Abstract
Nowadays, considerable number of devices have been proposed to monitor cardiovascular health. To protect medical data on these devices from unauthorized access, researchers have proposed ECG-based and heart sound-based authentication methods. However, their vulnerabilities to replay attacks have recently been revealed. In this paper, we leverage liveness detection to enhance heart sound-based authentication against replay attacks. We utilize the inherent correlation between sounds and chest motion caused by deep breathing to realize a reliable liveness detection system, BreathLive. To be specific, BreathLive captures breathing sounds and chest motion simultaneously, and then eliminates signal delay caused by any imperfections of device components. Next, it extracts a set of features to characterize the correlation between sounds and motion signals, and uses them to train the classifier. We implement and evaluated BreathLive under different attacking scenarios and contexts. The results show that BreathLive achieves an equal error rate of 4.0%, 6.4% and 8.3% for random impersonation attacks, advanced impersonation attacks and advanced replay attacks respectively, which indicates its effectiveness in defending against different attacks. Also the extensive experiments prove the system can be robust to different contexts with a small training set.
- 2011. Nymi | Convenient Authentication Anywhere. https://nymi.com/. (2011).Google Scholar
- 2016. APPLE WATCH SERIES 2. https://www.apple.com/hk/en/watch/. (2016).Google Scholar
- 2016. SEEQ Mobile Cardiac Telemetry System. http://www.medtronicdiagnostics.com/us/cardiac-monitors/seeq-mct-system/index.htm. (2016).Google Scholar
- 2017. 3M Littmann Electronic Stethoscope Model 3200. http://www.littmann.com/3M/en_US/littmann-stethoscopes/products/~/3M-Littmann-Electronic-Stethoscope-Model-3200?N=5932256+8711017+32931883928rt=rud. (2017).Google Scholar
- 2017. Breathing- Wikipedia. https://en.wikipedia.org/wiki/Breathing. (2017).Google Scholar
- 2017. Diaphragmatic breathing- Wikipedia. https://en.wikipedia.org/wiki/Diaphragmatic_breathing. (2017).Google Scholar
- 2017. How safe is your fitness tracker? Hackers could steal your data and sell the information to health companies. http://www.dailymail.co.uk/sciencetech/article-4049154/How-safe-fitness-tracker-Hackers-steal-data-sell-information-health-companies.html. (2017).Google Scholar
- 2017. POLAR H10 HEART RATE SENSOR. https://www.polar.com/hk-en/products/accessories/h10_heart_rate_sensor. (2017).Google Scholar
- 2017. Samsung Galaxy S8 | S8+. http://www.samsung.com/global/galaxy/galaxy-s8/. (2017).Google Scholar
- 2017. Thinklabs One - Digital stethoscope. http://www.thinklabs.com. (2017).Google Scholar
- Heba Aly and Moustafa Youssef. 2016. Zephyr: Ubiquitous accurate multi-sensor fusion-based respiratory rate estimation using smartphones. In Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on. IEEE, 1--9.Google ScholarCross Ref
- Oliver Amft, Mathias Stager, Paul Lukowicz, and Gerhard Troster. 2005. Analysis of chewing sounds for dietary monitoring. In UbiComp, Vol. 5. Springer, 56--72. Google ScholarDigital Library
- Ali Azarbarzin and Zahra MK Moussavi. 2011. Automatic and unsupervised snore sound extraction from respiratory sound signals. IEEE Transactions on Biomedical Engineering 58, 5 (2011), 1156--1162.Google ScholarCross Ref
- Andrew Bates, Martin J Ling, Janek Mann, and DK Arvind. 2010. Respiratory rate and flow waveform estimation from tri-axial accelerometer data. In Body Sensor Networks (BSN), 2010 International Conference on. IEEE, 144--150. Google ScholarDigital Library
- Francesco Beritelli and Andrea Spadaccini. 2011. Human identity verification based on heart sounds: recent advances and future directions. arXiv preprint arXiv:1105.4058 (2011).Google Scholar
- Frans A Boiten, Nico H Frijda, and Cornelis JE Wientjes. 1994. Emotions and respiratory patterns: review and critical analysis. International Journal of Psychophysiology 17, 2 (1994), 103--128.Google ScholarCross Ref
- Sonia Charleston-Villalobos, Ramón González-Camarena, Georgina Chi-Lem, and Tomás Aljama-Corrales. 2007. Crackle sounds analysis by empirical mode decomposition. IEEE Engineering in medicine and biology magazine 26, 1 (2007), 40.Google Scholar
- Jagmohan Chauhan, Yining Hu, Suranga Seneviratne, Archan Misra, Aruna Seneviratne, and Youngki Lee. 2017. BreathPrint: Breathing Acoustics-based User Authentication. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 278--291. Google ScholarDigital Library
- Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, and Aziz Mohaisen. 2017. You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones. In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 183--195.Google ScholarCross Ref
- Girija Chetty and Michael Wagner. 2004. Automated lip feature extraction for liveness verification in audio-video authentication. Proc. Image and Vision Computing (2004), 17--22.Google Scholar
- Eli Cohen, William Stogin, Haik Kalantarian, Angela F Pfammatter, Bonnie Spring, and Nabil Alshurafa. 2016. SmartNecklace: designing a wearable multi-sensor system for smart eating detection. In Proceedings of the 11th EAI International Conference on Body Area Networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 33--37. Google ScholarDigital Library
- Phillip L De Leon, Michael Pucher, Junichi Yamagishi, Inma Hernaez, and Ibon Saratxaga. 2012. Evaluation of speaker verification security and detection of HMM-based synthetic speech. IEEE Transactions on Audio, Speech, and Language Processing 20, 8 (2012), 2280--2290. Google ScholarDigital Library
- Mohammad Omar Derawi, Bian Yang, and Christoph Busch. 2011. Fingerprint recognition with embedded cameras on mobile phones. In International Conference on Security and Privacy in Mobile Information and Communication Systems. Springer, 136--147.Google Scholar
- Simon Eberz, Nicola Paoletti, Marc Roeschlin, Marta Kwiatkowska, I Martinovic, and A Patané. 2017. Broken hearted: How to attack ECG biometrics. (2017).Google Scholar
- Mayank Goel, Elliot Saba, Maia Stiber, Eric Whitmire, Josh Fromm, Eric C Larson, Gaetano Borriello, and Shwetak N Patel. 2016. Spirocall: Measuring lung function over a phone call. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 5675--5685. Google ScholarDigital Library
- Volker Gross, Anke Dittmar, Thomas Penzel, Frank Schuttler, and Peter Von Wichert. 2000. The relationship between normal lung sounds, age, and gender. American journal of respiratory and critical care medicine 162, 3 (2000), 905--909.Google Scholar
- Joel Grus. 2015. Data Science from Scratch: First Principles with Python (1st ed.). O'Reilly Media, Inc. Google ScholarDigital Library
- İnan Güler, Hüseyin Polat, and Uçman Ergün. 2005. Combining neural network and genetic algorithm for prediction of lung sounds. Journal of Medical Systems 29, 3 (2005), 217--231. Google ScholarDigital Library
- Leontios J Hadjileontiadis and Ioannis T Rekanos. 2003. Detection of explosive lung and bowel sounds by means of fractal dimension. IEEE Signal Processing Letters 10, 10 (2003), 311--314.Google ScholarCross Ref
- Tian Hao, Guoliang Xing, and Gang Zhou. 2013. iSleep: unobtrusive sleep quality monitoring using smartphones. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems. ACM, 4. Google ScholarDigital Library
- Antoni Homs-Corbera, José Antonio Fiz, José Morera, and Raimon Jané. 2004. Time-frequency detection and analysis of wheezes during forced exhalation. IEEE Transactions on Biomedical Engineering 51, 1 (2004), 182--186.Google ScholarCross Ref
- David W Hosmer Jr, Stanley Lemeshow, and Rodney X Sturdivant. 2013. Applied logistic regression. Vol. 398. John Wiley 8 Sons.Google Scholar
- Chih-Wei Hsu, Chih-Chung Chang, Chih-Jen Lin, et al. 2003. A practical guide to support vector classification. (2003).Google Scholar
- SS Kraman. 1984. The relationship between airflow and lung sound amplitude in normal subjects. Chest 86, 2 (1984), 225--229.Google ScholarCross Ref
- Eric C Larson, Mayank Goel, Gaetano Boriello, Sonya Heltshe, Margaret Rosenfeld, and Shwetak N Patel. 2012. SpiroSmart: using a microphone to measure lung function on a mobile phone. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, 280--289. Google ScholarDigital Library
- Eric C Larson, Tienjui Lee, Sean Liu, Margaret Rosenfeld, and Shwetak N Patel. 2011. Accurate and privacy preserving cough sensing using a low-cost microphone. In Proceedings of the 13th international conference on Ubiquitous computing. ACM, 375--384. Google ScholarDigital Library
- Xuefeng Liu, Jiannong Cao, Shaojie Tang, Jiaqi Wen, and Peng Guo. 2016. Contactless Respiration Monitoring Via Off-the-Shelf WiFi Devices. IEEE Transactions on Mobile Computing 15, 10 (2016), 2466--2479.Google ScholarDigital Library
- Junyi Ma, Yuxiang Wang, Hao Wang, Yasha Wang, and Daqing Zhang. 2016. When can we detect human respiration with commodity wifi devices?. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct. ACM, 325--328. Google ScholarDigital Library
- Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals.. In USENIX Security Symposium. 1053--1067. Google ScholarDigital Library
- Ashok Mondal, Parthasarathi Bhattacharya, and Goutam Saha. 2013. An automated tool for localization of heart sound components S1, S2, S3 and S4 in pulmonary sounds using Hilbert transform and HeronâĂŹs formula. SpringerPlus 2, 1 (2013), 512.Google ScholarCross Ref
- Raymond LH Murphy, Andrey Vyshedskiy, Verna-Ann Power-Charnitsky, Dhirendra S Bana, Patricia M Marinelli, Anna Wong-Tse, and Rozanne Paciej. 2004. Automated lung sound analysis in patients with pneumonia. Respiratory Care 49, 12 (2004), 1490--1497.Google Scholar
- Rajalakshmi Nandakumar, Shyamnath Gollakota, and Nathaniel Watson. 2015. Contactless sleep apnea detection on smartphones. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 45--57. Google ScholarDigital Library
- Tauhidur Rahman, Alexander Travis Adams, Mi Zhang, Erin Cherry, Bobby Zhou, Huaishu Peng, and Tanzeem Choudhury. 2014. BodyBeat: a mobile system for sensing non-speech body sounds.. In MobiSys, Vol. 14. 2--13. Google ScholarDigital Library
- John L Semmlow and Benjamin Griffel. 2014. Biosignal and medical image processing. CRC press.Google Scholar
- H Sumbul and A Hayrettin Yuzer. 2015. Measuring of diaphragm movements by using iMEMS acceleration sensor. In Electrical and Electronics Engineering (ELECO), 2015 9th International Conference on. IEEE, 166--170.Google ScholarCross Ref
- Xiao Sun, Zongqing Lu, Wenjie Hu, and Guohong Cao. 2015. SymDetector: detecting sound-related respiratory symptoms using smartphones. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 97--108. Google ScholarDigital Library
- Styliani A Taplidou and Leontios J Hadjileontiadis. 2007. Wheeze detection based on time-frequency analysis of breath sounds. Computers in biology and medicine 37, 8 (2007), 1073--1083. Google ScholarDigital Library
- Jesús Villalba and Eduardo Lleida. 2011. Detecting replay attacks from far-field recordings on speaker verification systems. Biometrics and ID Management (2011), 274--285. Google ScholarDigital Library
- Jesús Villalba and Eduardo Lleida. 2011. Preventing replay attacks on speaker verification systems. In Security Technology (ICCST), 2011 IEEE International Carnahan Conference on. IEEE, 1--8.Google ScholarCross Ref
- Elke Vlemincx, James L Abelson, Paul M Lehrer, Paul W Davenport, Ilse Van Diest, and Omer Van den Bergh. 2013. Respiratory variability and sighing: a psychophysiological reset model. Biological psychology 93, 1 (2013), 24--32.Google Scholar
- Hao Wang, Daqing Zhang, Junyi Ma, Yasha Wang, Yuxiang Wang, Dan Wu, Tao Gu, and Bing Xie. 2016. Human respiration detection with commodity wifi devices: do user location and body orientation matter?. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 25--36. Google ScholarDigital Library
- Zhi-Feng Wang, Gang Wei, and Qian-Hua He. 2011. Channel pattern noise based playback attack detection algorithm for speaker recognition. In Machine Learning and Cybernetics (ICMLC), 2011 International Conference on, Vol. 4. IEEE, 1708--1713.Google ScholarCross Ref
- Azadeh Yadollahi and Zahra Moussavi. 2010. Automatic breath and snore sounds classification from tracheal and ambient sounds recordings. Medical engineering 8 physics 32, 9 (2010), 985--990.Google Scholar
- Koji Yatani and Khai N Truong. 2012. BodyScope: a wearable acoustic sensor for activity recognition. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, 341--350. Google ScholarDigital Library
- Meirav Yosef, Ruben Langer, Shaul Lev, and Yael A Glickman. 2009. Effect of airflow rate on vibration response imaging in normal lungs. The open respiratory medicine journal 3 (2009), 116.Google Scholar
- Hansong Zeng. 2012. Bio-Inspired Inertial Sensors for Human Body Motion Measurement. The Ohio State University.Google Scholar
- Linghan Zhang, Sheng Tan, Jie Yang, and Yingying Chen. 2016. Voicelive: A phoneme localization based liveness detection for voice authentication on smartphones. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1080--1091. Google ScholarDigital Library
Index Terms
- BreathLive: Liveness Detection for Heart Sound Authentication with Deep Breathing
Recommendations
A survey of attacks on iris biometric systems
Biometric recognition has several applications that provide reliable solutions to the user authentication problem. Its widespread use and popularity is itself making it prone to several vulnerabilities. Iris is emerging as one of the most popular and ...
Detecting liveness of fingerprint biometrics
Biometrics refer to automated recognition of individuals based on their biological and behavioral characteristics. Biometric systems are widely used for security. But biometric systems are vulnerable to a certain type of attack. The type 1 attack or ...
Online joint palmprint and palmvein verification
As a unique and reliable biometric characteristic, palmprint verification has achieved a great success. However, palmprint alone may not be able to meet the increasing demand of highly accurate and robust biometric systems. Recently, palmvein, which ...
Comments