Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2858036.2858152acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
note

SkullConduct: Biometric User Identification on Eyewear Computers Using Bone Conduction Through the Skull

Published: 07 May 2016 Publication History

Abstract

Secure user identification is important for the increasing number of eyewear computers but limited input capabilities pose significant usability challenges for established knowledge-based schemes, such as passwords or PINs. We present SkullConduct, a biometric system that uses bone conduction of sound through the user's skull as well as a microphone readily integrated into many of these devices, such as Google Glass. At the core of SkullConduct is a method to analyze the characteristic frequency response created by the user's skull using a combination of Mel Frequency Cepstral Coefficient (MFCC) features as well as a computationally light-weight 1NN classifier. We report on a controlled experiment with 10 participants that shows that this frequency response is person-specific and stable -- even when taking off and putting on the device multiple times -- and thus serves as a robust biometric. We show that our method can identify users with 97.0% accuracy and authenticate them with an equal error rate of 6.9%, thereby bringing biometric user identification to eyewear computers equipped with bone conduction technology.

Supplementary Material

MP4 File (p1379-schneegass.mp4)

References

[1]
Urs-Vito Albrecht, Ute von Jan, Joachim Kuebler, Christoph Zoeller, Martin Lacher, Oliver J Muensterer, Max Ettinger, Michael Klintschar, and Lars Hagemeier. 2014. Google Glass for documentation of medical findings: evaluation in forensic medicine. Journal of medical Internet research 16, 2 (2014).
[2]
Cheng Bo, Lan Zhang, Xiang-Yang Li, Qiuyuan Huang, and Yu Wang. 2013. SilentSense: Silent User Identification Via Touch and Movement Behavioral Biometrics. Proceedings of the 19th annual international conference on Mobile computing & networking - MobiCom '13 (2013), 187.
[3]
Pedro Cano, Eloi Batlle, E Batle, T Kalker, and J Haitsma. 2002. A review of algorithms for audio fingerprinting. In Multimedia Signal Processing, 2002 IEEE Workshop on. 169--173.
[4]
M. Conti, I. Zachia-Zlatea, and Bruno Crispo. 2011. Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (2011), 249--259.
[5]
Cory Cornelius, Ronald Peterson, Joseph Skinner, Ryan Halter, and David Kotz. 2014. A Wearable System That Knows Who Wears It. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '14). ACM, New York, NY, USA, 55--67.
[6]
S. Davis and P. Mermelstein. 1980. Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences. IEEE Transactions on Acoustics, Speech, and Signal Processing 28, 4 (1980).
[7]
Paula Henry and Tomasz R Letowski. 2007. Bone Conduction : Anatomy, Physiology, and Communication. May (2007).
[8]
Christian Holz, Senaka Buthpitiya, and Marius Knaust. 2015. Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 3011--3014.
[9]
Grace Hu, Lily Chen, Johanna Okerlund, and Orit Shaer. 2015. Exploring the Use of Google Glass in Wet Laboratories. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 2103--2108.
[10]
Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. arXiv:1503.03790 {cs} (2015). http://arxiv.org/abs/1503.03790
[11]
Paul Lukowicz, Andreas Poxrucker, Jens Weppner, B. Bischke, Jochen Kuhn, and Michael Hirth. 2015. Glass-physics: Using Google Glass to Support High School Physics Experiments. In Proceedings of the 2015 ACM International Symposium on Wearable Computers. 151--154.
[12]
Emanuele Maiorana, Patrizio Campisi, Noelia Gonzalez-Carballo, and Alessandro Neri. 2011. Keystroke dynamics authentication for mobile phones. Proceedings of the 2011 ACM Symposium on Applied Computing SAC 11 (2011), 21--26.
[13]
J Mantyjarvi, M Lindholm, E Vildjiounaite, S.-M. Makela, and H A Ailisto. 2005. Identifying users of portable devices from gait pattern with accelerometers. In Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on, Vol. 2. ii/973--ii/976 Vol. 2.
[14]
Oliver J Muensterer, Martin Lacher, Christoph Zoeller, Matthew Bronstein, and Joachim Kübler. 2014. Google Glass in pediatric surgery: An exploratory study. International Journal of Surgery 12, 4 (2014), 281--289.
[15]
William D. Jr. O'Brien and Y Liu. 2005. Evaluation of acoustic propagation paths into the human head. 2005 (2005), 1--24. http://oai.dtic.mil/oai/oai?verb= getRecord&metadataPrefix=html&identifier= ADA437351
[16]
P. Jonathon Phillips, Alvin Martin, C. L. Wilson, and Mark Przybocki. 2000. Introduction to evaluating biometric systems. Computer 33, 2 (2000), 56--63.
[17]
Axel Plinge, Rene Grzeszick, and Gernot A. Fink. 2014. A Bag-of-Features approach to acoustic event detection. In 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 3704--3708.
[18]
Sandra Pruzansky. 1963. Pattern Matching Procedure for Automatic Talker Recognition. The Journal of the Acoustical Society of America 35, 3 (1963), 214--215.
[19]
Cynthia E Rogers, Alexander W Witt, Alexander D Solomon, and Krishna K Venkatasubramanian. 2015. An Approach for User Identification for Head-mounted Displays. In Proceedings of the 2015 ACM International Symposium on Wearable Computers (ISWC '15). ACM, New York, NY, USA, 143--146.
[20]
Stefan Schneegass, Frank Steimle, Andreas Bulling, Florian Alt, and Albrecht Schmidt. 2014. SmudgeSafe: Geometric Image Transformations for Smudge-resistant User Authentication. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14). ACM, New York, NY, USA, 775--786.
[21]
Mark Simkin, Dominique Schrder, Andreas Bulling, and Mario Fritz. 2014. Ubic: Bridging the Gap between Digital Cryptography and the Physical World. In Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014) (2014-09-01), Vol. 8712. Springer International Publishing, 56--75. http://dx.doi.org/10.1007/978--3--319--11203--9_ 4https://perceptual.mpi-inf.mpg.de/files/2014/ 09/Simkin14_ubic1.pdf
[22]
Stefan Stenfelt and Richard L Goode. 2005. Transmission properties of bone conducted sound: measurements in cadaver heads. The Journal of the Acoustical Society of America 118, 4 (2005), 2373--2391.

Cited By

View all
  • (2024)Ethical Dilemmas in the MetaverseExploring the Use of Metaverse in Business and Education10.4018/979-8-3693-5868-9.ch003(35-46)Online publication date: 12-Apr-2024
  • (2024)Recent Trends of Authentication Methods in Extended Reality: A SurveyApplied System Innovation10.3390/asi70300457:3(45)Online publication date: 28-May-2024
  • (2024)HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact ResponseProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997808:4(1-27)Online publication date: 21-Nov-2024
  • Show More Cited By

Index Terms

  1. SkullConduct: Biometric User Identification on Eyewear Computers Using Bone Conduction Through the Skull

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems
      May 2016
      6108 pages
      ISBN:9781450333627
      DOI:10.1145/2858036
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 May 2016

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Google glass
      2. bone conduction
      3. eyewear computer
      4. user authentication
      5. user identification

      Qualifiers

      • Note

      Conference

      CHI'16
      Sponsor:
      CHI'16: CHI Conference on Human Factors in Computing Systems
      May 7 - 12, 2016
      California, San Jose, USA

      Acceptance Rates

      CHI '16 Paper Acceptance Rate 565 of 2,435 submissions, 23%;
      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)86
      • Downloads (Last 6 weeks)7
      Reflects downloads up to 23 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Ethical Dilemmas in the MetaverseExploring the Use of Metaverse in Business and Education10.4018/979-8-3693-5868-9.ch003(35-46)Online publication date: 12-Apr-2024
      • (2024)Recent Trends of Authentication Methods in Extended Reality: A SurveyApplied System Innovation10.3390/asi70300457:3(45)Online publication date: 28-May-2024
      • (2024)HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact ResponseProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997808:4(1-27)Online publication date: 21-Nov-2024
      • (2024)Medusa3D: The Watchful Eye Freezing Illegitimate Users in Virtual Reality InteractionsProceedings of the ACM on Human-Computer Interaction10.1145/36765158:MHCI(1-21)Online publication date: 24-Sep-2024
      • (2024)Water Level Recognition by Analyzing the Sound when Pouring WaterCompanion of the 2024 on ACM International Joint Conference on Pervasive and Ubiquitous Computing10.1145/3675094.3678440(464-469)Online publication date: 5-Oct-2024
      • (2024)Recordkeeping in Voice-based Remote Community EngagementProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642779(1-16)Online publication date: 11-May-2024
      • (2024)SkullID: Through-Skull Sound Conduction based Authentication for SmartglassesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642506(1-19)Online publication date: 11-May-2024
      • (2024)Analysis and Design of Efficient Authentication Techniques for Password Entry with the Qwerty Keyboard for VR EnvironmentsIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2024.345619530:11(7075-7085)Online publication date: 1-Nov-2024
      • (2024)WristPass: Secure Wearable Continuous Authentication via Ultrasonic Sensing2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS)10.1109/IWQoS61813.2024.10682871(1-10)Online publication date: 19-Jun-2024
      • (2023)Identification and Authentication using Clavicles2023 62nd Annual Conference of the Society of Instrument and Control Engineers (SICE)10.23919/SICE59929.2023.10354211(1141-1145)Online publication date: 6-Sep-2023
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media