skip to main content
10.1145/3393527.3393551acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-turcConference Proceedingsconference-collections
research-article

Using Pupil Light Reflex for Fast Biometric Authentication

Published: 26 October 2020 Publication History

Abstract

The prevalence of using biometric for user authentication has attracted much attention. On the other hand, mobile devices such as smart glasses and VR headsets have gained great popularity among recent years. It is desirable to integrate authentication into these mobile devices to offer security, which has become more and more indispensable. However, existing biometric techniques (e.g. fingerprint or iris) and traditional methods (e.g. PINS or passwords) are spoofing vulnerability because of their traits. Because their information can easily be leaked or mimicked by artificial means. This study devises an authentication system for Smart Helmet devices. We build upon the fact that Pupil Light Reflex (PLR) can be reflexive. The expectation is that even if you know the fact that when your pupil is stimulated by the light, the pupil size will decrease and vice versa. It is challenging for someone to manipulate our pupil to control the pupil size since it belongs to the body mechanism change, human beings are unable to control. In this paper, to evaluate the reliability, we design an experiment device to perform a series of user experiments with 20 volunteers from the general public. We achieved the False Accept Rate (FAR) of 0.19% and the False Reject Rate (FRR) of 6.67%. Furthermore, we lower the authentication times to 2s. To the best of our knowledge, it is the first research study on Pupil Light Reflex for secure mobile devices authentication.

References

[1]
Devon Adams, Alseny Bah1 Catherine Barwulor, Nureli Musabay, Kadeem Pitkin, and Elissa M Redmiles. 2007. Aligning Incentives: Perceptions of Privacy and Security in Virtual Reality. (2007).
[2]
Oliver Bergamin, Andreas Schoetzau, Keiko Sugimoto, and Mario Zulauf. 1998. The influence of iris color on the pupillary light reflex. Graefe's archive for clinical and experimental ophthalmology 236, 8 (1998), 567--570.
[3]
Darlene A Dartt. 2010. Encyclopedia of the Eye. Vol. 1. Academic Press.
[4]
F Fotiou, KN Fountoulakis, A Goulas, L Alexopoulos, and A Palikaras. 2000. Automated standardized pupillometry with optical method for purposes of clinical practice and research. Clinical Physiology 20, 5 (2000), 336--347.
[5]
Javier Galbally Herrero, Julian Fierrez, and Javier Ortega-Garcia. 2007. Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection. - (2007).
[6]
Gear. 2018. https://www.oculus.com/. Retrieved May, 2019.
[7]
Anil K Jain, Robert P. W. Duin, and Jianchang Mao. 2000. Statistical pattern recognition: A review. IEEE Transactions on pattern analysis and machine intelligence 22, 1 (2000), 4--37.
[8]
Orin S Kerr. 2008. Criminal law in virtual worlds. U. Chi. Legal F. (2008), 415.
[9]
Ratnakar Madan, Sunil Kr Singh, and Nitisha Jain. 2009. Signal filtering using discrete wavelet transform. International journal of recent trends in engineering 2, 3 (2009), 96.
[10]
T Matsumoto. 2004. Artificial irises: importance of vulnerability analysis. In Proc. Asian Biometrics Workshop (AWB), Vol. 45.
[11]
Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, and Satoshi Hoshino. 2002. Impact of artificial" gummy" fingers on fingerprint systems. In Optical Security and Counterfeit Deterrence Techniques IV, Vol. 4677. International Society for Optics and Photonics, 275--289.
[12]
Kazuyuki Miyazawa, Koichi Ito, Takafumi Aoki, Koji Kobayashi, and Hiroshi Nakajima. 2006. A phase-based iris recognition algorithm. In International Conference on Biometrics. Springer, 356--365.
[13]
John William Nelson. 2011. A virtual property solution: How privacy law can protect the citizens of virtual worlds. Okla. City UL Rev. 36 (2011), 395.
[14]
Fiachra O'Brolcháin, Tim Jacquemard, David Monaghan, Noel O'Connor, Peter Novitzky, and Bert Gordijn. 2016. The convergence of virtual reality and social networks: threats to privacy and autonomy. Science and engineering ethics 22, 1 (2016), 1--29.
[15]
Jaishanker K Pillai, Vishal M Patel, Rama Chellappa, and Nalini K Ratha. 2011. Secure and robust iris recognition using random projections and sparse representations. IEEE transactions on pattern analysis and machine intelligence 33, 9 (2011), 1877--1893.
[16]
L Vázquez Romaguera, F Perdigón Romero, CR Vazquez Seisdedos, and J Evangelista Neto. 2015. Pupil segmentation approach on low resolution images. In VI Latin American Congress on Biomedical Engineering CLAIB 2014, Paraná, Argentina 29, 30 & 31 October 2014. Springer, 429--432.
[17]
Qi-Chuan Tian, Quan Pan, Yong-Mei Cheng, and Quan-Xue Gao. 2004. Fast algorithm and application of hough transform in iris segmentation. In Proceedings of 2004 international conference on machine learning and cybernetics (IEEE Cat. No. 04EX826), Vol. 7. IEEE, 3977--3980.
[18]
Vuzix. 2018. https://www.vuzix.com/. Retrieved May, 2019.
[19]
Ian Warren, Darren Palmer, et al. 2010. Crime risks of three-dimensional virtual environments. Trends and issues in crime and criminal justice 388 (2010), 1.
[20]
Barry Winn, David Whitaker, David B Elliott, and Nicholas J Phillips. 1994. Factors affecting light-adapted pupil size in normal human subjects. Investigative ophthalmology & visual science 35, 3 (1994), 1132--1137.
[21]
Vitor Yano, Giselle Ferrari, and Alessandro Zimmer. 2011. Using the pupillary reflex as a diabetes occurrence screening aid tool through neural networks. In International Conference Image Analysis and Recognition. Springer, 40--47.
[22]
Vitor Yano, Lee Luan Ling, and Alessandro Zimmer. 2013. Biometric Authentication Based on Pupillary Light Reflex Using Neural Networks. In International Conference Image Analysis and Recognition. Springer, 89--96.
[23]
Vitor Yano, Alessandro Zimmer, and Lee Luan Ling. 2012. Multimodal biometric authentication based on iris pattern and pupil light reflex. In Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012). IEEE, 2857--2860.
[24]
Yongtuo Zhang, Wen Hu, Weitao Xu, Chun Tung Chou, and Jiankun Hu. 2018. Continuous authentication using eye movement response of implicit visual stimuli. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 4 (2018), 1--22.

Cited By

View all
  • (2024)Recent Trends of Authentication Methods in Extended Reality: A SurveyApplied System Innovation10.3390/asi70300457:3(45)Online publication date: 28-May-2024
  • (2024)Cross-content User Authentication in Virtual RealityProceedings of the 30th Annual International Conference on Mobile Computing and Networking10.1145/3636534.3696212(2098-2105)Online publication date: 4-Dec-2024

Index Terms

  1. Using Pupil Light Reflex for Fast Biometric Authentication

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ACM TURC '20: Proceedings of the ACM Turing Celebration Conference - China
    May 2020
    220 pages
    ISBN:9781450375344
    DOI:10.1145/3393527
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Baidu Research: Baidu Research

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 October 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. biometrics
    2. pupil light reflex
    3. security
    4. user authentication

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • National Natural Science Foundation of China
    • Shanghai Rising-Star Program
    • DHU Distinguished Young Professor Program

    Conference

    ACM TURC'20

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Recent Trends of Authentication Methods in Extended Reality: A SurveyApplied System Innovation10.3390/asi70300457:3(45)Online publication date: 28-May-2024
    • (2024)Cross-content User Authentication in Virtual RealityProceedings of the 30th Annual International Conference on Mobile Computing and Networking10.1145/3636534.3696212(2098-2105)Online publication date: 4-Dec-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media