Continuous User Verification via Respiratory Biometrics

The ever-growing security issues in various mobile applications and smart devices create an urgent demand for a reliable and convenient user verification method. Traditional verification methods request users to provide their secrets (e.g., entering passwords and collecting fingerprints). We envision that the essential trend of user verification is to free users from active participation in the verification process. Toward this end, we propose a continuous user verification system, which re-uses the widely deployed WiFi infrastructure to capture the unique physiological characteristics rooted in user’s respiratory motions. Different from the existing continuous verification approaches, posing dependency on restricted scenarios/user behaviors (e.g., keystrokes and gaits), our system can be easily integrated into any WiFi infrastructure to provide non-intrusive continuous verification. Specifically, we extract the respiration-related signals from the channel state information (CSI) of WiFi. We then derive the user-specific respiratory features based on the waveform morphology analysis and fuzzy wavelet transformation of the respiration signals. Additionally, a deep learning based user verification scheme is developed to identify legitimate users accurately and detect the existence of spoofing attacks. Extensive experiments involving 20 participants demonstrate that the proposed system can robustly verify/identify users and detect spoofers under various types of attacks.

[1]  R. Schülke [Anatomy and physiology]. , 1968, Zahntechnik; Zeitschrift fur Theorie und Praxis der wissenschaftlichen Zahntechnik.

[2]  N. Huang,et al.  The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis , 1998, Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.

[3]  Xavier Binefa,et al.  Robust Real-Time Periodic Motion Detection, Analysis, and Applications , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[4]  Brenda K. Wiederhold,et al.  ECG to identify individuals , 2005, Pattern Recognit..

[5]  D. Hatzinakos,et al.  ECG Biometric Recognition Without Fiducial Detection , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[6]  M. Ragnarsdóttir,et al.  Breathing Movements and Breathing Patterns among Healthy Men and Women 20–69 Years of Age , 2006, Respiration.

[7]  Kathy J. Horadam,et al.  Fuzzy Extractors for Minutiae-Based Fingerprint Authentication , 2007, ICB.

[8]  Khalil El-Khatib,et al.  Continuous authentication by electrocardiogram data , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[9]  Alessandra Lumini,et al.  An evaluation of direct attacks using fake fingers generated from ISO templates , 2010, Pattern Recognit. Lett..

[10]  K. Barrett,et al.  Ganong's Review of Medical Physiology , 2010 .

[11]  R. Britto,et al.  Padrão respiratório e movimento toracoabdominal em indivíduos saudáveis: influência da idade e do sexo , 2010 .

[12]  Raquel R Britto,et al.  Breathing pattern and thoracoabdominal motion in healthy individuals: influence of age and sex. , 2010, Revista brasileira de fisioterapia (Sao Carlos (Sao Paulo, Brazil)).

[13]  Ajay Kumar,et al.  Comparison and combination of iris matchers for reliable personal authentication , 2010, Pattern Recognit..

[14]  Gamini Dissanayake,et al.  Driver Drowsiness Classification Using Fuzzy Wavelet-Packet-Based Feature-Extraction Algorithm , 2011, IEEE Transactions on Biomedical Engineering.

[15]  I. Woungang,et al.  Combining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments , 2012, 2012 Fourth International Conference on Digital Home.

[16]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[17]  Robert X. Gao,et al.  Tissue Artifact Removal from Respiratory Signals Based on Empirical Mode Decomposition , 2013, Annals of Biomedical Engineering.

[18]  Shaojie Tang,et al.  Wi-Sleep: Contactless Sleep Monitoring via WiFi Signals , 2014, 2014 IEEE Real-Time Systems Symposium.

[19]  Jie Yang,et al.  E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures , 2014, MobiCom.

[20]  Khaled A. Harras,et al.  UbiBreathe: A Ubiquitous non-Invasive WiFi-based Breathing Estimator , 2015, MobiHoc.

[21]  Jie Yang,et al.  User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems , 2015, IEEE Transactions on Mobile Computing.

[22]  Wei Wang,et al.  Understanding and Modeling of WiFi Signal Based Human Activity Recognition , 2015, MobiCom.

[23]  Rama Chellappa,et al.  Attribute-based continuous user authentication on mobile devices , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[24]  Xu Chen,et al.  Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi , 2015, MobiHoc.

[25]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[26]  Dan Wu,et al.  Human respiration detection with commodity wifi devices: do user location and body orientation matter? , 2016, UbiComp.

[27]  Wei Wang,et al.  Gait recognition using wifi signals , 2016, UbiComp.

[28]  Mark Mohammad Tehranipoor,et al.  Human recognition from photoplethysmography (PPG) based on non-fiducial features , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[29]  Jaime S. Cardoso,et al.  Towards a Continuous Biometric System Based on ECG Signals Acquired on the Steering Wheel , 2017, Sensors.

[30]  Archan Misra,et al.  BreathPrint: Breathing Acoustics-based User Authentication , 2017, MobiSys.

[31]  Jian Liu,et al.  VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration , 2017, CCS.

[32]  Wenyao Xu,et al.  Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System , 2017, MobiCom.

[33]  Hongbo Liu,et al.  Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT , 2017, MobiHoc.

[34]  Xiaonan Guo,et al.  WiFi-Enabled Smart Human Dynamics Monitoring , 2017, SenSys.

[35]  Mark Mohammad Tehranipoor,et al.  Non-fiducial PPG-based authentication for healthcare application , 2017, 2017 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI).