BreathSign: Transparent and Continuous In-ear Authentication Using Bone-conducted Breathing Biometrics.

INFOCOM(2023)

引用 0|浏览6
暂无评分
摘要
As one of the most natural physiological activities, breathing provides an effective and ubiquitous approach for continuous authentication. Inspired by that, this paper presents BreathSign, which reveals a novel biometric characteristic using bone-conducted human breathing sound and provides an anti-spoofing and transparent authentication mechanism based on inward-facing microphones on commercial earphones. To explore the breathing differences among persons, we first analyze how the breathing sound propagates in the body, and then derive unique body physics-level features from breathing-induced body sounds. Furthermore, to eliminate the impact of behavioral biometrics, we design a triple network model to reconstruct breathing behavior-independent features. Extensive experiments with 20 subjects over a period have been conducted to evaluate the accuracy, robustness, and vulnerability of BreathSign. The results show that our system accurately authenticates users with an average authentication accuracy rate of 95.17% via only one breathing cycle, and effectively defends against various spoofing attacks with an average spoofing attack detection rate of 98.25%. Compared with other continuous authentication solutions, BreathSign extracts hard-to-forge biometrics in the effortless human breathing activity for authentication and can be easily implemented on commercial earphones with high usability and enhanced security.
更多
查看译文
关键词
anti-spoofing,average authentication accuracy rate,average spoofing attack detection rate,behavioral biometrics,biometric characteristic,body physics-level features,bone-conducted human breathing sound,breathing behavior-independent features,breathing biometrics,breathing cycle,breathing differences,breathing sound,breathing-induced body sounds,BreathSign,commercial earphones,continuous authentication solutions,effortless human breathing activity,natural physiological activities,spoofing attacks,transparent authentication mechanism,triple network model
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要