BiLock: User Authentication via Dental Occlusion Biometrics

User authentication on smart devices is indispensable to keep data privacy and security. It is especially significant for emerging wearable devices such as smartwatches considering data sensitivity in them. However, conventional authentication methods are not applicable for wearables due to constraints of size and hardware, which makes present wearable devices lack convenient, secure and low-cost authentication schemes. To tackle this problem, we reveal a novel biometric authentication mechanism which makes use of sounds of human dental occlusion (i.e., tooth click). We demonstrate its feasibility by comprehensive measurement study, and design a prototype-BiLock with two Android platforms. Extensive real-world experiments have been conducted to evaluate the accuracy, robustness and security of BiLock in different environments. The results show that BiLock can achieve less than 5% average false reject rate and 0.95% average false accept rate even in a noisy environment. Comparative experiments also demonstrate that BiLock possesses advantages in robustness to noise and security against replay and observation attacks over existing voiceprinting schemes.

[1]  Amara Lynn Graps,et al.  An introduction to wavelets , 1995 .

[2]  Alex X. Liu,et al.  Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.

[3]  Georg Heigold,et al.  End-to-end text-dependent speaker verification , 2015, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[4]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[5]  Ajay Kumar,et al.  Human Identification Using Finger Images , 2012, IEEE Transactions on Image Processing.

[6]  Yunhao Liu,et al.  Intelligent sleep stage mining service with smartphones , 2014, UbiComp.

[7]  Koichi Kuzume A Character Input System Using Tooth-Touch Sound for Disabled People , 2008, ICCHP.

[8]  D W Calvert,et al.  Diagnosis of traumatic occlusion. , 1973, Dental student.

[9]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  F. Rothhammer,et al.  The Aymara : strategies in human adaptation to a rigorous environment , 1990 .

[11]  Dimitrios Hatzinakos,et al.  Securing handheld devices and fingerprint readers with ECG biometrics , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[12]  Xiao Sun,et al.  SymDetector: detecting sound-related respiratory symptoms using smartphones , 2015, UbiComp.

[13]  Kurt Bryan,et al.  Discrete Fourier Analysis and Wavelets: Applications to Signal and Image Processing, Second Edition , 2018 .

[14]  Carlos Tejada,et al.  Bitey: an exploration of tooth click gestures for hands-free user interface control , 2016, MobileHCI.

[15]  Charles K. Chui,et al.  An Introduction to Wavelets , 1992 .

[16]  El-Sayed A. El-Dahshan,et al.  Denoising of Heart Sound Signals Using Discrete Wavelet Transform , 2017, Circuits Syst. Signal Process..

[17]  Arthur Prochazka,et al.  Evaluation of Tooth-Click Triggering and Speech Recognition in Assistive Technology for Computer Access , 2010, Neurorehabilitation and neural repair.

[18]  Gian Marti,et al.  Heart sound classification using deep structured features , 2016, 2016 Computing in Cardiology Conference (CinC).

[19]  G. Eckert,et al.  The mechanics of dental occlusion and disclusion , 2017, Clinical biomechanics.

[20]  Ajay Kumar,et al.  Towards Contactless, Low-Cost and Accurate 3D Fingerprint Identification , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[21]  Charles Wang,et al.  I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves , 2013, Financial Cryptography Workshops.

[22]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[23]  Anil K. Jain,et al.  An Introduction to Biometric Authentication Systems , 2005 .

[24]  Martin Schrepp,et al.  Construction and Evaluation of a User Experience Questionnaire , 2008, USAB.

[25]  Nasir D. Memon,et al.  Smartwatches Locking Methods: A Comparative Study , 2017, SOUPS.

[26]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[27]  Xiang-Yang Li,et al.  Continuous user identification via touch and movement behavioral biometrics , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[28]  Guoliang Xing,et al.  iSleep: unobtrusive sleep quality monitoring using smartphones , 2013, SenSys '13.

[29]  C S Shi,et al.  Elementary identification of a gnathosonic classification using an autoregressive model. , 1993, Journal of oral rehabilitation.

[30]  Judith A. Markowitz Voice biometrics , 2000, CACM.

[31]  D M Watt,et al.  Recording the sounds of tooth contact: a diagnostic technique for evaluation of occlusal disturbances. , 1969, International dental journal.

[32]  Koji Yatani,et al.  BodyScope: a wearable acoustic sensor for activity recognition , 2012, UbiComp.

[33]  J F Prinz,et al.  Computer aided gnathosonic analysis: distinguishing between single and multiple tooth impact sounds. , 2000, Journal of oral rehabilitation.

[34]  Jian Liu,et al.  VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration , 2017, CCS.

[35]  Michael Weber,et al.  Password entry usability and shoulder surfing susceptibility on different smartphone platforms , 2012, MUM.

[36]  Kurt Bryan,et al.  Discrete Fourier Analysis and Wavelets: Applications to Signal and Image Processing , 2008 .

[37]  Watt Dm Recording the sounds of tooth contact: a diagnostic technique for evaluation of occlusal disturbances. , 1969 .

[38]  Anil K. Jain,et al.  Biometric Recognition : An Overview , 2012 .

[39]  Alan C. Bovik,et al.  The Essential Guide to Image Processing , 2009, J. Electronic Imaging.

[40]  Arthur Prochazka,et al.  Tooth-Click Control of a Hands-Free Computer Interface , 2008, IEEE Transactions on Biomedical Engineering.

[41]  Dacheng Tao,et al.  A Comprehensive Survey on Pose-Invariant Face Recognition , 2015, ACM Trans. Intell. Syst. Technol..

[42]  Janne Lindqvist,et al.  Where Usability and Security Go Hand-in-Hand: Robust Gesture-Based Authentication for Mobile Systems , 2017, CHI.

[43]  Chaouki Kasmi,et al.  Voice Biometrics , 2011, Encyclopedia of Cryptography and Security.

[44]  Archan Misra,et al.  BreathPrint: Breathing Acoustics-based User Authentication , 2017, MobiSys.

[45]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[46]  亚当·J·奇也 Device access using voice authentication , 2012 .

[47]  Koichi Kuzume,et al.  Evaluation of tooth-touch sound and expiration based mouse device for disabled persons , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[48]  Debnath Bhattacharyya,et al.  Biometric Authentication: A Review , 2009 .

[49]  Marc Hassenzahl,et al.  The Inference of Perceived Usability From Beauty , 2010, Hum. Comput. Interact..