skip to main content
10.1145/2594368.2594373acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones

Published:02 June 2014Publication History

ABSTRACT

Facial recognition is a popular biometric authentica-tion technique, but it is rarely used in practice for de-vice unlock or website / app login in smartphones, alt-hough most of them are equipped with a front-facing camera. Security issues (e.g. 2D media attack and vir-tual camera attack) and ease of use are two important factors that impede the prevalence of facial authentica-tion in mobile devices. In this paper, we propose a new sensor-assisted facial authentication method to over-come these limitations. Our system uses motion and light sensors to defend against 2D media attacks and virtual camera attacks without the penalty of authenti-cation speed. We conduct experiments to validate our method. Results show 95-97% detection rate and 2-3% false alarm rate over 450 trials in real-settings, indicat-ing high security obtained by the scheme ten times faster than existing 3D facial authentications (3 sec-onds compared to 30 seconds).

References

  1. R. Jenkins and A. Burton, 100% accuracy in automatic face recognition. Science, 319 (5862): 435, January 2008.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. F. Abate, M. Nappi, D. Riccio, and G. Sabatino. 2D and 3D face recognition: a survey. Pattern Recognition Letters, 28(14): 1885--1906, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. Pan, L. Sun, Z. Wu, and S. Lao, Eyeblink-based anti-spoofing in face recognition from a generic webcamera. IEEE 11th International Conference on Computer Vision, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  4. www.androidauthority.com/android-jelly-bean-face-unlock-blink-hacking -105556/Google ScholarGoogle Scholar
  5. www.youtube.com/watch?v=UKIZBbvloO8Google ScholarGoogle Scholar
  6. C. Queirolo, L. Silva, O. Bellon, and M. Pamplona. 3D face recognition using simulated annealing and the surface interpenetration measure. IEEE Trans. on Pattern Analysis and Machine Intelligence, 32(2): 206--219, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. V. Blanz and T. Vetter. Face recognition based on fitting a 3D morphable model. IEEE Trans. on Pattern Analysis and Machine Intelligence, 25(9): 1063--1074, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. http://www.manycam.comGoogle ScholarGoogle Scholar
  9. G. Pan, L. Sun, Z. Wu, and Y. Wang. Monocular camera-based face liveness detection by combining eye-blink and scene context. Journal of Telecommunication Systems, 2009.Google ScholarGoogle Scholar
  10. J. Li, Y. Wang, T. Tan, and A. K. Jain. Live face de-tection based on the analysis of fourier spectra. Bio-metric Technology for Human Identification, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  11. J. Bai, T. Ng, X. Gao, and Y. Shi. Is physics-based liveness detection truly possible with a single image?. IEEE International Symposium on Circuits and Sys-tems, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  12. X. Tan, Y. Li, J. Liu, and L. Jiang. Face liveness de-tection from a single image with sparse low rank bi-linear discriminative model. Computer Vision ECCV, vol. 6316, pp. 504--517, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. W. Bao, H. Li, N. Li, and W. Jiang. A liveness detec-tion method for face recognition based on optical field. IEEE International Conference on Image Analysis and Signal Processing, 2009.Google ScholarGoogle Scholar
  14. Y. Wang, J. Liu, and X. Tang. Robust 3D face recog-nition by local shape difference boosting. IEEE Trans. on Pattern Analysis and Machine Intelligence, 32(10): 1858--1870, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. Amberg, R. Knothe, and T. Vetter. Expression in-variant 3D face recognition with a morphable model. 8th IEEE International Conference on Automatic Face and Gesture Recognition, 2008.Google ScholarGoogle Scholar
  16. http://uniqul.com/news/17-launchGoogle ScholarGoogle Scholar
  17. http://www.guthspot.se/video/deshaker.htmGoogle ScholarGoogle Scholar
  18. F. Vella, A. Castorina, M. Mancuso, and G. Messina. Digital image stabilization by adaptive block motion vectors filtering. IEEE Trans. on Consumer Electron-ics, 48(3): 796--801, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Y. Xu and S. Qin, A new approach to video stabiliza-tion with iterative smoothing. IEEE International Conference on Signal Processing, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  20. P. Viola and M. Jones. Robust real-time face detection. International Journal of Computer Vision, (57)2: 137--154, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. G. Sandbach, S. Zaferiou, M. Pantic, and L. Yin. Static and dynamic 3D facial expression recognition: A comprehensive survey. Image and Vision Compu-ting, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Shirazi, A. P. Moghadam, H. Ketabdar, and A. Schmidt. Assessing the vulnerability of magnetic ges-tural authentication to video-based shoulder surfing attacks. In Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, pages 2045--2048. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. B. Biggio, Z. Akthar, G. Fumera, G. L. Marcialis, and F. Roli. Security evaluation of biometric authentica-tion systems under realistic spoofing attacks. IET bi-ometrics, 1(1): 11--24, 2012.Google ScholarGoogle Scholar
  24. K. H. Kamer, A. Yüksel, A. Jahnbekam, M. Roshan-del, and D. Skirpo. Magisign: User identifica-tion/authentication based on 3d around device mag-netic signatures. In Proceedings of 4th International Conference on Mobile Ubiquitous Computing, Sys-tems, Services and Technologies, pages 31--34. 2010.Google ScholarGoogle Scholar

Index Terms

  1. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiSys '14: Proceedings of the 12th annual international conference on Mobile systems, applications, and services
        June 2014
        410 pages
        ISBN:9781450327930
        DOI:10.1145/2594368

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 June 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        MobiSys '14 Paper Acceptance Rate25of185submissions,14%Overall Acceptance Rate274of1,679submissions,16%

        Upcoming Conference

        MOBISYS '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      ePub

      View this article in ePub.

      View ePub