Abstract
Reliable and transparent user authentication on sensor-rich devices, such as wearables, is a topical task today. Of special interest are methods based on bioacoustic signals processing, such as on-body active and passive acoustic sensing. These methods are attractive due to the relatively small aging effect of the captured bioacoustic signals and low battery consumption. This makes them promising candidates for on-device user authentication.
Most recent researches in bioacoustic user authentication are aimed at active acoustic sensing. Practical usage of such methods requires adding of an additional electro acoustic transducer to wearables which is inappropriate for already commercialized devices. Methods of passive acoustic sensing allow for overcoming these limitations by capturing bioacoustic signals produced during person’s movements, for example wrist rotations. However, practical application of these methods requires usage of microphones with high sensitivity for capturing of weak acoustic signals. To overcome this limitation we suggest to perform passive sensing near the place with multiple joints, such as cervical vertebrae.
The results of performance analysis proved effectiveness of proposed solutions, namely decreasing of False Rejection Rate (FRR) errors up to ten times in comparison with state-of-the-art solutions while preserving low False Acceptance Rate (FAR) values. Achieved values FAR \(=0.12\%\) and FAR \(=3.00\%\) for proposed solution conforms to the requirements for Secondary Tier of Android OS Tiered Authentication Model that makes the solution an attractive candidate for user authentication on the next-generation wearable devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
BehavioSec: Supercharge your Multi-factor authentication. https://www.behaviosec.com/. Accessed 24 Mar 2022
BioCatch: Every Swipe Tells a Story. https://www.biocatch.com/. Accessed 24 Mar 2022
CES 2021: Wearable Device with Biometric Authentication. https://www.eetimes.eu/ces-2021-wearable-device-with-biometric-authentication/. Accessed 02 Mar 2021
Digital Fingerprints: T’s Not What You Do It’s The Way You Do It. https://fingerprints.digital/. Accessed 24 Mar 2022
Flywallet: Keyble Overview. https://www.flywalletpay.com/en/. Accessed 02 Mar 2021
Fortune Business Insights: Mobile Analytics Market Size, Share & Industry Analysis. https://www.fortunebusinessinsights.com/mobile-analytics-market-104824. Accessed 29 Mar 2022
NeuroRehab Coach: Anatomy of the Neck. https://www.neurorehabcoach.com/neck-pain. Accessed 24 Mar 2022
Nymi: Product Overview. https://www.nymi.com/product. Accessed 04 Dec 2020
The Insight Partners: Mobile Analytics Market Forecast to 2028. https://www.theinsightpartners.com/reports/mobile-analytics-market. Accessed 29 Mar 2022
Asakura, T., Iida, S.: Hand gesture recognition by using bioacoustic responses. Acoust. Sci. Technol. 41, 521–524 (2020). https://doi.org/10.1250/ast.41.521. https://www.jstage.jst.go.jp/article/ast/41/2/41_E1949/_pdf/-char/en
Chauhan, J., Hu, Y., Seneviratne, S., Misra, A., Seneviratne, A., Lee, Y.: Breathprint: breathing acoustics-based user authentication. In: MobiSys 2017: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM (2017). https://doi.org/10.1145/3081333.3081355
Chollet, F.: Xception: Deep Learning with Depthwise Separable Convolutions. https://doi.org/10.48550/arXiv.1610.02357. https://arxiv.org/abs/1610.02357. Accessed 28 Mar 2022
Errico, C., et al.: Ultrafast ultrasound localization microscopy for deep super-resolution vascular imaging. Nature 527, 499–502 (2015). https://doi.org/10.1038/nature16066. https://www.nature.com/articles/nature16066#citeas
Goodwin, A.: B-Secur HeartKey tech unlocks your car with unique rhythm of your heartbeat. https://www.cnet.com/roadshow/news/b-secur-ekg-heartkey-tech-unlocks-car-with-heartbeat/. Accessed 04 Dec 2020
Google: Lockscreen and authentication improvements in android 11 (2020). https://android-developers.googleblog.com/2020/09/lockscreen-and-authentication.html
He, K., Zhang, X., Ren, S., Sun, J.: Deep Residual Learning for Image Recognition. https://doi.org/10.48550/arXiv.1512.03385. https://arxiv.org/abs/1512.03385. Accessed 28 Mar 2022
Howard, A.G., et al.: MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. https://doi.org/10.48550/arXiv.1704.04861. https://arxiv.org/abs/1704.04861. Accessed 28 Mar 2022
Huang, G., Liu, Z., van der Maaten, L., Weinberger, K.Q.: Densely Connected Convolutional Networks. https://doi.org/10.48550/arXiv.1608.06993. https://arxiv.org/abs/1608.06993. Accessed 28 Mar 2022
Lee, S., Choi, W., Lee, D.H.: Usable user authentication on a smartwatch using vibration. In: ACM SIGSAC Conference on Computer and Communications Security. ACM (2021)
Li, J., Fawaz, K., Kim, Y.: Velody: nonlinear vibration challenge-response for resilient user authentication. In: SIGSAC Conference on Computer and Communications Security. ACM (2019). https://doi.org/10.1145/3319535.3354242
Lu, F.Y., Husske, L., Roesler, A.: WristConduct: biometric user authentication using bone conduction at the wrist. In: Proceedings of ACM Measurement and Analysis of Computing Systems. ACM (2022)
Marieb, E., Hoehn, K.: Human Anatomy & Physiology, 11th edn. Pearson, London (2018)
Meier, M., Streli, P., Fender, A., Holz, C.: Tapid: rapid touch interaction in virtual reality using wearable sensing. In: Virtual Reality and 3D User Interfaces (VR). IEEE (2021). https://doi.org/10.1109/VR50410.2021.00076
Oppenheim, A.V., Schafer, R.W.: Discrete-Time Signal Processing. Pearson, London (2009)
Progonov, D., Sokol, O.: Heartbeat-based authentication on smartwatches in various usage contexts. In: Saracino, A., Mori, P. (eds.) ETAA 2021. LNCS, vol. 13136, pp. 33–49. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-93747-8_3
Sim, J.Y., Noh, H.W., Goo, W., Kim, N., Chae, S.H., Ahn, C.G.: Identity recognition based on bioacoustics of human body. Trans. Cybern. 51, 2761–2772 (2021). https://doi.org/10.1109/TCYB.2019.2941281. https://ieeexplore.ieee.org/document/8859636
Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the Inception Architecture for Computer Vision. https://doi.org/10.48550/arXiv.1512.00567. https://arxiv.org/abs/1512.00567. Accessed 28 Mar 2022
Takahashi, N., Goswam, N., Mitsufuji, Y.: MMDenseLSTM: an efficient combination of convolutional and recurrent neural networks for audio source separation. In: Saracino, A., Mori, P. (eds.) 16th International Workshop on Acoustic Signal Enhancement (IWAENC), Tokyo. IEEE (2018). https://doi.org/10.1109/IWAENC.2018.8521383
Tan, M., Le, Q.V.: EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks. https://doi.org/10.48550/arXiv.1905.11946. https://arxiv.org/abs/1905.11946. Accessed 28 Mar 2022
Tanveer, M.H., Zhu, H., Ahmed, W., Thomas, A., Imran, B.M., Salman, M.: Mel-spectrogram and deep CNN based representation learning from bio-sonar implementation on UAVs. In: International Conference on Computer, Control and Robotics. IEEE (2021). https://doi.org/10.1109/ICCCR49711
Watanabe, H., Kakizawa, H., Sugimoto, M.: User authentication method using active acoustic sensing. J. Inf. Process. 29, 370–379 (2021). https://doi.org/10.2197/ipsjjip.29.370. https://www.jstage.jst.go.jp/article/ipsjjip/29/0/29_370/_pdf/-char/ja
Zoph, B., Vasudevan, V., Shlens, J., Le, Q.V.: Learning Transferable Architectures for Scalable Image Recognition. https://doi.org/10.48550/arXiv.1707.07012. https://arxiv.org/abs/1707.07012. Accessed 28 Mar 2022
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 Springer Nature Switzerland AG
About this paper
Cite this paper
Progonov, D., Naumenko, H., Sokol, O., Derkach, V. (2023). User Authentication on Headset-Like Devices by Bioacoustic Signals. In: Saracino, A., Mori, P. (eds) Emerging Technologies for Authorization and Authentication. ETAA 2022. Lecture Notes in Computer Science, vol 13782. Springer, Cham. https://doi.org/10.1007/978-3-031-25467-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-25467-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25466-6
Online ISBN: 978-3-031-25467-3
eBook Packages: Computer ScienceComputer Science (R0)