Improving the Authentication with Built-in Camera Protocol Using
Built-in Motion Sensors: A Deep Learning Solution
- URL: http://arxiv.org/abs/2107.10536v2
- Date: Fri, 23 Jul 2021 05:26:42 GMT
- Title: Improving the Authentication with Built-in Camera Protocol Using
Built-in Motion Sensors: A Deep Learning Solution
- Authors: Cezara Benegui, Radu Tudor Ionescu
- Abstract summary: We propose an enhanced version of the Authentication with Built-in Camera protocol by employing a deep learning solution based on built-in motion sensors.
The protocol is vulnerable to forgery attacks when the attacker can compute the camera fingerprint from external photos.
In this context, we propose an enhancement for the ABC protocol based on motion sensor data, as an additional and passive authentication layer.
- Score: 16.72680081620203
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: We propose an enhanced version of the Authentication with Built-in Camera
(ABC) protocol by employing a deep learning solution based on built-in motion
sensors. The standard ABC protocol identifies mobile devices based on the
photo-response non-uniformity (PRNU) of the camera sensor, while also
considering QR-code-based meta-information. During authentication, the user is
required to take two photos that contain two QR codes presented on a screen.
The presented QR code images also contain a unique probe signal, similar to a
camera fingerprint, generated by the protocol. During verification, the server
computes the fingerprint of the received photos and authenticates the user if
(i) the probe signal is present, (ii) the metadata embedded in the QR codes is
correct and (iii) the camera fingerprint is identified correctly. However, the
protocol is vulnerable to forgery attacks when the attacker can compute the
camera fingerprint from external photos, as shown in our preliminary work. In
this context, we propose an enhancement for the ABC protocol based on motion
sensor data, as an additional and passive authentication layer. Smartphones can
be identified through their motion sensor data, which, unlike photos, is never
posted by users on social media platforms, thus being more secure than using
photographs alone. To this end, we transform motion signals into embedding
vectors produced by deep neural networks, applying Support Vector Machines for
the smartphone identification task. Our change to the ABC protocol results in a
multi-modal protocol that lowers the false acceptance rate for the attack
proposed in our previous work to a percentage as low as 0.07%.
Related papers
- Region of Interest Loss for Anonymizing Learned Image Compression [3.0936354370614607]
We show how to achieve sufficient anonymization such that human faces become unrecognizable while persons are kept detectable.
This approach enables compression and anonymization in one step on the capture device, instead of transmitting sensitive, nonanonymized data over the network.
arXiv Detail & Related papers (2024-06-09T10:36:06Z) - oBAKE: an Online Biometric-Authenticated Key Exchange Protocol [0.0]
We introduce a novel biometric-authenticated key exchange protocol that allows secure and privacy-preserving key establishment.
The protocol yields a shared secret incorporating random nonce from both parties when they positively authenticate each other.
The protocol is especially suitable for interactive systems while posing a minimal computational burden on the user token.
arXiv Detail & Related papers (2024-04-15T18:02:35Z) - EventTransAct: A video transformer-based framework for Event-camera
based action recognition [52.537021302246664]
Event cameras offer new opportunities compared to standard action recognition in RGB videos.
In this study, we employ a computationally efficient model, namely the video transformer network (VTN), which initially acquires spatial embeddings per event-frame.
In order to better adopt the VTN for the sparse and fine-grained nature of event data, we design Event-Contrastive Loss ($mathcalL_EC$) and event-specific augmentations.
arXiv Detail & Related papers (2023-08-25T23:51:07Z) - Agile gesture recognition for capacitive sensing devices: adapting
on-the-job [55.40855017016652]
We demonstrate a hand gesture recognition system that uses signals from capacitive sensors embedded into the etee hand controller.
The controller generates real-time signals from each of the wearer five fingers.
We use a machine learning technique to analyse the time series signals and identify three features that can represent 5 fingers within 500 ms.
arXiv Detail & Related papers (2023-05-12T17:24:02Z) - Web Photo Source Identification based on Neural Enhanced Camera
Fingerprint [9.606477062236499]
Source camera identification of web photos aims to establish a reliable linkage from the captured images to their source cameras.
This paper presents an innovative and practical source identification framework that employs neural-network enhanced sensor pattern noise.
By incorporating metric learning and frequency consistency into the deep network design, our proposed fingerprint extraction algorithm achieves state-of-the-art performance on modern smartphone photos.
arXiv Detail & Related papers (2023-02-18T04:14:45Z) - PRNU Based Source Camera Identification for Webcam and Smartphone Videos [137.6408511310322]
This communication is about an application of image forensics where we use camera sensor fingerprints to identify source camera (SCI: Source Camera Identification) in webcam/smartphone videos.
arXiv Detail & Related papers (2022-01-27T18:57:14Z) - Privacy-Preserving Image Acquisition Using Trainable Optical Kernel [50.1239616836174]
We propose a trainable image acquisition method that removes the sensitive identity revealing information in the optical domain before it reaches the image sensor.
As the sensitive content is suppressed before it reaches the image sensor, it does not enter the digital domain therefore is unretrievable by any sort of privacy attack.
arXiv Detail & Related papers (2021-06-28T11:08:14Z) - D-Unet: A Dual-encoder U-Net for Image Splicing Forgery Detection and
Localization [108.8592577019391]
Image splicing forgery detection is a global binary classification task that distinguishes the tampered and non-tampered regions by image fingerprints.
We propose a novel network called dual-encoder U-Net (D-Unet) for image splicing forgery detection, which employs an unfixed encoder and a fixed encoder.
In an experimental comparison study of D-Unet and state-of-the-art methods, D-Unet outperformed the other methods in image-level and pixel-level detection.
arXiv Detail & Related papers (2020-12-03T10:54:02Z) - Smartphone Camera De-identification while Preserving Biometric Utility [13.164846772893455]
Photo Response Non Uniformity (PRNU) is often exploited to deduce the identity of the smartphone device whose camera or sensor was used to acquire a certain image.
In this work, we design an algorithm that perturbs a face image acquired using a smartphone camera such that (a) sensor-specific details pertaining to the smartphone camera are suppressed (sensor anonymization); (b) the sensor pattern of a different device is incorporated (sensor spoofing); and (c) biometric matching using the perturbed image is not affected (biometric utility).
Experiments conducted on the MICHE-I and OULU-NPU datasets
arXiv Detail & Related papers (2020-09-17T19:48:43Z) - Real-Time Detectors for Digital and Physical Adversarial Inputs to
Perception Systems [11.752184033538636]
Deep neural network (DNN) models have proven to be vulnerable to adversarial digital and physical attacks.
We propose a novel attack- and dataset-agnostic and real-time detector for both types of adversarial inputs to DNN-based perception systems.
In particular, the proposed detector relies on the observation that adversarial images are sensitive to certain label-invariant transformations.
arXiv Detail & Related papers (2020-02-23T00:03:57Z) - Towards Precise Intra-camera Supervised Person Re-identification [54.86892428155225]
Intra-camera supervision (ICS) for person re-identification (Re-ID) assumes that identity labels are independently annotated within each camera view.
Lack of inter-camera labels makes the ICS Re-ID problem much more challenging than the fully supervised counterpart.
Our approach performs even comparable to state-of-the-art fully supervised methods in two of the datasets.
arXiv Detail & Related papers (2020-02-12T11:56:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.