skip to main content
10.1145/3386901.3388939acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

SonicPrint: a generally adoptable and secure fingerprint biometrics in smart devices

Published: 15 June 2020 Publication History

Abstract

The advent of smart devices has caused unprecedented security and privacy concerns to its users. Although the fingerprint technology is a go-to biometric solution in high-impact applications (e.g., smart-phone security, monetary transactions and international-border verification), the existing fingerprint scanners are vulnerable to spoofing attacks via fake-finger and cannot be employed across smart devices (e.g., wearables) due to hardware constraints. We propose SonicPrint that extends fingerprint identification beyond smartphones to any smart device without the need for traditional fingerprint scanners. SonicPrint builds on the fingerprint-induced sonic effect (FiSe) caused by a user swiping his fingertip on smart devices and the resulting property, i.e., different users' fingerprint would result in distinct FiSe. As the first exploratory study, extensive experiments verify the above property with 31 participants over four different swipe actions on five different types of smart devices with even partial fingerprints. SonicPrint achieves up to a 98% identification accuracy on smartphone and an equal-error-rate (EER) less than 3% for smartwatch and headphones. We also examine and demonstrate the resilience of SonicPrint against fingerprint phantoms and replay attacks. A key advantage of SonicPrint is that it leverages the already existing microphones in smart devices, requiring no hardware modifications. Compared with other biometrics including physiological patterns and passive sensing, SonicPrint is a low-cost, privacy-oriented and secure approach to identify users across smart devices of unique form-factors.

References

[1]
K. Conger, R. Fausset, and S. F. Kovaleski, "San francisco bans facial recognition technology," May 2019. [Online]. Available: https://www.nytimes.com/2019/05/14/us/facial-recognition-ban-san-francisco.html
[2]
S. Bharadwaj, H. S. Bhatt, M. Vatsa, and R. Singh, "Periocular biometrics: When iris recognition fails," in 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 2010, pp. 1--6.
[3]
L. Zhang, S. Tan, and J. Yang, "Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017, pp. 57--71.
[4]
Gartner, "The future smart home: 500 smart objects will enable new business opportunities." [Online]. Available: https://www.gartner.com/en/documents/2793317
[5]
A. Ross and A. Jain, "Biometric sensor interoperability: A case study in fingerprints," in International Workshop on Biometric Authentication. Springer, 2004, pp. 134--145.
[6]
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, "Impact of artificial" gummy" fingers on fingerprint systems," in Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677. International Society for Optics and Photonics, 2002, pp. 275--289.
[7]
S. S. Arora, K. Cao, A. K. Jain, and N. G. Paulter, "3d fingerprint phantoms," in 2014 22nd International Conference on Pattern Recognition. IEEE, 2014, pp. 684--689.
[8]
H. Kang, B. Lee, H. Kim, D. Shin, and J. Kim, "A study on performance evaluation of the liveness detection for various fingerprint sensor modules," in International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer, 2003, pp. 1245--1253.
[9]
D. Winder, "Samsung galaxy s10 fingerprint scanner hacked - here's what you need to know," Apr 2019. [Online]. Available: https://www.forbes.com/sites/daveywinder/2019/04/06/samsung-galaxy-s10-fingerprint-scanner-hacked-heres-what-you-need-to-know/#10c88305d423
[10]
"Mems microphones market size, share: Industry trends report, 2025." [Online] Available: https://www.grandviewresearch.com/industry-analysis/mems-microphones-market
[11]
A. Akay, "Acoustics of friction," The Journal of the Acoustical Society of America, vol. 111, no. 4, pp. 1525--1548, 2002.
[12]
B. L. Stoimenov, S. Maruyama, K. Adachi, and K. Kato, "The roughness effect on the frequency of frictional sound," Tribology international, vol. 40, no. 4, pp. 659--664, 2007.
[13]
H. B. Abdelounis, A. Le Bot, J. Perret-Liaudet, and H. Zahouani, "An experimental study on roughness noise of dry rough flat surfaces," Wear, vol. 268, no. 1-2, pp. 335--345, 2010.
[14]
A. K. Jain, Y. Chen, and M. Demirkus, "Pores and ridges: High-resolution fingerprint matching using level 3 features," IEEE transactions on pattern analysis and machine intelligence, vol. 29, no. 1, pp. 15--27, 2006.
[15]
C. Barral and A. Tria, "Fake fingers in fingerprint recognition: Glycerin supersedes gelatin," in Formal to Practical Security. Springer, 2009, pp. 57--69.
[16]
H. Feng, K. Fawaz, and K. G. Shin, "Continuous authentication for voice assistants," in Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. ACM, 2017, pp. 343--355.
[17]
S. Kamath and P. Loizou, "A multi-band spectral subtraction method for enhancing speech corrupted by colored noise." in ICASSP, vol. 4. Citeseer, 2002, pp. 44 164--44 164.
[18]
H. Abdelnasser, M. Youssef, and K. A. Harras, "Wigest: A ubiquitous wifi-based gesture recognition system," in 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE, 2015, pp. 1472--1480.
[19]
D. B. Percival and A. T. Walden, Wavelet methods for time series analysis. Cambridge university press, 2006, vol. 4.
[20]
Q. Li, J. Zheng, A. Tsai, and Q. Zhou, "Robust endpoint detection and energy normalization for real-time speech and speaker recognition," IEEE Transactions on Speech and Audio Processing, vol. 10, no. 3, pp. 146--157, 2002.
[21]
Y. Bi, M. Lv, C. Song, W. Xu, N. Guan, and W. Yi, "Autodietary: A wearable acoustic sensor system for food intake recognition in daily life," IEEE Sensors Journal, vol. 16, no. 3, pp. 806--816, 2015.
[22]
R. Martin, "Noise power spectral density estimation based on optimal smoothing and minimum statistics," IEEE Transactions on speech and audio processing, vol. 9, no. 5, pp. 504--512, 2001.
[23]
J. Sohn, N. S. Kim, and W. Sung, "A statistical model-based voice activity detection," IEEE signal processing letters, vol. 6, no. 1, pp. 1--3, 1999.
[24]
Y. Ephraim and D. Malah, "Speech enhancement using a minimum-mean square error short-time spectral amplitude estimator," IEEE Transactions on acoustics, speech, and signal processing, vol. 32, no. 6, pp. 1109--1121, 1984.
[25]
A. Sugiyama, R. Miyahara, and K. Park, "Impact-noise suppression with phase-based detection," in 21st European Signal Processing Conference (EUSIPCO 2013). IEEE, 2013, pp. 1--5.
[26]
H. Hermansky and N. Morgan, "Rasta processing of speech," IEEE transactions on speech and audio processing, vol. 2, no. 4, pp. 578--589, 1994.
[27]
D. Mitrović, M. Zeppelzauer, and C. Breiteneder, "Features for content-based audio retrieval," in Advances in computers. Elsevier, 2010, vol. 78, pp. 71--150.
[28]
H.-S. Kim and J. Smith, "Synthesis of sound textures with tonal components using summary statistics and all-pole residual modeling," in Proceedings of the 19th International Conference on Digital Audio Effects (DAFx-16), 2016, pp. 129--136.
[29]
J. Neumann, C. Schnörr, and G. Steidl, "Combined svm-based feature selection and classification," Machine learning, vol. 61, no. 1-3, pp. 129--150, 2005.
[30]
A. Janecek, W. Gansterer, M. Demel, and G. Ecker, "On the relationship between feature selection and classification accuracy," in New challenges for feature selection in data mining and knowledge discovery, 2008, pp. 90--105.
[31]
M. B. Kursa, W. R. Rudnicki, et al., "Feature selection with the boruta package," J Stat Softw, vol. 36, no. 11, pp. 1--13, 2010.
[32]
S. R. Narum, "Beyond bonferroni: less conservative analyses for conservation genetics," Conservation genetics, vol. 7, no. 5, pp. 783--787, 2006.
[33]
C. Bo, L. Zhang, X.-Y. Li, Q. Huang, and Y. Wang, "Silentsense: silent user identification via touch and movement behavioral biometrics," in Proceedings of the 19th annual international conference on Mobile computing & networking. ACM, 2013, pp. 187--190.
[34]
J. Angulo and E. Wästlund, "Exploring touch-screen biometrics for user identification on smart phones," in IFIP PrimeLife International Summer School on Privacy and Identity Management for Life. Springer, 2011, pp. 130--143.
[35]
S. Kwon and S. Narayanan, "Robust speaker identification based on selective use of feature vectors," Pattern Recognition Letters, vol. 28, no. 1, pp. 85--89, 2007.
[36]
Z. Ali, J. Payton, and V. Sritapan, "At your fingertips: Considering finger distinctness in continuous touch-based authentication for mobile devices," in 2016 IEEE Security and Privacy Workshops (SPW). IEEE, 2016, pp. 272--275.
[37]
R. Kohavi et al., "A study of cross-validation and bootstrap for accuracy estimation and model selection," in Ijcai, vol. 14, no. 2. Montreal, Canada, 1995, pp. 1137--1145.
[38]
S.-O. Leung, "A comparison of psychometric properties and normality in 4-, 5-, 6-, and 11-point likert scales," Journal of Social Service Research, vol. 37, no. 4, pp. 412--421, 2011.
[39]
N. K. Ratha, R. M. Bolle, V. D. Pandit, and V. Vaish, "Robust fingerprint authentication using local structural similarity," in Proceedings Fifth IEEE Workshop on Applications of Computer Vision. IEEE, 2000, pp. 29--34.
[40]
M. A. Olsen, M. Dusio, and C. Busch, "Fingerprint skin moisture impact on biometric performance," in 3rd International Workshop on Biometrics and Forensics (IWBF 2015). IEEE, 2015, pp. 1--6.
[41]
T. Chugh, K. Cao, and A. K. Jain, "Fingerprint spoof buster: Use of minutiae-centered patches," IEEE Transactions on Information Forensics and Security, vol. 13, no. 9, pp. 2190--2202, 2018.
[42]
S. Swanson and S. Swanson, "Fingerprints go the distance," Oct 2012. [Online]. Available: https://www.technologyreview.com/s/422400/fingerprints-go-the-distance/
[43]
N. Roy, S. Shen, H. Hassanieh, and R. R. Choudhury, "Inaudible voice commands: The long-range attack and defense," in 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18), 2018, pp. 547--560.
[44]
J. Liu, C. Wang, Y. Chen, and N. Saxena, "Vibwrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017, pp. 73--87.
[45]
J. Li, K. Fawaz, and Y. Kim, "Velody: Nonlinear vibration challenge-response for resilient user authentication," in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019, pp. 1201--1213.
[46]
Y. Ren, Y. Chen, M. C. Chuah, and J. Yang, "Smartphone based user verification leveraging gait recognition for mobile healthcare systems," in 2013 IEEE International Conference on Sensing, Communications and Networking (SECON). IEEE, 2013, pp. 149--157.
[47]
W.-H. Lee and R. B. Lee, "Multi-sensor authentication to improve smartphone security," in 2015 International Conference on Information Systems Security and Privacy (ICISSP). IEEE, 2015, pp. 1--11.
[48]
L. Cai and H. Chen, "Touchlogger: Inferring keystrokes on touch screen from smartphone motion." HotSec, vol. 11, no. 2011, p. 9, 2011.
[49]
E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury, "Tapprints: your finger taps have fingerprints," in Proceedings of the 10th international conference on Mobile systems, applications, and services. ACm, 2012, pp. 323--336.
[50]
T. Vu, A. Baid, S. Gao, M. Gruteser, R. Howard, J. Lindqvist, P. Spasojevic, and J. Walling, "Distinguishing users with capacitive touch communication," in Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, 2012, pp. 197--208.
[51]
Y. Meng, D. S. Wong, R. Schlegel, et al., "Touch gestures based biometric authentication scheme for touchscreen mobile phones," in International Conference on Information Security and Cryptology. Springer, 2012, pp. 331--350.
[52]
N. Zheng, K. Bai, H. Huang, and H. Wang, "You are how you touch: User verification on smartphones via tapping behaviors," in 2014 IEEE 22nd International Conference on Network Protocols. IEEE, 2014, pp. 221--232.
[53]
H. Yang, L. Chen, K. Bian, Y. Tian, F. Ye, W. Yan, T. Zhao, and X. Li, "Taplock: Exploit finger tap events for enhancing attack resilience of smartphone passwords," in 2015 IEEE International Conference on Communications (ICC). IEEE, 2015, pp. 7139--7144.
[54]
M. Shahzad, A. X. Liu, and A. Samuel, "Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it," in Proceedings of the 19th annual international conference on Mobile computing & networking. ACM, 2013, pp. 39--50.
[55]
M. Sherman, G. Clark, Y. Yang, S. Sugrim, A. Modig, J. Lindqvist, A. Oulasvirta, and T. Roos, "User-generated free-form gestures for authentication: Security and memorability," in Proceedings of the 12th annual international conference on Mobile systems, applications, and services. ACM, 2014, pp. 176--189.
[56]
Y. Chen, J. Sun, R. Zhang, and Y. Zhang, "Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices," in 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE, 2015, pp. 2686--2694.
[57]
H. Khan, U. Hengartner, and D. Vogel, "Targeted mimicry attacks on touch input based implicit authentication schemes," in Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 2016, pp. 387--398.
[58]
Z. Yan, Q. Song, R. Tan, Y. Li, and A. W. K. Kong, "Towards touch-to-access device authentication using induced body electric potentials," arXiv preprint arXiv:1902.07057, 2019.
[59]
V. Nguyen, M. Ibrahim, H. Truong, P. Nguyen, M. Gruteser, R. Howard, and T. Vu, "Body-guided communications: A low-power, highly-confined primitive to track and secure every touch," in Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. ACM, 2018, pp. 353--368.
[60]
C. Harrison, J. Schwarz, and S. E. Hudson, "Tapsense: enhancing finger interaction on touch surfaces," in Proceedings of the 24th annual ACM symposium on User interface software and technology. ACM, 2011, pp. 627--636.
[61]
Y.-C. Tung and K. G. Shin, "Expansion of human-phone interface by sensing structure-borne sound propagation," in Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 2016, pp. 277--289.
[62]
K. Sun, T. Zhao, W. Wang, and L. Xie, "Vskin: Sensing touch gestures on surfaces of mobile devices using acoustic signals," in Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. ACM, 2018, pp. 591--605.
[63]
M. Goel, B. Lee, M. T. Islam Aumi, S. Patel, G. Borriello, S. Hibino, and B. Begole, "Surfacelink: using inertial and acoustic sensing to enable multi-device interaction on a surface," in Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2014, pp. 1387--1396.
[64]
C. Zhang, A. Waghmare, P. Kundra, Y. Pu, S. Gilliland, T. Ploetz, T. E. Starner, O. T. Inan, and G. D. Abowd, "Fingersound: Recognizing unistroke thumb gestures using a ring," Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 1, no. 3, p. 120, 2017.

Cited By

View all
  • (2024)TouchTone: Smartwatch Privacy Protection via Unobtrusive Finger Touch GesturesProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661884(141-154)Online publication date: 3-Jun-2024
  • (2024)Unveiling intra-person fingerprint similarity via deep contrastive learningScience Advances10.1126/sciadv.adi032910:2Online publication date: 12-Jan-2024
  • (2024)FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction SoundIEEE Transactions on Mobile Computing10.1109/TMC.2023.333814823:6(7210-7224)Online publication date: Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiSys '20: Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services
June 2020
496 pages
ISBN:9781450379540
DOI:10.1145/3386901
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 June 2020

Permissions

Request permissions for this article.

Check for updates

Badges

  • Best Paper

Qualifiers

  • Research-article

Conference

MobiSys '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 274 of 1,679 submissions, 16%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)65
  • Downloads (Last 6 weeks)7
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)TouchTone: Smartwatch Privacy Protection via Unobtrusive Finger Touch GesturesProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661884(141-154)Online publication date: 3-Jun-2024
  • (2024)Unveiling intra-person fingerprint similarity via deep contrastive learningScience Advances10.1126/sciadv.adi032910:2Online publication date: 12-Jan-2024
  • (2024)FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction SoundIEEE Transactions on Mobile Computing10.1109/TMC.2023.333814823:6(7210-7224)Online publication date: Jun-2024
  • (2024)FingerSlid: Towards Finger-sliding Continuous Authentication on Smart Devices via VibrationIEEE Transactions on Mobile Computing10.1109/TMC.2023.3315291(1-15)Online publication date: 2024
  • (2024)Anti-Spoofing Facial Authentication Based on COTS RFIDIEEE Transactions on Mobile Computing10.1109/TMC.2023.3289708(1-17)Online publication date: 2024
  • (2024)HandKey: Knocking-Triggered Robust Vibration Signature for Keyless UnlockingIEEE Transactions on Mobile Computing10.1109/TMC.2022.321686823:1(520-534)Online publication date: Jan-2024
  • (2024)MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals LearningIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.325350721:1(372-387)Online publication date: Jan-2024
  • (2024)DeepApnea: Deep Learning Based Sleep Apnea Detection Using Smartwatches2024 IEEE International Conference on Pervasive Computing and Communications (PerCom)10.1109/PerCom59722.2024.10494473(206-216)Online publication date: 11-Mar-2024
  • (2024)Don’t Speak Anything: Deep Breath-Based Authentication Utilizing Sonar Signals on Smartphones2024 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)10.1109/BIBM62325.2024.10821947(2983-2990)Online publication date: 3-Dec-2024
  • (2024)AirLock: Unlock in-air via hand rotation recognitionExpert Systems with Applications10.1016/j.eswa.2024.124330(124330)Online publication date: May-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

EPUB

View this article in ePub.

ePub

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media