Who's Wearing? Ear Canal Biometric Key Extraction for User Authentication on Wireless Earbuds
- URL: http://arxiv.org/abs/2510.02563v1
- Date: Thu, 02 Oct 2025 20:59:03 GMT
- Title: Who's Wearing? Ear Canal Biometric Key Extraction for User Authentication on Wireless Earbuds
- Authors: Chenpei Huang, Lingfeng Yao, Hui Zhong, Kyu In Lee, Lan Zhang, Xiaoyong Yuan, Tomoaki Ohtsuki, Miao Pan,
- Abstract summary: Ear canal scanning/sensing (ECS) has emerged as a novel biometric authentication method for mobile devices paired with wireless earbuds.<n>We propose an ear canal key extraction protocol, textbfEarID, for resource-constrained earbuds.<n>Our evaluation results demonstrate that EarID achieves a 98.7% authentication accuracy, comparable to machine learning classifiers.
- Score: 23.001093937473797
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Ear canal scanning/sensing (ECS) has emerged as a novel biometric authentication method for mobile devices paired with wireless earbuds. Existing studies have demonstrated the uniqueness of ear canals by training and testing machine learning classifiers on ECS data. However, implementing practical ECS-based authentication requires preventing raw biometric data leakage and designing computationally efficient protocols suitable for resource-constrained earbuds. To address these challenges, we propose an ear canal key extraction protocol, \textbf{EarID}. Without relying on classifiers, EarID extracts unique binary keys directly on the earbuds during authentication. These keys further allow the use of privacy-preserving fuzzy commitment scheme that verifies the wearer's key on mobile devices. Our evaluation results demonstrate that EarID achieves a 98.7\% authentication accuracy, comparable to machine learning classifiers. The mobile enrollment time (160~ms) and earbuds processing time (226~ms) are negligible in terms of wearer's experience. Moreover, our approach is robust and attack-resistant, maintaining a false acceptance rate below 1\% across all adversarial scenarios. We believe the proposed EarID offers a practical and secure solution for next-generation wireless earbuds.
Related papers
- An Investigation of Ear-EEG Signals for a Novel Biometric Authentication System [13.251967285967673]
biometric authentication using EEG signals acquired through in-ear devices, commonly referred to as ear-EEG.<n>Traditional EEG-based biometric systems, while secure, often suffer from low usability due to cumbersome scalp-based electrode setups.<n>We propose a novel and practical framework leveraging ear-EEG signals as a user-friendly alternative for everyday biometric authentication.
arXiv Detail & Related papers (2025-07-17T07:48:05Z) - EdgeEar: Efficient and Accurate Ear Recognition for Edge Devices [0.6200919793965987]
Ear recognition is a contactless and unobtrusive biometric technique with applications across various domains.<n>This paper introduces EdgeEar, a lightweight model based on a proposed hybrid CNN-transformer architecture to solve this problem.<n>By incorporating low-rank approximations into specific linear layers, EdgeEar reduces its parameter count by a factor of 50 compared to the current state-of-the-art, bringing it below two million while maintaining competitive accuracy.
arXiv Detail & Related papers (2025-02-11T17:53:33Z) - EarCapAuth: Biometric Method for Earables Using Capacitive Sensing Eartips [5.958529344837165]
EarCapAuth is an authentication mechanism using 48 capacitive electrodes embedded into the soft silicone eartips of two earables.
For identification, EarCapAuth achieves 89.95%. This outperforms some earable biometric principles from related work.
In the future, EarCapAuth could be integrated into high-resolution brain sensing electrode tips.
arXiv Detail & Related papers (2024-11-07T12:35:02Z) - SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes [14.78387043362623]
We propose SCR-Auth, a secure call receiver authentication scheme for smartphones.<n>It sends inaudible acoustic signals through the earpiece speaker to actively sense the call receiver's outer ear structure.<n>Results show an average balanced accuracy of 96.95% and resilience against potential attacks.
arXiv Detail & Related papers (2024-04-23T13:03:09Z) - Open-set Adversarial Defense with Clean-Adversarial Mutual Learning [93.25058425356694]
This paper demonstrates that open-set recognition systems are vulnerable to adversarial samples.
Motivated by these observations, we emphasize the necessity of an Open-Set Adversarial Defense (OSAD) mechanism.
This paper proposes an Open-Set Defense Network with Clean-Adversarial Mutual Learning (OSDN-CAML) as a solution to the OSAD problem.
arXiv Detail & Related papers (2022-02-12T02:13:55Z) - Transfer learning using deep neural networks for Ear Presentation Attack
Detection: New Database for PAD [0.0]
There is no publicly available ear presentation attack detection (PAD) database.
We propose a PAD method using a pre-trained deep neural network and release a new dataset called Warsaw University of Technology Ear for Presentation Attack Detection (WUT-Ear V1.0)
We have captured more than 8500 genuine ear images from 134 subjects and more than 8500 fake ear images using.
arXiv Detail & Related papers (2021-12-09T22:34:26Z) - Project Achoo: A Practical Model and Application for COVID-19 Detection
from Recordings of Breath, Voice, and Cough [55.45063681652457]
We propose a machine learning method to quickly triage COVID-19 using recordings made on consumer devices.
The approach combines signal processing methods with fine-tuned deep learning networks and provides methods for signal denoising, cough detection and classification.
We have also developed and deployed a mobile application that uses symptoms checker together with voice, breath and cough signals to detect COVID-19 infection.
arXiv Detail & Related papers (2021-07-12T08:07:56Z) - Spotting adversarial samples for speaker verification by neural vocoders [102.1486475058963]
We adopt neural vocoders to spot adversarial samples for automatic speaker verification (ASV)
We find that the difference between the ASV scores for the original and re-synthesize audio is a good indicator for discrimination between genuine and adversarial samples.
Our codes will be made open-source for future works to do comparison.
arXiv Detail & Related papers (2021-07-01T08:58:16Z) - Speech Enhancement for Wake-Up-Word detection in Voice Assistants [60.103753056973815]
Keywords spotting and in particular Wake-Up-Word (WUW) detection is a very important task for voice assistants.
This paper proposes a Speech Enhancement model adapted to the task of WUW detection.
It aims at increasing the recognition rate and reducing the false alarms in the presence of these types of noises.
arXiv Detail & Related papers (2021-01-29T18:44:05Z) - Open-set Adversarial Defense [93.25058425356694]
We show that open-set recognition systems are vulnerable to adversarial attacks.
Motivated by this observation, we emphasize the need of an Open-Set Adrial Defense (OSAD) mechanism.
This paper proposes an Open-Set Defense Network (OSDN) as a solution to the OSAD problem.
arXiv Detail & Related papers (2020-09-02T04:35:33Z) - Deep Speaker Embeddings for Far-Field Speaker Recognition on Short
Utterances [53.063441357826484]
Speaker recognition systems based on deep speaker embeddings have achieved significant performance in controlled conditions.
Speaker verification on short utterances in uncontrolled noisy environment conditions is one of the most challenging and highly demanded tasks.
This paper presents approaches aimed to achieve two goals: a) improve the quality of far-field speaker verification systems in the presence of environmental noise, reverberation and b) reduce the system qualitydegradation for short utterances.
arXiv Detail & Related papers (2020-02-14T13:34:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.