Continuous Authentication of Wearable Device Users from Heart Rate,
Gait, and Breathing Data
- URL: http://arxiv.org/abs/2008.10779v1
- Date: Tue, 25 Aug 2020 01:55:07 GMT
- Title: Continuous Authentication of Wearable Device Users from Heart Rate,
Gait, and Breathing Data
- Authors: William Cheung and Sudip Vhaduri
- Abstract summary: Security of private information is becoming the bedrock of an increasingly digitized society.
Recent biometric-based authentication methods, such as facial or finger recognition, are getting popular due to their higher accuracy.
We present a context-dependent soft-biometric-based authentication system for wearables devices using heart rate, gait, and breathing audio signals.
- Score: 1.827510863075184
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The security of private information is becoming the bedrock of an
increasingly digitized society. While the users are flooded with passwords and
PINs, these gold-standard explicit authentications are becoming less popular
and valuable. Recent biometric-based authentication methods, such as facial or
finger recognition, are getting popular due to their higher accuracy. However,
these hard-biometric-based systems require dedicated devices with powerful
sensors and authentication models, which are often limited to most of the
market wearables. Still, market wearables are collecting various private
information of a user and are becoming an integral part of life: accessing
cars, bank accounts, etc. Therefore, time demands a burden-free implicit
authentication mechanism for wearables using the less-informative
soft-biometric data that are easily obtainable from modern market wearables. In
this work, we present a context-dependent soft-biometric-based authentication
system for wearables devices using heart rate, gait, and breathing audio
signals. From our detailed analysis using the "leave-one-out" validation, we
find that a lighter $k$-Nearest Neighbor ($k$-NN) model with $k = 2$ can obtain
an average accuracy of $0.93 \pm 0.06$, $F_1$ score $0.93 \pm 0.03$, and {\em
false positive rate} (FPR) below $0.08$ at 50\% level of confidence, which
shows the promise of this work.
Related papers
- SqueezerFaceNet: Reducing a Small Face Recognition CNN Even More Via
Filter Pruning [55.84746218227712]
We develop SqueezerFaceNet, a light face recognition network which less than 1M parameters.
We show that it can be further reduced (up to 40%) without an appreciable loss in performance.
arXiv Detail & Related papers (2023-07-20T08:38:50Z) - Improving the Security of Smartwatch Payment with Deep Learning [0.0]
This dissertation investigates whether applications of deep learning can reduce the number of gestures a user must provide to enrol into an authentication system for smartwatch payment.
We firstly construct a deep-learned authentication system that outperforms the current state-of-the-art.
We then develop a regularised autoencoder model for generating synthetic user-specific gestures.
arXiv Detail & Related papers (2023-07-11T17:02:21Z) - Face Presentation Attack Detection [59.05779913403134]
Face recognition technology has been widely used in daily interactive applications such as checking-in and mobile payment.
However, its vulnerability to presentation attacks (PAs) limits its reliable use in ultra-secure applicational scenarios.
arXiv Detail & Related papers (2022-12-07T14:51:17Z) - Facial Soft Biometrics for Recognition in the Wild: Recent Works,
Annotation, and COTS Evaluation [63.05890836038913]
We study the role of soft biometrics to enhance person recognition systems in unconstrained scenarios.
We consider two assumptions: 1) manual estimation of soft biometrics and 2) automatic estimation from two commercial off-the-shelf systems.
Experiments are carried out fusing soft biometrics with two state-of-the-art face recognition systems based on deep learning.
arXiv Detail & Related papers (2022-10-24T11:29:57Z) - Locally Authenticated Privacy-preserving Voice Input [10.82818142802482]
Service providers must authenticate their users, although individuals may wish to maintain privacy.
Preserving privacy while performing authentication is challenging, particularly where adversaries can use biometric data to train transformation tools.
We introduce a secure, flexible privacy-preserving system to capture and store an on-device fingerprint of the users' raw signals.
arXiv Detail & Related papers (2022-05-27T14:56:01Z) - Mobile Behavioral Biometrics for Passive Authentication [65.94403066225384]
This work carries out a comparative analysis of unimodal and multimodal behavioral biometric traits.
Experiments are performed over HuMIdb, one of the largest and most comprehensive freely available mobile user interaction databases.
In our experiments, the most discriminative background sensor is the magnetometer, whereas among touch tasks the best results are achieved with keystroke.
arXiv Detail & Related papers (2022-03-14T17:05:59Z) - Opportunistic Implicit User Authentication for Health-Tracking IoT
Wearables [1.8352113484137629]
We explore the usefulness of blood oxygen saturation SpO2 values collected from the Oximeter device to distinguish a user from others.
From a cohort of 25 subjects, we find that 92% of the cases SpO2 can distinguish pairs of users.
These results show promise in using SpO2 along with other biometrics to develop implicit continuous authentications for wearables.
arXiv Detail & Related papers (2021-09-28T13:18:36Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - Multimodal Personal Ear Authentication Using Smartphones [0.0]
fingerprint authentication cannot be used when hands are wet, and face recognition cannot be used when a person is wearing a mask.
We examine a personal authentication system using the pinna as a new approach for biometric authentication on smartphones.
arXiv Detail & Related papers (2021-03-23T14:19:15Z) - Responsible Disclosure of Generative Models Using Scalable
Fingerprinting [70.81987741132451]
Deep generative models have achieved a qualitatively new level of performance.
There are concerns on how this technology can be misused to spoof sensors, generate deep fakes, and enable misinformation at scale.
Our work enables a responsible disclosure of such state-of-the-art generative models, that allows researchers and companies to fingerprint their models.
arXiv Detail & Related papers (2020-12-16T03:51:54Z) - Context-Dependent Implicit Authentication for Wearable Device User [1.827510863075184]
We present a context-dependent soft-biometric-based wearable authentication system utilizing the heart rate, gait, and breathing audio signals.
From our detailed analysis, we find that a binary support vector machine (SVM) with radial basis function (RBF) kernel can achieve an average accuracy of 92.84%.
arXiv Detail & Related papers (2020-08-25T04:34:19Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.