User authentication system based on human exhaled breath physics
- URL: http://arxiv.org/abs/2401.02447v1
- Date: Tue, 2 Jan 2024 19:36:13 GMT
- Title: User authentication system based on human exhaled breath physics
- Authors: Mukesh Karunanethy, Rahul Tripathi, Mahesh V Panchagnula and
Raghunathan Rengaswamy
- Abstract summary: This work attempts to build a biometric system that works purely based on the fluid mechanics governing exhaled breath.
We test the hypothesis that the structure of turbulence in exhaled human breath can be exploited to build biometric algorithms.
- Score: 0.21847754147782888
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This work, in a pioneering approach, attempts to build a biometric system
that works purely based on the fluid mechanics governing exhaled breath. We
test the hypothesis that the structure of turbulence in exhaled human breath
can be exploited to build biometric algorithms. This work relies on the idea
that the extrathoracic airway is unique for every individual, making the
exhaled breath a biomarker. Methods including classical multi-dimensional
hypothesis testing approach and machine learning models are employed in
building user authentication algorithms, namely user confirmation and user
identification. A user confirmation algorithm tries to verify whether a user is
the person they claim to be. A user identification algorithm tries to identify
a user's identity with no prior information available. A dataset of exhaled
breath time series samples from 94 human subjects was used to evaluate the
performance of these algorithms. The user confirmation algorithms performed
exceedingly well for the given dataset with over $97\%$ true confirmation rate.
The machine learning based algorithm achieved a good true confirmation rate,
reiterating our understanding of why machine learning based algorithms
typically outperform classical hypothesis test based algorithms. The user
identification algorithm performs reasonably well with the provided dataset
with over $50\%$ of the users identified as being within two possible suspects.
We show surprisingly unique turbulent signatures in the exhaled breath that
have not been discovered before. In addition to discussions on a novel
biometric system, we make arguments to utilise this idea as a tool to gain
insights into the morphometric variation of extrathoracic airway across
individuals. Such tools are expected to have future potential in the area of
personalised medicines.
Related papers
- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication [3.5860522669070454]
We propose BlowPrint, a novel behavioral biometric technique that allows us to authenticate users based on their phone blowing behaviors.<n>In this work, we assume that the way users blow on a phone screen can produce distinctive acoustic patterns, which can serve as a unique biometric identifier.<n>To assess BlowPrint's effectiveness, we conduct an empirical study involving 50 participants from whom we collect blow-acoustic and facial feature data.
arXiv Detail & Related papers (2025-07-05T18:40:32Z) - Biometrics Employing Neural Network [0.0]
Fingerprints, iris and retina patterns, facial recognition, hand shapes, palm prints, and voice recognition are frequently used forms of biometrics.
For systems to be effective and widely accepted, the error rate in recognition and verification must approach zero.
Artificial Neural Networks, which simulate the human brain's operations, present themselves as a promising approach.
arXiv Detail & Related papers (2024-02-01T03:59:04Z) - User Strategization and Trustworthy Algorithms [81.82279667028423]
We show that user strategization can actually help platforms in the short term.
We then show that it corrupts platforms' data and ultimately hurts their ability to make counterfactual decisions.
arXiv Detail & Related papers (2023-12-29T16:09:42Z) - Unleashing Mask: Explore the Intrinsic Out-of-Distribution Detection
Capability [70.72426887518517]
Out-of-distribution (OOD) detection is an indispensable aspect of secure AI when deploying machine learning models in real-world applications.
We propose a novel method, Unleashing Mask, which aims to restore the OOD discriminative capabilities of the well-trained model with ID data.
Our method utilizes a mask to figure out the memorized atypical samples, and then finetune the model or prune it with the introduced mask to forget them.
arXiv Detail & Related papers (2023-06-06T14:23:34Z) - Multi-Channel Time-Series Person and Soft-Biometric Identification [65.83256210066787]
This work investigates person and soft-biometrics identification from recordings of humans performing different activities using deep architectures.
We evaluate the method on four datasets of multi-channel time-series human activity recognition (HAR)
Soft-biometric based attribute representation shows promising results and emphasis the necessity of larger datasets.
arXiv Detail & Related papers (2023-04-04T07:24:51Z) - Facial Soft Biometrics for Recognition in the Wild: Recent Works,
Annotation, and COTS Evaluation [63.05890836038913]
We study the role of soft biometrics to enhance person recognition systems in unconstrained scenarios.
We consider two assumptions: 1) manual estimation of soft biometrics and 2) automatic estimation from two commercial off-the-shelf systems.
Experiments are carried out fusing soft biometrics with two state-of-the-art face recognition systems based on deep learning.
arXiv Detail & Related papers (2022-10-24T11:29:57Z) - Evaluation of a User Authentication Schema Using Behavioral Biometrics
and Machine Learning [0.0]
This study contributes to the research being done on behavioral biometrics by creating and evaluating a user authentication scheme using behavioral biometrics.
The behavioral biometrics used in this study include touch dynamics and phone movement.
We evaluate the performance of different single-modal and multi-modal combinations of the two biometrics.
arXiv Detail & Related papers (2022-05-07T05:16:34Z) - Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal
Biometric Fusion Algorithms [58.156733807470395]
This paper reports a benchmarking study carried out within the framework of the BioSecure DS2 (Access Control) evaluation campaign.
The campaign targeted the application of physical access control in a medium-size establishment with some 500 persons.
To the best of our knowledge, this is the first attempt to benchmark quality-based multimodal fusion algorithms.
arXiv Detail & Related papers (2021-11-17T13:39:48Z) - Data-driven behavioural biometrics for continuous and adaptive user
verification using Smartphone and Smartwatch [0.0]
We propose an algorithm to blend behavioural biometrics with multi-factor authentication (MFA)
This work proposes a two-step user verification algorithm that verifies the user's identity using motion-based biometrics.
arXiv Detail & Related papers (2021-10-07T02:46:21Z) - Spotting adversarial samples for speaker verification by neural vocoders [102.1486475058963]
We adopt neural vocoders to spot adversarial samples for automatic speaker verification (ASV)
We find that the difference between the ASV scores for the original and re-synthesize audio is a good indicator for discrimination between genuine and adversarial samples.
Our codes will be made open-source for future works to do comparison.
arXiv Detail & Related papers (2021-07-01T08:58:16Z) - End-to-end User Recognition using Touchscreen Biometrics [11.394909061094463]
The goal was to create an end-to-end system that can transparently identify users using raw data from mobile devices.
In the proposed system data from the touchscreen goes directly to the input of a deep neural network, which is able to decide on the identity of the user.
arXiv Detail & Related papers (2020-06-09T16:38:09Z) - Demographic Bias: A Challenge for Fingervein Recognition Systems? [0.0]
Concerns regarding potential biases in the underlying algorithms of many automated systems (including biometrics) have been raised.
A biased algorithm produces statistically different outcomes for different groups of individuals based on certain (often protected by anti-discrimination legislation) attributes such as sex and age.
In this paper, several popular types of recognition algorithms are benchmarked to ascertain the matter for fingervein recognition.
arXiv Detail & Related papers (2020-04-03T07:53:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.