Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

AFace: Range-flexible Anti-spoofing Face Authentication via Smartphone Acoustic Sensing

Published: 06 March 2024 Publication History

Abstract

User authentication on smartphones needs to balance both security and convenience. Many image-based face authentication methods are vulnerable to spoofing and are plagued by privacy breaches, so models based on acoustic sensing have emerged to achieve reliable user authentication. However, they can only achieve reasonable performance under specific conditions (i.e., a fixed range), and they can not resist 3D printing attacks. To address these limitations, we present a novel user authentication system, referred to as AFace. The system mainly consists of two parts: an iso-depth model and a range-adaptive (RA) algorithm. The iso-depth model establishes a connection between acoustic echoes and facial structures, while taking into account the influence of biological materials on echo energy, making it resistant to 3D printing attacks (as it's difficult to replicate material information in 3D printing). RA algorithm can adaptively compensate for the distance between the user and the smartphone, enabling flexible authentication modes. Results from experiments with 40 volunteers demonstrate that AFace achieves an average accuracy of 96.9% and an F1 score of 96.9%, and no image/video-based attack is observed to succeed in spoofing.

References

[1]
Da Ai, Weixin Fan, Kai Jia, Mingyue Lu, and Ying Liu. 2022. A Method of Dual-Spectrum Feature Fusion for Face Recognition Under Non-Ideal Lighting Conditions. In Proceedings of the 4th International Symposium on Signal Processing Systems (Xi'an, China) (SSPS '22). Association for Computing Machinery, New York, NY, USA, 36--41. https://doi.org/10.1145/3532342.3532348
[2]
Jorge P Arenas and Malcolm J Crocker. 2010. Recent trends in porous sound-absorbing materials. Sound & vibration 44, 7 (2010), 12--18.
[3]
Y. Bai, L. Lu, J. Cheng, J. Liu, and J. Yu. 2020. Acoustic-based sensing and applications: A survey. Computer Networks 181 (2020), 107447.
[4]
Z. Boulkenafet, J. Komulainen, and A. Hadid. 2017. Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding. IEEE Signal Processing Letters 24, 2 (2017), 141--145.
[5]
Rizhao Cai, Haoliang Li, Shiqi Wang, Changsheng Chen, and Alex C. Kot. 2021. DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing. IEEE Trans. Inf. Forensics Secur. 16 (2021), 937--951. https://doi.org/10.1109/TIFS.2020.3026553
[6]
Kai Cao and Anil K Jain. 2018. Automated latent fingerprint recognition. IEEE transactions on pattern analysis and machine intelligence 41, 4 (2018), 788--800.
[7]
Jagmohan Chauhan, Yining Hu, Suranga Seneviratne, Archan Misra, Aruna Seneviratne, and Youngki Lee. 2017. BreathPrint: Breathing Acoustics-based User Authentication. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys'17, Niagara Falls, NY, USA, June 19-23, 2017, Tanzeem Choudhury, Steven Y. Ko, Andrew Campbell, and Deepak Ganesan (Eds.). ACM, 278--291. https://doi.org/10.1145/3081333.3081355
[8]
Huangxun Chen, Wei Wang, Jin Zhang, and Qian Zhang. 2019. Echoface: Acoustic sensor-based media attack detection for face authentication. IEEE Internet of Things Journal 7, 3 (2019), 2152--2159.
[9]
Yongliang Chen, Tao Ni, Weitao Xu, and Tao Gu. 2022. SwipePass: Acoustic-based Second-factor User Authentication for Smartphones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 3 (2022), 1--25.
[10]
Yimin Chen, Jingchao Sun, Xiaocong Jin, Tao Li, Rui Zhang, and Yanchao Zhang. 2017. Your face your heart: Secure mobile face authentication with photoplethysmograms. In 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017. IEEE, 1--9. https://doi.org/10.1109/INFOCOM.2017.8057220
[11]
Bkav Corp. 2017. How Bkav tricked iPhone X's Face ID with a mask. https://www.youtube.com/watch?v=i4YQRLQVixM.
[12]
Nesli Erdogmus and Sébastien Marcel. 2013. Spoofing 2D Face Recognition Systems with 3D Masks. In 2013 BIOSIG - Proceedings of the 12th International Conference of Biometrics Special Interest Group, Darmstadt, Germany, September 4-6, 2013 (LNI, Vol. P-212), Arslan Brömme and Christoph Busch (Eds.). GI, 209--216. https://dl.gi.de/handle/20.500.12116/17670
[13]
Nesli Erdogmus and Sebastien Marcel. 2014. Spoofing face recognition with 3D masks. IEEE transactions on information forensics and security 9, 7 (2014), 1084--1097.
[14]
Habiba Farrukh, Reham Mohamed Aburas, Siyuan Cao, and He Wang. 2020. FaceRevelio: a face liveness detection system for smartphones with a single front camera. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking. 1--13.
[15]
Y. Jia, J. Zhang, S. Shan, and X. Chen. 2020. Single-Side Domain Generalization for Face Anti-Spoofing. In 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[16]
James Kirkpatrick, Razvan Pascanu, Neil Rabinowitz, Joel Veness, Guillaume Desjardins, Andrei A Rusu, Kieran Milan, John Quan, Tiago Ramalho, Agnieszka Grabska-Barwinska, et al. 2017. Overcoming catastrophic forgetting in neural networks. Proceedings of the national academy of sciences 114, 13 (2017), 3521--3526.
[17]
Klaus Kollreider, Hartwig Fronthaler, Maycel Isaac Faraj, and Josef Bigün. 2007. Real-Time Face Detection and Motion Analysis With Application in "Liveness" Assessment. IEEE Trans. Inf. Forensics Secur. 2, 3-2 (2007), 548--558. https://doi.org/10.1109/TIFS.2007.902037
[18]
Chenqi Kong, Kexin Zheng, Shiqi Wang, Anderson Rocha, and Haoliang Li. 2022. Beyond the Pixel World: A Novel Acoustic-Based Face Anti-Spoofing System for Smartphones. IEEE Transactions on Information Forensics and Security 17 (2022), 3238--3253.
[19]
Yan Li, Ke Xu, Qiang Yan, Yingjiu Li, and Robert H Deng. 2014. Understanding OSN-based facial disclosure against face authentication systems. In Proceedings of the 9th ACM symposium on Information, computer and communications security. 413--424.
[20]
Noel B Linsangan, Ayra G Panganiban, Paulo R Flores, Hazel Ann T Poligratis, Angelo S Victa, Jumelyn L Torres, and Jocelyn Villaverde. 2019. Real-time iris recognition system for non-ideal iris images. In Proceedings of the 2019 11th International Conference on Computer and Automation Engineering. 32--36.
[21]
Chao Liu, Penghao Wang, Ruobing Jiang, and Yanmin Zhu. 2021. AMT: Acoustic Multi-target Tracking with Smartphone MIMO System. In 40th IEEE Conference on Computer Communications, INFOCOM 2021, Vancouver, BC, Canada, May 10-13, 2021. IEEE, 1--10. https://doi.org/10.1109/INFOCOM42981.2021.9488768
[22]
Wenguang Mao, Mei Wang, and Lili Qiu. 2018. Aim: Acoustic imaging on a mobile. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. 468--481.
[23]
Ekaterina Maro and Maksim Kovalchuk. 2018. Bypass biometric lock systems with gelatin artificial fingerprint. In Proceedings of the 11th International Conference on Security of Information and Networks. 1--2.
[24]
Phillip McKerrow and Kok Kai Yoong. 2007. Classifying still faces with ultrasonic sensing. Robotics and Autonomous Systems 55, 9 (2007), 702--710.
[25]
Jingyi Ning, Lei Xie, Chuyu Wang, Yanling Bu, Fengyuan Xu, Da-Wei Zhou, Sanglu Lu, and Baoliu Ye. 2023. RF-Badge: Vital Sign-Based Authentication via RFID Tag Array on Badges. IEEE Transactions on Mobile Computing 22, 2 (2023), 1170--1184. https://doi.org/10.1109/TMC.2021.3097912
[26]
Gang Pan, Lin Sun, Zhaohui Wu, and Shihong Lao. 2007. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera. In IEEE 11th International Conference on Computer Vision, ICCV 2007, Rio de Janeiro, Brazil, October 14-20, 2007. IEEE Computer Society, 1--8. https://doi.org/10.1109/ICCV.2007.4409068
[27]
Gang Pan, Lin Sun, Zhaohui Wu, and Shihong Lao. 2007. Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In 2007 IEEE 11th international conference on computer vision. IEEE, 1--8.
[28]
K. Patel, H. Han, and A. K. Jain. 2016. Secure Face Unlock: Spoof Detection on SmartPhones. IEEE Transactions on Information Forensics & Security 11, 10 (2016), 2268--2283.
[29]
Joaquin Quiñonero-Candela, Masashi Sugiyama, Anton Schwaighofer, and Neil D. Lawrence. 2008. Dataset Shift in Machine Learning. The MIT Press. https://doi.org/10.7551/mitpress/9780262170055.001.0001
[30]
Kiran B Raja, Ramachandra Raghavendra, Vinay Krishna Vemuri, and Christoph Busch. 2015. Smartphone based visible iris recognition using deep sparse filtering. Pattern Recognition Letters 57 (2015), 33--42.
[31]
Steve Ranger. [n. d.]. iPhone X: This is how much it costs to make one, in components. https://www.zdnet.com/article/iphone-x-this-is-how-much-it-costs-to-make-in-components/.
[32]
Sylvestre-Alvise Rebuffi, Alexander Kolesnikov, Georg Sperl, and Christoph H. Lampert. 2017. iCaRL: Incremental Classifier and Representation Learning. (2017). arXiv:1611.07725 [cs.CV]
[33]
Antoaneta Roussi. 2020. Resisting the rise of facial recognition. Nature 587 (2020), 350--353. https://api.semanticscholar.org/CorpusID:227068107
[34]
Yunpeng Song, Zhongmin Cai, and Zhi-Li Zhang. 2017. Multi-touch authentication using hand geometry and behavioral information. In 2017 IEEE symposium on security and privacy (SP). IEEE, 357--372.
[35]
Chris Stein, Claudia Nickel, and Christoph Busch. 2012. Fingerphoto recognition with smartphone cameras. In 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG). IEEE, 1--12.
[36]
Lin Sun, Gang Pan, Zhaohui Wu, and Shihong Lao. 2007. Blinking-Based Live Face Detection Using Conditional Random Fields. In Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings (Lecture Notes in Computer Science, Vol. 4642), Seong-Whan Lee and Stan Z. Li (Eds.). Springer, 252--260. https://doi.org/10.1007/978-3-540-74549-5_27
[37]
Furkan Tari, A Ant Ozok, and Stephen H Holden. 2006. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In Proceedings of the second symposium on Usable privacy and security. 56--66.
[38]
Jindong Wang, Cuiling Lan, Chang Liu, Yidong Ouyang, and Tao Qin. 2021. Generalizing to Unseen Domains: A Survey on Domain Generalization. In Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, IJCAI 2021, Virtual Event / Montreal, Canada, 19-27 August 2021, Zhi-Hua Zhou (Ed.). ijcai.org, 4627--4635. https://doi.org/10.24963/IJCAI.2021/628
[39]
Penghao Wang, Ruobing Jiang, and Chao Liu. 2022. Amaging: Acoustic Hand Imaging for Self-adaptive Gesture Recognition. In IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, London, United Kingdom, May 2-5, 2022. IEEE, 80--89. https://doi.org/10.1109/INFOCOM48880.2022.9796906
[40]
Tao Wang, Zhigao Zheng, Ali Kashif Bashir, Alireza Jolfaei, and Yanyan Xu. 2021. FinPrivacy: a privacy-preserving mechanism for fingerprint identification. ACM Transactions on Internet Technology (TOIT) 21, 3 (2021), 1--15.
[41]
Wei Wang, Alex X Liu, and Muhammad Shahzad. 2016. Gait recognition using wifi signals. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. 363--373.
[42]
Zi Wang, Sheng Tan, Linghan Zhang, Yili Ren, Zhi Wang, and Jie Yang. 2021. An ear canal deformation based continuous user authentication using earables. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. 819--821.
[43]
Zi Wang, Sheng Tan, Linghan Zhang, Yili Ren, Zhi Wang, and Jie Yang. 2021. EarDynamic: An Ear Canal Deformation Based Continuous User Authentication Using In-Ear Wearables. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 1 (2021), 1--27.
[44]
Weiye Xu, Jianwei Liu, Shimin Zhang, Yuanqing Zheng, Feng Lin, Jinsong Han, Fu Xiao, and Kui Ren. 2021. RFace: anti-spoofing facial authentication using cots rfid. In IEEE INFOCOM 2021-IEEE Conference on Computer Communications. IEEE, 1--10.
[45]
Weiye Xu, Wenfan Song, Jianwei Liu, Yajie Liu, Xin Cui, Yuanqing Zheng, Jinsong Han, Xinhuai Wang, and Kui Ren. 2022. Mask does not matter: Anti-spoofing face authentication using mmWave without on-site registration. In Proceedings of the 28th Annual International Conference on Mobile Computing and Networking. 310--323.
[46]
Wei Xu, Zhiwen Yu, Zhu Wang, Bin Guo, and Qi Han. 2019. AcousticID: Gait-based Human Identification Using Acoustic Signal. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3, 3 (2019), 115:1--115:25. https://doi.org/10.1145/3351273
[47]
Shulin Yang, Yantong Wang, Xiaoxiao Yu, Yu Gu, and Fuji Ren. 2020. User Authentication leveraging behavioral information using Commodity WiFi devices. In 2020 IEEE/CIC International Conference on Communications in China (ICCC). 530--535. https://doi.org/10.1109/ICCC49849.2020.9238889
[48]
Z. Yu, X. Li, J. Shi, Z. Xia, and G. Zhao. 2021. Revisiting Pixel-Wise Supervision for Face Anti-Spoofing. IEEE Transactions on Biometrics Behavior and Identity Science PP, 99 (2021), 1--1.
[49]
Jie Zhang, Xiaolong Zheng, Zhanyong Tang, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang, Rong Li, Xiaoqing Gong, and Feng Chen. 2016. Privacy leakage in mobile sensing: Your unlock passwords can be leaked through wireless hotspot functionality. Mobile Information Systems 2016 (2016).
[50]
Yi Zhang, Yue Zheng, Guidong Zhang, Kun Qian, Chen Qian, and Zheng Yang. 2021. GaitSense: towards ubiquitous gait-based human identification with Wi-Fi. ACM Transactions on Sensor Networks (TOSN) 18, 1 (2021), 1--24.
[51]
Bing Zhou, Jay Lohokare, Ruipeng Gao, and Fan Ye. 2018. Echoprint: Two-factor authentication using acoustics and vision on smartphones. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. 321--336.
[52]
Bing Zhou, Zongxing Xie, Yinuo Zhang, Jay Lohokare, Ruipeng Gao, and Fan Ye. 2021. Robust Human Face Authentication Leveraging Acoustic Sensing on Smartphones. IEEE Transactions on Mobile Computing (2021).
[53]
Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, and Xiaofeng Chen. 2018. Patternlistener: Cracking android pattern lock using acoustic signals. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1775--1787.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 8, Issue 1
March 2024
1182 pages
EISSN:2474-9567
DOI:10.1145/3651875
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 March 2024
Published in IMWUT Volume 8, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. acoustic
  2. anti-spoofing
  3. authentication
  4. privacy protect

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 203
    Total Downloads
  • Downloads (Last 12 months)203
  • Downloads (Last 6 weeks)20
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media