Skip to main content

2018 | OriginalPaper | Buchkapitel

Secure Device Pairing via Facial Image Similarity

verfasst von : Zhiping Jiang, Rui Li, Kun Zhao, Shuaiyu Chen

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose a secure key pairing system, FaceMatch, to enable confidential communication for smartphones. The idea is to leverage a natural human interaction mode: face-to-face interaction. Two users raise up their smartphones to establish a secure channel based on their similar observations via the smartphones’ cameras. One user acts as the initiator and uses the front-facing camera to snap his/her face. The other user captures the initiator’s face using his/her rear camera. Utilizing the facial appearance as a secret substitution, the initiator delivers a randomly generated key to the other user. Based on this key, two users establish a confidential communication channel between their devices. FaceMatch achieves secure device pairing without the complex operations needed in prior works. We implemented FaceMatch using off-the-shelf iPhones. The experimental results show that FaceMatch can establish a 128-bit encrypted connection in less than 3 s.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cai, L., Zeng, K., Chen, H., Mohapatra, P.: Good neighbor: ad hoc pairing of nearby wireless devices by multiple antennas. In: Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, U.S. (2011) Cai, L., Zeng, K., Chen, H., Mohapatra, P.: Good neighbor: ad hoc pairing of nearby wireless devices by multiple antennas. In: Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, U.S. (2011)
2.
Zurück zum Zitat Cristinacce, D., Cootes, T.F.: Feature detection and tracking with constrained local models. In: British Machine Vision Conference 2006, Edinburgh, UK, pp. 929–938 (2006) Cristinacce, D., Cootes, T.F.: Feature detection and tracking with constrained local models. In: British Machine Vision Conference 2006, Edinburgh, UK, pp. 929–938 (2006)
3.
Zurück zum Zitat Farb, M., Lin, Y.H., Kim, H.J., Mccune, J., Perrig, A.: Safeslinger: easy-to-use and secure public-key exchange. In: ACM International Conference on Mobile Computing and Networking (ACM MobiCom), pp. 417–428 (2013) Farb, M., Lin, Y.H., Kim, H.J., Mccune, J., Perrig, A.: Safeslinger: easy-to-use and secure public-key exchange. In: ACM International Conference on Mobile Computing and Networking (ACM MobiCom), pp. 417–428 (2013)
4.
Zurück zum Zitat Halperin, D., Hu, W., Sheth, A., Wetherall, D.: Tool release: gathering 802.11n traces with channel state information. ACM SIGCOMM Comput. Commun. Rev. 41(1), 53 (2011)CrossRef Halperin, D., Hu, W., Sheth, A., Wetherall, D.: Tool release: gathering 802.11n traces with channel state information. ACM SIGCOMM Comput. Commun. Rev. 41(1), 53 (2011)CrossRef
5.
Zurück zum Zitat He, X., Cai, D., Niyogi, P.: Laplacian score for feature selection. In: International Conference on Neural Information Processing Systems, pp. 507–514 (2005) He, X., Cai, D., Niyogi, P.: Laplacian score for feature selection. In: International Conference on Neural Information Processing Systems, pp. 507–514 (2005)
6.
Zurück zum Zitat Jain, A.K., Farrokhnia, F.: Unsupervised texture segmentation using gabor filters. Pattern Recogn. 24(12), 1167–1186 (1991)CrossRef Jain, A.K., Farrokhnia, F.: Unsupervised texture segmentation using gabor filters. Pattern Recogn. 24(12), 1167–1186 (1991)CrossRef
7.
Zurück zum Zitat Kalal, Z., Mikolajczyk, K., Matas, J.: Forward-backward error: automatic detection of tracking failures. In: International Conference on Pattern Recognition, pp. 2756–2759 (2010) Kalal, Z., Mikolajczyk, K., Matas, J.: Forward-backward error: automatic detection of tracking failures. In: International Conference on Pattern Recognition, pp. 2756–2759 (2010)
8.
Zurück zum Zitat Kalal, Z., Mikolajczyk, K., Matas, J.: Tracking-learning-detection. IEEE Trans. Pattern Anal. Mach. Intell. 34(7), 1409–1422 (2012)CrossRef Kalal, Z., Mikolajczyk, K., Matas, J.: Tracking-learning-detection. IEEE Trans. Pattern Anal. Mach. Intell. 34(7), 1409–1422 (2012)CrossRef
9.
Zurück zum Zitat Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1867–1874 (2014) Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1867–1874 (2014)
11.
Zurück zum Zitat Lee, D., Park, H., Chang, D.Y.: Face alignment using cascade Gaussian process regression trees. In: Computer Vision and Pattern Recognition, pp. 4204–4212 (2015) Lee, D., Park, H., Chang, D.Y.: Face alignment using cascade Gaussian process regression trees. In: Computer Vision and Pattern Recognition, pp. 4204–4212 (2015)
12.
Zurück zum Zitat Li, L., Zhao, X., Xue, G.: Near field authentication for smart devices. In: IEEE INFOCOM, pp. 375–379 (2013) Li, L., Zhao, X., Xue, G.: Near field authentication for smart devices. In: IEEE INFOCOM, pp. 375–379 (2013)
13.
Zurück zum Zitat Mathur, S., Miller, R., Varshavsky, A., Trappe, W., Mandayam, N.: Proximate: proximity-based secure pairing using ambient wireless signals. In: International Conference on Mobile Systems, Applications, and Services, pp. 211–224 (2011) Mathur, S., Miller, R., Varshavsky, A., Trappe, W., Mandayam, N.: Proximate: proximity-based secure pairing using ambient wireless signals. In: International Conference on Mobile Systems, Applications, and Services, pp. 211–224 (2011)
14.
Zurück zum Zitat Matthews, I., Baker, S.: Active appearance models revisited. Int. J. Comput. Vis. 60(2), 135–164 (2004)CrossRef Matthews, I., Baker, S.: Active appearance models revisited. Int. J. Comput. Vis. 60(2), 135–164 (2004)CrossRef
18.
Zurück zum Zitat Nandakumar, R., Chintalapudi, K.K., Padmanabhan, V., Venkatesan, R.: Dhwani: secure peer-to-peer acoustic NFC. In: ACM SIGCOMM, pp. 63–74 (2013)CrossRef Nandakumar, R., Chintalapudi, K.K., Padmanabhan, V., Venkatesan, R.: Dhwani: secure peer-to-peer acoustic NFC. In: ACM SIGCOMM, pp. 63–74 (2013)CrossRef
19.
Zurück zum Zitat Sauer, P., Cootes, T., Taylor, C.: Accurate regression procedures for active appearance models. In: BMVC, vol. 1(6), pp. 681–685 (2011) Sauer, P., Cootes, T., Taylor, C.: Accurate regression procedures for active appearance models. In: BMVC, vol. 1(6), pp. 681–685 (2011)
20.
Zurück zum Zitat Schurmann, D., Sigg, S.: Secure communication based on ambient audio. IEEE Trans. Mob. Comput. 12(2), 358–370 (2013)CrossRef Schurmann, D., Sigg, S.: Secure communication based on ambient audio. IEEE Trans. Mob. Comput. 12(2), 358–370 (2013)CrossRef
21.
Zurück zum Zitat Seshadri, K., Savvides, M.: Robust modified active shape model for automatic facial landmark annotation of frontal faces. In: IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp. 1–8 (2009) Seshadri, K., Savvides, M.: Robust modified active shape model for automatic facial landmark annotation of frontal faces. In: IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp. 1–8 (2009)
22.
Zurück zum Zitat Sethi, M., Antikainen, M., Aura, T.: Commitment-based device pairing with synchronized drawing. In: IEEE PerCom 2014 (2014) Sethi, M., Antikainen, M., Aura, T.: Commitment-based device pairing with synchronized drawing. In: IEEE PerCom 2014 (2014)
23.
Zurück zum Zitat Sun, Z., Purohit, A., Bose, R., Zhang, P.: Spartacus: spatially-aware interaction for mobile devices through energy-efficient audio sensing. In: Proceeding of the International Conference on Mobile Systems, Applications, and Services, pp. 263–276 (2013) Sun, Z., Purohit, A., Bose, R., Zhang, P.: Spartacus: spatially-aware interaction for mobile devices through energy-efficient audio sensing. In: Proceeding of the International Conference on Mobile Systems, Applications, and Services, pp. 263–276 (2013)
24.
Zurück zum Zitat Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: IEEE Computer Society Conference on Computer Vision & Pattern Recognition, p. 511 (2001) Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: IEEE Computer Society Conference on Computer Vision & Pattern Recognition, p. 511 (2001)
25.
Zurück zum Zitat Xi, W., et al.: Keep: fast secret key extraction protocol for D2D communication. In: IEEE International Symposium of Quality of Service (IWQOS), pp. 350–359 (2014) Xi, W., et al.: Keep: fast secret key extraction protocol for D2D communication. In: IEEE International Symposium of Quality of Service (IWQOS), pp. 350–359 (2014)
26.
Zurück zum Zitat Zhang, S., Bauckhage, C., Cremers, A.B.: Informed haar-like features improve pedestrian detection. In: Computer Vision and Pattern Recognition, pp. 947–954 (2014) Zhang, S., Bauckhage, C., Cremers, A.B.: Informed haar-like features improve pedestrian detection. In: Computer Vision and Pattern Recognition, pp. 947–954 (2014)
Metadaten
Titel
Secure Device Pairing via Facial Image Similarity
verfasst von
Zhiping Jiang
Rui Li
Kun Zhao
Shuaiyu Chen
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00021-9_2