ABSTRACT
Recent mobile phones integrate fingerprint scanners to authenticate users biometrically and replace passwords, making authentication more convenient for users. However, due to their cost, capacitive fingerprint scanners have been limited to top-of-the-line phones, a result of the required resolution and quality of the sensor. We present Bodyprint, a biometric authentication system that detects users' biometric features using the same type of capacitive sensing, but uses the touchscreen as the image sensor instead. While the input resolution of a touchscreen is ~6 dpi, the surface area is larger, allowing the touch sensor to scan users' body parts, such as ears, fingers, fists, and palms by pressing them against the display. Bodyprint compensates for the low input resolution with an increased false rejection rate, but does not compromise on authentication precision: In our evaluation with 12 participants, Bodyprint classified body parts with 99.98% accuracy and identifies users with 99.52% accuracy with a retry likelihood of 26.82% to prevent false positives, thereby bringing reliable biometric user authentication to a vast number of commodity devices.
- Abate, A.F., Nappi, M., Riccio, D., Sabatino, G. 2D and 3D face recognition. Pattern Recognition Letters (28):14, 2007. Google ScholarDigital Library
- Bay, H., Ess, A., Tuytelaars, T., Van Gool, L. Speededup Robust Features. Proc. CVIU '07, 346--359. Google ScholarDigital Library
- Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., Möller, S. On the need for different security methods on mobile phones. Proc. MobileHCI '11. Google ScholarDigital Library
- Biddle, R., Chiasson, S., Van Oorschot, P. Graphical passwords: Learning from the first twelve years. ACM Computing Surveys, (44)4, 2012. Google ScholarDigital Library
- Bo, C., Zhang, L., Li, X., Huang, Q., Wang, Y. SilentSense: silent user identification via touch and movement behavioral biometrics. Proc. MobiCom '13. Google ScholarDigital Library
- Burge, M. and Burger, W. Ear biometrics. Biometrics 273--285, Springer US, 1996.Google Scholar
- Cho, D., Park, K.R., Rhee, D.W., Kim, Y., Yang, J. Pupil and Iris Localization for Iris Recognition in Mobile Phones. Proc. SNPD '06, 197--201. Google ScholarDigital Library
- Everitt, K., Bragin, T., Fogarty, J., Kohno, T. A comprehensive study of frequency, interference, and training of multiple graphical passwords. Proc. CHI '09. Google ScholarDigital Library
- Harrison, C., Sato, M., Poupyrev, I. Capacitive Fingerprinting: Exploring User Differentiation by Sensing Electrical Properties of the Human Body. Proc. UIST '12. Google ScholarDigital Library
- Holz, C. and Baudisch, P. Fiberio: A Touchscreen that Senses Fingerprints. Proc. UIST '13, 41--50. Google ScholarDigital Library
- Holz, C. and Baudisch, P. The Generalized Perceived Input Point Model and How to Double Touch Accuracy by Extracting Fingerprints. Proc. CHI '10, 581--590. Google ScholarDigital Library
- Kirschnick, N., Kratz, S. and Moller, S. An improved approach to gesture-based authentication for mobile devices. Proc. SOUPS '10.Google Scholar
- Kurkovsky, S. and Syta, E. Digital natives and mobile phones: A survey of practices and attitudes about privacy and security. Proc. ISTAS '10, 441--449.Google Scholar
- Richter, S., Holz, C., Baudisch, P. Bootstrapper: Recognizing Tabletop Users by their Shoes. Proc CHI '12. Google ScholarDigital Library
Index Terms
- Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts
Recommendations
Pulse-Response: Exploring Human Body Impedance for Biometric Recognition
Biometric characteristics are often used as a supplementary component in user authentication and identification schemes. Many biometric traits, both physiological and behavioral, offering a wider range of security and stability, have been explored. We ...
Typing Patterns: A Key to User Identification
The deficiencies of traditional password-based access systems have become more acute as these systems have grown in size and scope. Researchers are actively investigating ways to improve the security of password systems or offer replacements. One ...
Demo: user identification and authentication with capacitive touch communication
MobiSys '12: Proceedings of the 10th international conference on Mobile systems, applications, and servicesToday's identification and authentication mechanisms for touchscreen-enabled devices are cumbersome and do not support brief usage and device sharing. To address this challenge, this work explores a novel form of "wireless" communication that exploits ...
Comments