skip to main content
research-article

Pulse-Response: Exploring Human Body Impedance for Biometric Recognition

Published:25 May 2017Publication History
Skip Abstract Section

Abstract

Biometric characteristics are often used as a supplementary component in user authentication and identification schemes. Many biometric traits, both physiological and behavioral, offering a wider range of security and stability, have been explored. We propose a new physiological trait based on the human body’s electrical response to a square pulse signal, called pulse-response, and analyze how this biometric characteristic can be used to enhance security in the context of two example applications: (1) an additional authentication mechanism in PIN entry systems and (2) a means of continuous authentication on a secure terminal. The pulse-response biometric recognition is effective because each human body exhibits a unique response to a signal pulse applied at the palm of one hand and measured at the palm of the other. This identification mechanism integrates well with other established methods and could offer an additional layer of security, either on a continuous basis or at log-in time. We build a proof-of-concept prototype and perform experiments to assess the feasibility of pulse-response for biometric authentication. The results are very encouraging, achieving an equal error rate of 2% over a static dataset and 9% over a dataset with samples taken over several weeks. We also quantize resistance to attack by estimating individual worst-case probabilities for zero-effort impersonation in different experiments.

References

  1. L. C. F. Araujo, L. H. R. Sucupira, Jr., M. G. Lizarraga, L. L. Ling, and J. B. T. Yabu-Uti. 2005. User authentication through typing biometrics features. IEEE Transactions on Signal Processing 53, 2, 851--855. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Salil P. Banerjee and Damon L. Woodard. 2012. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research 7, 1 116--139.Google ScholarGoogle ScholarCross RefCross Ref
  3. Claude Barral and Assia Tria. 2009. Fake fingers in fingerprint recognition: Glycerin supersedes gelatin. In Formal to Practical Security, Vronique Cortier, Claude Kirchner, Mitsuhiro Okada, and Hideki Sakurada (Eds.). Lecture Notes in Computer Science, Vol. 5458. Springer, Berlin, 57--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Saleh Bleha, Charles Slivinsky, and Bassam Hussien. 1990. Computer-access security systems using keystroke dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence 12, 12, 1217--1222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Arman Boehm, Dongqu Chen, Mario Frank, Ling Huang, Cynthia Kuo, Tihomir Lolic, Ivan Martinovic, and Dawn Song. 2013. SAFE: Secure authentication with face and eyes. In International Conference on Privacy and Security in Mobile Systems (PRISMS’13). 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  6. Sungzoon Cho, Chigeun Han, Dae Hee Han, and Hyung il Kim. 2000. Web based keystroke dynamics identity verification using neural network. Journal of Organizational Computing and Electronic Commerce 10, 295--307.Google ScholarGoogle ScholarCross RefCross Ref
  7. Nathan L. Clarke and Steven Furnell. 2007. Advanced user authentication for mobile devices. Computers 8 Security 26, 2, 109--119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cory Cornelius, Ronald Peterson, Joseph Skinner, Ryan Halter, and David Kotz. 2014. A wearable system that knows who wears it. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’14). 55--67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Cory Cornelius, Jacob Sorber, Ronald A. Peterson, Joe Skinner, Ryan J. Halter, and David Kotz. 2012. Who wears me? Bioimpedance as a passive biometric. In Proceedings of the 3rd USENIX Workshop on Health Security and Privacy (HealthSec’12), Carl A. Gunter and Zachary N. J. Peterson (Eds.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, and Heinrich Hussmann. 2012. Touch me once and I know it’s you!: Implicit authentication based on touch screen patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’12). ACM, New York, NY, 987--996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. I. Deutschmann, P. Nordstrom, and L. Nilsson. 2013. Continuous authentication using behavioral biometrics. IT Professional 15, 4, 12--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, and Ivan Martinovic. 2015. Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics. In 22nd Annual Network and Distributed System Security Symposium (NDSS’15), San Diego, CA, February 8-11, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  13. Tom Fawcett. 2006. An introduction to ROC analysis. Pattern Recognition Letters 27, 8, 861--874. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Tao Feng, Ziyi Liu, Kyeong-An Kwon, Weidong Shi, B. Carbunar, Yifei Jiang, and N. Nguyen. 2012. Continuous mobile authentication using touchscreen gestures. In IEEE Conference on Technologies for Homeland Security (HST’12). 451--456.Google ScholarGoogle Scholar
  15. Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security 8, 1, 136--148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Javier Galbally, Arun Ross, Marta Gomez-Barrero, Julian Fierrez, and Javier Ortega-Garcia. 2012. From the Iriscode to the Iris: A new vulnerability of iris recognition systems. White paper. In Briefings of the Black Hat Conference.Google ScholarGoogle Scholar
  17. Hugo Gamboa and Ana Fred. 2004. A behavioral biometric system based on human-computer interaction, In Biometric Technology for Human Identification. Proceedings of SPIE 5404, 381--392.Google ScholarGoogle Scholar
  18. R. Giot, M. El-Abed, and C. Rosenberger. 2009. Keystroke dynamics with low constraints SVM based passphrase enrollment. In IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems (BTAS’09). 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Daniele Gunetti and Claudia Picardi. 2005. Keystroke analysis of free text. ACM Transactions on Information and System Security 8, 3, 312--347. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Payas Gupta and Debin Gao. 2010. Fighting coercion attacks in key generation using skin conductance. In Proceedings of the 19th USENIX Conference on Security (USENIX Security’10). USENIX Association, Berkeley, CA, 30--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sylvain Hocquet, J.-Y. Ramel, and Hubert Cardot. 2005. Fusion of methods for keystroke dynamic authentication. In 4th IEEE Workshop on Automatic Identification Advanced Technologies (AutoID’05). IEEE, 224--229. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Christian Holz and Marius Knaust. 2015. Biometric touch sensing: Seamlessly augmenting each touch with continuous authentication. In Proceedings of the 28th Annual ACM Symposium on User Interface Software 8 Technology. ACM, 303--312. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Information Technology Laboratory -- National Institute of Standards and Technology. 2013. The Biometrics Resource Center. http://www.nist.gov/itl/csd/biometrics/index.cfm.Google ScholarGoogle Scholar
  24. Anil K. Jain, Arun Ross, and Karthik Nandakumar. 2011. Introduction to Biometrics. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Anil K. Jain, Arun Ross, and Sharath Pankanti. 2006. Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security 1, 2, 125--143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Zach Jorgensen and Ting Yu. 2011. On mouse dynamics as a behavioral biometric for authentication. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS’11). 476--482. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Rick Joyce and Gopal Gupta. 1990. Identity authentication based on keystroke latencies. Communications of the ACM 33, 2, 168--176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Kevin S. Killourhy. 2012. A Scientific Understanding of Keystroke Dynamics. Ph.D. Dissertation. Carnegie Mellon University, Pittsburgh, PA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Lyra Nara. 2013. Hand Electrodes Brass (1 Pair). (2013). Retrieved April 15, 2017 from http://www.lyranara.com/hand-electrodes-brass-1-pair/.Google ScholarGoogle Scholar
  30. Orjan G. Martinsen and Sverre Grimnes. 2011. Bioimpedance and Bioelectricity Basics. Academic Press, Cambridge, MA.Google ScholarGoogle Scholar
  31. Fabian Monrose, Michael K. Reiter, and Susanne Wetzel. 1999. Password hardening based on keystroke dynamics. In Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS’99). 73--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Youssef Nakkabi, Issa Traoré, and Ahmed Awad E. Ahmed. 2010. Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Transactions on Systems, Man, and Cybernetics, Part A 40, 6, 1345--1353. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. National Science 8 Technology Council. 2006. Biometrics Frequently Asked Questions. http://biometrics.gov/Documents/FAQ.pdf.Google ScholarGoogle Scholar
  34. Minh Duc Nguyen and Quang Minh Bui. 2009. Your face is NOT your password: Face authentication bypassing - Lenovo - Asus - Toshiba. White paper. In Briefings of the Black Hat Conference.Google ScholarGoogle Scholar
  35. Koichiro Niinuma and Anil K. Jain. 2010. Continuous user authentication using temporal information. In Technology for Human Identification VII. Proceedings of SPIE 7667, 76670L--76670L--11.Google ScholarGoogle Scholar
  36. Maja Pusara and Carla E. Brodley. 2004. User re-authentication via mouse movements. In Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC’04). 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Kasper Bonne Rasmussen, Marc Roeschlin, Ivan Martinovic, and Gene Tsudik. 2014. Authentication using pulse-response biometrics. In Proceedings of the 21st Annual Network and Distributed System Security Symposium.Google ScholarGoogle Scholar
  38. Kenneth Revett and Sérgio Tenreiro de Magalhães. 2010. Cognitive biometrics: Challenges for the future. In Global Security, Safety, and Sustainability, Sérgio Tenreiro de Magalhães, Hamid Jahankhani, and Ali G. Hessami (Eds.). Communications in Computer and Information Science, Vol. 92. Springer, 79--86.Google ScholarGoogle Scholar
  39. Sensible Vision Inc. 2013. Facial Recognition Provides Continuous System Security. Retrieved April 15, 2017 from http://www.sensiblevision.com/en-us/fastaccessanywhere/overview.aspx.Google ScholarGoogle Scholar
  40. R. Spillane. 1975. Keyboard apparatus for personal identification. IBM Technical Disclosure Bulletin 17, 3346.Google ScholarGoogle Scholar
  41. Pin Shen Teh, Andrew Beng Jin Teoh, and Shigang Yue. 2013. A survey of keystroke dynamics biometrics. The Scientific World Journal 2013 (2013).Google ScholarGoogle Scholar
  42. Chee Meng Tey, Payas Gupta, and Debin Gao. 2013. I can be you: Questioning the use of keystroke dynamics as biometrics. In 20th Annual Network and Distributed System Security Symposium (NDSS’13), San Diego, California, February 24--27, 2013. http://internetsociety.org/doc/i-can-be-you-questioning-use-keystroke-dynamics-biometrics.Google ScholarGoogle Scholar
  43. Dat Tran, Wanli Ma, Girija Chetty, and Dharmendra Sharma. 2007. Fuzzy and Markov models for keystroke biometrics authentication. In Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization (SMO’07). World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, WI, 89--94. http://dl.acm.org/citation.cfm?id=1353862.1353878 Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. David Umphress and Glen Williams. 1985. Identity verification through keyboard characteristics. International Journal of Man-- Machine Studies 23, 3, 263--273.Google ScholarGoogle ScholarCross RefCross Ref
  45. VIRDI Biometric. 2009. How to make the fake fingerprints (by VIRDI). Video.Retrieved April 15, 2017 from http://www.youtube.com/watch?v=-H71tyMupqk last accessed 03.08.2013.Google ScholarGoogle Scholar
  46. John Woodward, Nicholas Orlans, and Peter Higgins. 2003. Biometrics. McGraw-Hill/Osborne, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Nan Zheng, Aaron Paloski, and Haining Wang. 2011. An efficient user verification system via mouse movements. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS’11). 139--150. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Pulse-Response: Exploring Human Body Impedance for Biometric Recognition

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Privacy and Security
          ACM Transactions on Privacy and Security  Volume 20, Issue 2
          May 2017
          87 pages
          ISSN:2471-2566
          EISSN:2471-2574
          DOI:10.1145/3064808
          Issue’s Table of Contents

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 May 2017
          • Accepted: 1 March 2017
          • Revised: 1 July 2016
          • Received: 1 January 2016
          Published in tops Volume 20, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader