Rights Reserved 8 Example Group Comparison

All Rights Reserved 9 Algorithms Binary Transformations Text recognition Ghost markings, extraneous markings Edge detection Feature acquisition and measurement Statistical Analysis Texture comparison Scratches, color variation, different pattern, corrosion, contamination, package damage Feature matching Image alignment

All Rights Reserved 10 Binary Transformations

All Rights Reserved 11 Feature Extraction & Edge Detection One key goal is the ability to recognize defects. This can be achieved through feature extraction. Allows us to look at individual objects. If it is a part of the device we can measure and compare it to other objects If it is not then we can try to identify what it is. Also allows us to delve into text recognition.

All Rights Reserved 12 Statistical Analysis

All Rights Reserved 13 Feature Matching

All Rights Reserved 14 Project Plan Finish algorithms for finding each defect in taxonomy Combine algorithms into one cohesive program Automate algorithm ordering and parameters Refine outputs to give meaningful results for user