Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3081333.3081355acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

BreathPrint: Breathing Acoustics-based User Authentication

Published: 16 June 2017 Publication History
  • Get Citation Alerts
  • Abstract

    We propose BreathPrint, a new behavioural biometric signature based on audio features derived from an individual's commonplace breathing gestures. Specifically, BreathPrint uses the audio signatures associated with the three individual gestures: sniff, normal, and deep breathing, which are sufficiently different across individuals. Using these three breathing gestures, we develop the processing pipeline that identifies users via the microphone sensor on smartphones and wearable devices. In BreathPrint, a user performs breathing gestures while holding the device very close to their nose. Using off-the-shelf hardware, we experimentally evaluate the BreathPrint prototype with 10 users, observed over seven days. We show that users can be authenticated reliably with an accuracy of over 94% for all the three breathing gestures in intra-sessions and deep breathing gesture provides the best overall balance between true positives (successful authentication) and false positives (resiliency to directed impersonation and replay attacks). Moreover, we show that this breathing sound based biometric is also robust to some typical changes in both physiological and environmental context, and that it can be applied on multiple smartphone platforms. Early results suggest that breathing based biometrics show promise as either to be used as a secondary authentication modality in a multimodal biometric authentication system or as a user disambiguation technique for some daily lifestyle scenarios.

    References

    [1]
    H. Abdelnasser, K. A. Harras, and M. Youssef. Ubibreathe: A ubiquitous non-invasive wifi-based breathing estimator. In MobiHoc, pages 277--286. ACM, 2015.
    [2]
    A. Aertsen, P. Johannesma, and D. Hermes. Spectro-temporal receptive fields of auditory neurons in the grassfrog. Biological Cybernetics, 38(4):235--248, 1980.
    [3]
    F. Alegre, A. Amehraye, and N. Evans. Spoofing countermeasures to protect automatic speaker verification from voice conversion. In ICASSP, pages 3068--3072. IEEE, 2013.
    [4]
    H. Aly and M. Youssef. Zephyr: Ubiquitous accurate multi-sensor fusion-based respiratory rate estimation using smartphones. In INFOCOM, pages 1--9. IEEE, 2016.
    [5]
    A. Azarbarzin and Z. M. Moussavi. Automatic and unsupervised snore sound extraction from respiratory sound signals. IEEE Transactions on Biomedical Engineering, 58(5):1156--1162, 2011.
    [6]
    A. Bajtarevic, C. Ager, M. Pienz, M. Klieber, K. Schwarz, M. Ligor, T. Ligor, W. Filipiak, H. Denz, M. Fiegl, et al. Noninvasive detection of lung cancer by analysis of exhaled breath. BMC cancer, 9(1):1, 2009.
    [7]
    L. Boccanfuso and J. M. O'Kane. Remote measurement of breathing rate in real time using a high precision, single-point infrared temperature sensor. In Biomedical Robotics and Biomechatronics, pages 1704--1709. IEEE, 2012.
    [8]
    W. M. Campbell, D. E. Sturim, and D. A. Reynolds. Support vector machines using gmm supervectors for speaker verification. IEEE signal processing letters, 13(5):308--311, 2006.
    [9]
    J. Cannan and H. Hu. Automatic user identification by using forearm biometrics. In Advanced Intelligent Mechatronics, pages 710--715. IEEE, 2013.
    [10]
    M. J. Carey, E. S. Parris, and J. S. Bridle. A speaker verification system using alpha-nets. In ICASSP, pages 397--400. IEEE, 1991.
    [11]
    J. Chauhan, H. J. Asghar, M. A. Kaafar, and A. Mahanti. Gesture-based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. In ACNS, pages 648--665. Springer, 2016.
    [12]
    S. Chen, A. Pande, and P. Mohapatra. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. In MobiSys, pages 109--122. ACM, 2014.
    [13]
    J. Chuang, H. Nguyen, C. Wang, and B. Johnson. I think, therefore i am: Usability and security of authentication using brainwaves. In FC, pages 1--16. Springer, 2013.
    [14]
    P. Corbishley and E. Rodrıguez-Villegas. Breathing detection: towards a miniaturized, wearable, battery-operated monitoring system. IEEE Transactions on Biomedical Engineering, 55(1):196--204, 2008.
    [15]
    W. Dai, Y. Chen, G.-R. Xue, Q. Yang, and Y. Yu. Translated learning: Transfer learning across different feature spaces. In NIPS, pages 353--360, 2008.
    [16]
    P. L. De Leon, M. Pucher, J. Yamagishi, I. Hernaez, and I. Saratxaga. Evaluation of speaker verification security and detection of hmm-based synthetic speech. IEEE Transactions on Audio, Speech, and Language Processing, 20(8):2280--2290, 2012.
    [17]
    N. Dehak, P. J. Kenny, R. Dehak, P. Dumouchel, and P. Ouellet. Front-end factor analysis for speaker verification. IEEE Transactions on Audio, Speech, and Language Processing, 19(4):788--798, 2011.
    [18]
    S. Eberz, K. B. Rasmussen, V. Lenders, and I. Martinovic. Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics. In NDSS. Internet Society, 2015.
    [19]
    K. R. Farrell, R. J. Mammone, and K. T. Assaleh. Speaker recognition using neural networks and conventional classifiers. IEEE Transactions on speech and audio processing, 2(1):194--205, 1994.
    [20]
    M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE TIFS, 8(1):136--148, 2013.
    [21]
    D. Gafurov, E. Snekkenes, and P. Bours. Spoof attacks on gait authentication system. IEEE TIFS, 2(3):491--502, 2007.
    [22]
    G. Gamez, L. Zhu, A. Disko, H. Chen, V. Azov, K. Chingin, G. Kramer, and R. Zenobi. Real-time, in vivo monitoring and pharmacokinetics of valproic acid via a novel biomarker in exhaled breath. Chemical Communications, 47(17):4884--4886, 2011.
    [23]
    N. Gavriely, M. Nissan, A. Rubin, and D. W. Cugell. Spectral characteristics of chest wall breath sounds in normal subjects. Thorax, 50(12):1292--1300, 1995.
    [24]
    B. R. Glasberg and B. C. Moore. Derivation of auditory filter shapes from notched-noise data. Hearing research, 47(1--2):103--138, 1990.
    [25]
    V. Gross, A. Dittmar, T. Penzel, F. Schuttler, and P. Von Wichert. The relationship between normal lung sounds, age, and gender. American journal of respiratory and critical care medicine, 162(3):905--909, 2000.
    [26]
    T. Hao, G. Xing, and G. Zhou. isleep: unobtrusive sleep quality monitoring using smartphones. In SenSys, page 4. ACM, 2013.
    [27]
    R. G. Hautamaki, T. Kinnunen, V. Hautamaki, T. Leino, and A.-M. Laukkanen. I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry. In INTERSPEECH, pages 930--934. Citeseer, 2013.
    [28]
    J. He, P. M.-L. Sinues, M. Hollmén, X. Li, M. Detmar, and R. Zenobi. Fingerprinting breast cancer vs. normal mammary cells by mass spectrometric analysis of volatiles. Scientific reports, 4, 2014.
    [29]
    A. Jain and J. Vepa. Lung sound analysis for wheeze episode detection. In Engineering in Medicine and Biology Society, pages 2582--2585. IEEE, 2008.
    [30]
    H. Khan, U. Hengartner, and D. Vogel. Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes. In MobiSys '16, pages 387--398. ACM, 2016.
    [31]
    C. Kim and R. M. Stern. Power-normalized cepstral coefficients (pncc) for robust speech recognition. In ICASSP, pages 4101--4104. IEEE, 2012.
    [32]
    T. Kinnunen, E. Karpov, and P. Franti. Real-time speaker identification and verification. IEEE Transactions on Audio, Speech, and Language Processing, 14(1):277--288, 2006.
    [33]
    T. Kinnunen and H. Li. An overview of text-independent speaker recognition: From features to supervectors. Speech communication, 52(1):12--40, 2010.
    [34]
    T. Kinnunen, Z.-Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li. Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech. In ICASSP, pages 4401--4404. IEEE, 2012.
    [35]
    E. C. Larson, T. Lee, S. Liu, M. Rosenfeld, and S. N. Patel. Accurate and privacy preserving cough sensing using a low-cost microphone. In UbiComp, pages 375--384. ACM, 2011.
    [36]
    H. Lee, P. Pham, Y. Largman, and A. Y. Ng. Unsupervised feature learning for audio classification using convolutional deep belief networks. In NIPS, pages 1096--1104, 2009.
    [37]
    L. Li, X. Zhao, and G. Xue. Unobservable Re-authentication for Smartphones. In NDSS. Internet Society, 2013.
    [38]
    Q. Li, J. Zheng, A. Tsai, and Q. Zhou. Robust endpoint detection and energy normalization for real-time speech and speaker recognition. IEEE Transactions on Speech and Audio Processing, 10(3):146--157, 2002.
    [39]
    J. Lindberg, M. Blomberg, et al. Vulnerability in speaker verification-a study of technical impostor techniques. In Eurospeech, volume 99, pages 1211--1214, 1999.
    [40]
    X. Lu and M. Bahoura. An automatic system for crackles detection and classification. In Canadian Conference on Electrical and Computer Engineering, pages 725--729. IEEE, 2006.
    [41]
    J. Mantyjarvi, M. Lindholm, E. Vildjiounaite, S.-M. Makela, and H. Ailisto. Identifying users of portable devices from gait pattern with accelerometers. In ICASSP., volume 2, pages 973--976. IEEE, 2005.
    [42]
    J. Marshall, D. Rowland, S. Rennick Egglestone, S. Benford, B. Walker, and D. McAuley. Breath control of amusement rides. In CHI, pages 73--82. ACM, 2011.
    [43]
    J. Mead and S. H. Loring. Analysis of volume displacement and length changes of the diaphragm during breathing. Journal of Applied Physiology, 53(3):750--755, 1982.
    [44]
    R. Nandakumar, S. Gollakota, and N. Watson. Contactless sleep apnea detection on smartphones. In MobiSys, pages 45--57. ACM, 2015.
    [45]
    H. Pasterkamp, S. S. Kraman, and G. R. Wodicka. Respiratory sounds: advances beyond the stethoscope. American journal of respiratory and critical care medicine, 156(3):974--987, 1997.
    [46]
    H. Pasterkamp, R. E. Powell, and I. Sanchez. Lung sound spectra at standardized air flow in normal infants, children, and adults. American journal of respiratory and critical care medicine, 154(2):424--430, 1996.
    [47]
    H. Pasterkamp, J. Schafer, and G. R. Wodicka. Posture-dependent change of tracheal sounds at standardized flows in patients with obstructive sleep apnea. CHEST Journal, 110(6):1493--1498, 1996.
    [48]
    P. Perrot, G. Aversano, R. Blouet, M. Charbit, and G. Chollet. Voice forgery using alisp: Indexation in a client memory. In ICASSP, pages 17--20. IEEE, 2005.
    [49]
    T. Rahman, A. T. Adams, M. Zhang, E. Cherry, B. Zhou, H. Peng, and T. Choudhury. Bodybeat: A mobile system for sensing non-speech body sounds. In MobiSys, pages 2--13. ACM, 2014.
    [50]
    G. Reyes, D. Zhang, S. Ghosh, P. Shah, J. Wu, A. Parnami, B. Bercik, T. Starner, G. D. Abowd, and W. K. Edwards. Whoosh: non-voice acoustics for low-cost, hands-free, and rapid input on smartwatches. In ISWC, pages 120--127. ACM, 2016.
    [51]
    D. Reynolds. An overview of automatic speaker recognition. In ICASSP, pages 4072--407. IEEE, 2002.
    [52]
    D. A. Reynolds and R. C. Rose. Robust text-independent speaker identification using gaussian mixture speaker models. IEEE transactions on speech and audio processing, 3(1):72--83, 1995.
    [53]
    G. Rogez and C. Schmid. Mocap-guided data augmentation for 3d pose estimation in the wild. In NIPS, pages 3108--3116, 2016.
    [54]
    N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon. Biometric-rich gestures: A novel approach to authentication on multi-touch devices. In CHI, pages 977--986. ACM, 2012.
    [55]
    I. Sanchez and H. Pasterkamp. Tracheal sound spectra depend on body height. American Review of Respiratory Disease, 148:1083--1083, 1993.
    [56]
    R. Schluter, I. Bezrukov, H. Wagner, and H. Ney. Gammatone features and feature combination for large vocabulary speech recognition. In ICASSP, volume 4, pages 649--652. IEEE, 2007.
    [57]
    M. Schmidt and H. Gish. Speaker identification via support vector classifiers. In ICASSP, volume 1, pages 105--108. IEEE, 1996.
    [58]
    G. Serbes, C. O. Sakar, Y. P. Kahya, and N. Aydin. Effect of different window and wavelet types on the performance of a novel crackle detection algorithm. In International Conference on Hybrid Information Technology, pages 575--581. Springer, 2011.
    [59]
    M. Shahzad, A. X. Liu, and A. Samuel. Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures: You Can See It but You Can Not Do It. In MobiCom, pages 39--50. ACM, 2013.
    [60]
    J. Sharp, J. Henry, S. Sweany, W. Meadows, and R. Pietras. The total work of breathing in normal and obese men. Journal of Clinical Investigation, 43(4):728, 1964.
    [61]
    P. M.-L. Sinues, M. Kohler, and R. Zenobi. Human breath analysis may support the existence of individual metabolic phenotypes. PloS one, 8(4):e59909, 2013.
    [62]
    X. Sun, Z. Lu, W. Hu, and G. Cao. Symdetector: Detecting sound-related respiratory symptoms using smartphones. In UbiComp, pages 97--108. ACM, 2015.
    [63]
    S. A. Taplidou and L. J. Hadjileontiadis. Wheeze detection based on time-frequency analysis of breath sounds. Computers in biology and medicine, 37(8):1073--1083, 2007.
    [64]
    P. Tennent, D. Rowland, J. Marshall, S. R. Egglestone, A. Harrison, Z. Jaime, B. Walker, and S. Benford. Breathalising games: understanding the potential of breath control in game interfaces. In International Conference on Advances in Computer Entertainment Technology, page 58. ACM, 2011.
    [65]
    H. M. Thang, V. Q. Viet, N. D. Thuc, and D. Choi. Gait identification using accelerometer on mobile phone. In ICCAIS, pages 344--348. IEEE, 2012.
    [66]
    X. Valero and F. Alias. Gammatone cepstral coefficients: Biologically inspired features for non-speech audio classification. IEEE Transactions on Multimedia, 14(6):1684--1689, 2012.
    [67]
    S. Venugopalan, F. Juefei-Xu, B. Cowley, and M. Savvides. Electromyograph and keystroke dynamics for spoof-resistant biometric authentication. In CVPR Workshops, pages 109--118. IEEE, 2015.
    [68]
    J. Villalba and E. Lleida. Detecting replay attacks from far-field recordings on speaker verification systems. In European Workshop on Biometrics and Identity Management, pages 274--285. Springer, 2011.
    [69]
    J. Villalba and E. Lleida. Preventing replay attacks on speaker verification systems. In ICCST, pages 1--8. IEEE, 2011.
    [70]
    L. Weisi, D. Tao, J. Kacprzyk, Z. Li, E. Izquierdo, and H. Wang. Multimedia analysis, processing and communications, volume 346. Springer Science & Business Media, 2011.
    [71]
    D. Wertheim, C. Olden, E. Savage, and P. Seddon. Extracting respiratory data from pulse oximeter plethysmogram traces in newborn infants. Archives of Disease in Childhood-Fetal and Neonatal Edition, 94(4):F301--F303, 2009.
    [72]
    H. Xu, Y. Zhou, and M. R. Lyu. Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones. In SOUPS, pages 187--198. ACM, 2014.
    [73]
    A. Yadollahi, E. Giannouli, and Z. Moussavi. Sleep apnea monitoring and diagnosis based on pulse oximetery and tracheal sound signals. Medical & biological engineering & computing, 48(11):1087--1097, 2010.
    [74]
    K. Yatani and K. N. Truong. Bodyscope: A wearable acoustic sensor for activity recognition. In UbiComp, pages 341--350. ACM, 2012.
    [75]
    C. X. Zhao, T. Wysocki, F. Agrafioti, and D. Hatzinakos. Securing handheld devices and fingerprint readers with ecg biometrics. In BTAS, pages 150--155. IEEE, 2012.
    [76]
    X. Zhao, Y. Shao, and D. Wang. Casa-based robust speaker identification. IEEE Transactions on Audio, Speech, and Language Processing, 20(5):1608--1616, 2012.
    [77]
    X. Zhao and D. Wang. Analyzing noise robustness of MFCC and GFCC features in speaker identification. In ICASSP, pages 7204--7208. IEEE, 2013.
    [78]
    Y. Zhong, Y. Deng, and G. Meltzner. Pace independent mobile gait biometrics. In BTAS, pages 1--8. IEEE, 2015.

    Cited By

    View all
    • (2024)User authentication system based on human exhaled breath physicsPLOS ONE10.1371/journal.pone.030197119:4(e0301971)Online publication date: 22-Apr-2024
    • (2024)Face Recognition In Harsh Conditions: An Acoustic Based ApproachProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661855(1-14)Online publication date: 3-Jun-2024
    • (2024)AFaceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435108:1(1-33)Online publication date: 6-Mar-2024
    • Show More Cited By

    Index Terms

    1. BreathPrint: Breathing Acoustics-based User Authentication

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiSys '17: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services
      June 2017
      520 pages
      ISBN:9781450349284
      DOI:10.1145/3081333
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 June 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. authentication
      2. breathing gestures
      3. security
      4. usability

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      MobiSys'17
      Sponsor:

      Acceptance Rates

      MobiSys '17 Paper Acceptance Rate 34 of 188 submissions, 18%;
      Overall Acceptance Rate 274 of 1,679 submissions, 16%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)203
      • Downloads (Last 6 weeks)12

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)User authentication system based on human exhaled breath physicsPLOS ONE10.1371/journal.pone.030197119:4(e0301971)Online publication date: 22-Apr-2024
      • (2024)Face Recognition In Harsh Conditions: An Acoustic Based ApproachProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661855(1-14)Online publication date: 3-Jun-2024
      • (2024)AFaceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435108:1(1-33)Online publication date: 6-Mar-2024
      • (2024)BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart ActivityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.326836021:2(987-1000)Online publication date: Mar-2024
      • (2024)Utter Innocence: Contactless Authentication Method Based on Physiological SignalsIEEE Sensors Journal10.1109/JSEN.2024.335325624:6(7740-7751)Online publication date: 15-Mar-2024
      • (2024)Simultaneous Authentication of Multiple Users Using a Single mmWave RadarIEEE Internet of Things Journal10.1109/JIOT.2024.335854811:10(17797-17811)Online publication date: 15-May-2024
      • (2024)IncreAuth: Incremental-Learning-Based Behavioral Biometric Authentication on SmartphonesIEEE Internet of Things Journal10.1109/JIOT.2023.328993511:1(1589-1603)Online publication date: 1-Jan-2024
      • (2024)Robust Biometric Statistical Features within Continuous Blood Pressure Signals2024 8th International Conference on Image and Signal Processing and their Applications (ISPA)10.1109/ISPA59904.2024.10536769(1-7)Online publication date: 21-Apr-2024
      • (2024)A Systematic Review of Human Activity Recognition Based on Mobile Devices: Overview, Progress and TrendsIEEE Communications Surveys & Tutorials10.1109/COMST.2024.335759126:2(890-929)Online publication date: Oct-2025
      • (2024)Identification of Non-Speaking and Minimal-Speaking Individuals Using Nonverbal VocalizationsIEEE Access10.1109/ACCESS.2024.339858412(68954-68967)Online publication date: 2024
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media