EarEcho

Smart wearable devices have recently become one of the major technological trends and been widely adopted by the general public. Wireless earphones, in particular, have seen a skyrocketing growth due to its great usability and convenience. With the goal of seeking a more unobtrusive wearable authentication method that the users can easily use and conveniently access, in this study we present EarEcho as a novel, affordable, user-friendly biometric authentication solution. EarEcho takes advantages of the unique physical and geometrical characteristics of human ear canal and assesses the content-free acoustic features of in-ear sound waves for user authentication in a wearable and mobile manner. We implemented the proposed EarEcho on a proof-of-concept prototype and tested it among 20 subjects under diverse application scenarios. We can achieve a recall of 94.19% and precision of 95.16% for one-time authentication, while a recall of 97.55% and precision of 97.57% for continuous authentication. EarEcho has demonstrated its stability over time and robustness to cope with the uncertainties on the varying background noises, body motions, and sound pressure levels.

[1]  Steffen Leonhardt,et al.  Evaluating Innovative In-Ear Pulse Oximetry for Unobtrusive Cardiovascular and Pulmonary Monitoring During Sleep , 2013, IEEE Journal of Translational Engineering in Health and Medicine.

[2]  J M Kates A computer simulation of hearing aid response and the effects of ear canal size. , 1988, The Journal of the Acoustical Society of America.

[3]  Alex X. Liu,et al.  Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.

[4]  Patricia Melin,et al.  Optimization of modular granular neural networks using hierarchical genetic algorithms for human recognition using the ear biometric measure , 2014, Eng. Appl. Artif. Intell..

[5]  B. W. Lawton,et al.  Specification of the geometry of the human ear canal for the prediction of sound-pressure level distribution. , 1989, The Journal of the Acoustical Society of America.

[6]  Manoj Gupta,et al.  Survey on Recent Ear Biometric Recognition Techniques , 2018 .

[7]  Christoph Busch,et al.  Ear biometrics: a survey of detection, feature extraction and recognition methods , 2012, IET Biom..

[8]  Preben Kidmose,et al.  In-Ear EEG From Viscoelastic Generic Earpieces: Robust and Unobtrusive 24/7 Monitoring , 2016, IEEE Sensors Journal.

[9]  Romit Roy Choudhury,et al.  Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.

[10]  Abdullah I. Al-Shoshan,et al.  Speech and Music Classification and Separation: A Review , 2006 .

[11]  Chulhong Min,et al.  Earables for Personal-Scale Behavior Analytics , 2018, IEEE Pervasive Computing.

[12]  Yang Gao,et al.  Replicating Your Heart: Exploring Presentation Attacks on ECG Biometrics , 2019 .

[13]  A. Ant Ozok,et al.  A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.

[14]  Tohru Yagi,et al.  Conductive rubber electrodes for earphone-based eye gesture input interface , 2014, Personal and Ubiquitous Computing.

[15]  Stan Sclaroff,et al.  Image-based Ear Biometric Smartphone App for Patient Identification in Field Settings , 2015, VISAPP.

[16]  Takafumi Koshinaka,et al.  Ear Acoustic Biometrics Using Inaudible Signals and Its Application to Continuous User Authentication , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[17]  Wenyao Xu,et al.  Brain Password: A Secure and Truly Cancelable Brain Biometrics for Smart Headwear , 2018, MobiSys.

[18]  P. Welch The use of fast Fourier transform for the estimation of power spectra: A method based on time averaging over short, modified periodograms , 1967 .

[19]  Hui Chen,et al.  Human Ear Recognition in 3D , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[20]  Nalini K. Ratha,et al.  Robust fingerprint authentication using local structural similarity , 2000, Proceedings Fifth IEEE Workshop on Applications of Computer Vision.

[21]  Kang G. Shin,et al.  Continuous Authentication for Voice Assistants , 2017, MobiCom.

[22]  Shuicheng Yan,et al.  Face Authentication With Makeup Changes , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[23]  Thuc Dinh Nguyen,et al.  Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme , 2015, International Journal of Information Security.

[24]  Jian Liu,et al.  VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration , 2017, CCS.

[25]  Qian Zhang,et al.  BreathLive: Liveness Detection for Heart Sound Authentication with Deep Breathing , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[26]  Tao Wang,et al.  Auracle: Detecting Eating Episodes with an Ear-mounted Sensor , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[27]  Thad Starner,et al.  Stick it in your ear: building an in-ear jaw movement sensor , 2015, UbiComp/ISWC Adjunct.

[28]  Florian Alt,et al.  Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication , 2017, CHI.

[29]  Peter Corcoran,et al.  Iris authentication in handheld devices - considerations for constraint-free acquisition , 2015, IEEE Transactions on Consumer Electronics.

[30]  Sunghyun Choi,et al.  Chirp signal-based aerial acoustic communication for smart devices , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[31]  Minglu Li,et al.  Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones , 2019, IEEE/ACM Transactions on Networking.

[32]  Christos Papavassiliou,et al.  Hearables: Multimodal physiological in-ear sensing , 2016, Scientific Reports.

[33]  Meng Zhao,et al.  BiLock: User Authentication via Dental Occlusion Biometrics , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[34]  Yang Gao,et al.  A Non-Contact PPG Biometric System Based on Deep Neural Network , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[35]  C. Novak,et al.  Effects of Sound Pressure Levels and Sensitivity to Noise on Mood and Behavioral Intent in a Controlled Fine Dining Restaurant Environment , 2010 .

[36]  Rama Chellappa,et al.  Face-based Active Authentication on mobile devices , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[37]  Janne Lindqvist,et al.  Where Usability and Security Go Hand-in-Hand: Robust Gesture-Based Authentication for Mobile Systems , 2017, CHI.

[38]  Bodo Urban,et al.  EarFieldSensing: A Novel In-Ear Electric Field Sensing to Enrich Wearable Gesture Input through Facial Expressions , 2017, CHI.

[39]  Xiaohui Liang,et al.  When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals , 2016, CCS.

[40]  Lili Qiu,et al.  AIM: Acoustic Imaging on a Mobile , 2018, MobiSys.

[41]  Abdulmotaleb El-Saddik,et al.  ECG Authentication for Mobile Devices , 2016, IEEE Transactions on Instrumentation and Measurement.

[42]  B. W. Lawton Exposure limits for airborne sound of very high frequency and ultrasonic frequency , 2013 .

[43]  Gueesang Lee,et al.  Implicit authentication based on ear shape biometrics using smartphone camera during a call , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[44]  Archan Misra,et al.  BreathPrint: Breathing Acoustics-based User Authentication , 2017, MobiSys.

[45]  Feng Xiao,et al.  PatternListener: Cracking Android Pattern Lock Using Acoustic Signals , 2018, CCS.

[46]  Paulo Henrique Trombetta Zannin,et al.  THE STATISTICAL MODELING OF ROAD TRAFFIC NOISE IN AN URBAN SETTING , 2003 .

[47]  Daniel Willem Elisabeth Schobben,et al.  Privacy-protected biometric templates: acoustic ear identification , 2004, SPIE Defense + Commercial Sensing.

[48]  Wonyong Sung,et al.  A statistical model-based voice activity detection , 1999, IEEE Signal Processing Letters.

[49]  Tsuyoshi Isshiki,et al.  Fingerprint authentication on touch sensor using Phase-Only Correlation method , 2016, 2016 7th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES).

[50]  Bing Zhou,et al.  BatMapper: Acoustic Sensing Based Indoor Floor Plan Construction Using Smartphones , 2017, MobiSys.

[51]  Zhanpeng Jin,et al.  A Survey on Brain Biometrics , 2019, ACM Comput. Surv..

[52]  P PIALOUX,et al.  [The external ear]. , 1955, Les Annales d'oto-laryngologie.

[53]  Wei Wang,et al.  Unlock with Your Heart : Heartbeat-based Authentication on Commercial Mobile Phones , 2018 .

[54]  Arun Ross,et al.  MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems , 2017, IEEE Transactions on Information Forensics and Security.

[55]  Dawn B. Logas,et al.  Diseases of the ear canal. , 1994, The Veterinary clinics of North America. Small animal practice.

[56]  Chi-Wing Fu,et al.  TwistIn: Tangible Authentication of Smart Devices via Motion Co-analysis with a Smartwatch , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[57]  Pei Huang,et al.  A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[58]  Bing Zhou,et al.  EchoPrint: Two-factor Authentication using Acoustics and Vision on Smartphones , 2018, MobiCom.

[59]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[60]  Jian Kang Urban Sound Environment , 2006 .

[61]  Jangho Park,et al.  Wearable Sensing of In-Ear Pressure for Heart Rate Monitoring with a Piezoelectric Sensor , 2015, Sensors.

[62]  Xiang 'Anthony' Chen,et al.  SweepSense: Ad Hoc Configuration Sensing Using Reflected Swept-Frequency Ultrasonics , 2016, IUI.

[63]  Yu Shi,et al.  SilentKey: A New Authentication Framework through Ultrasonic-based Lip Reading , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[64]  Samantha Kleinberg,et al.  Automated estimation of food type and amount consumed from body-worn audio and motion sensors , 2016, UbiComp.

[65]  Ivan Martinovic,et al.  Broken Hearted: How To Attack ECG Biometrics , 2017, NDSS.