LIPAuth : Hand-dependent Light Intensity Patterns for Resilient User Authentication

Author:

Cao Hangcheng,Liu Daibo,Jiang Hongbo,Wang Ruize1,Chen Zhe2,Xiong Jie3

Affiliation:

1. College of Computer Science and Electronic Engineering, Hunan University, China

2. China-Singapore International Joint Research Institute, China

3. College of Information and Computer Sciences, University of Massachusetts Amherst, USA

Abstract

Authentication mechanisms deployed on access control systems undertake the responsibility of judging user identity, to prevent unauthorized individuals from illegally approaching. In this paper, we propose LIPAuth leveraging hand-dependent L ight I ntensity P attern to Auth enticate users. To be specific, lights released by a screen, are blocked and reflected by one hand above it; in this propagation process, hands exhibit user-specific ability in driving light absorption and attenuation due to owning unique structures, thereby outputting discriminative intensity patterns representing user identity. To implement LIPAuth , we first study the effects of screen contents on light intensity to elaborately design its patterns embedding enough hand structure biometrics. We then design a customized dynamic stimulus-response mechanism for LIPAuth  and make it resilient to the risks of potential registration profile leakage. Subsequently, we construct a joint pipeline consisting of signal processing and a learning-based generative adversarial network to overcome interference from variable user behaviors. More importantly, LIPAuth  just utilizes common sensors to capture light signals hence achieving low cost. We finally conduct extensive experiments in three scenarios to evaluate the authentication performance of LIPAuth  prototype.

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications

Reference74 articles.

1. Jacobson AL. 2001. Auto-threshold peak detection in physiological signals . In IEEE EMBS , Vol .  3. 2194–2195. Jacobson AL. 2001. Auto-threshold peak detection in physiological signals. In IEEE EMBS, Vol.  3. 2194–2195.

2. Mamoun Alazab , Shamsul Huda , Jemal Abawajy , Rafiqul Islam , John Yearwood , Sitalakshmi Venkatraman , Roderic Broadhurst , et al . 2014 . A hybrid wrapper-filter approach for malware detection. (2014). Mamoun Alazab, Shamsul Huda, Jemal Abawajy, Rafiqul Islam, John Yearwood, Sitalakshmi Venkatraman, Roderic Broadhurst, et al. 2014. A hybrid wrapper-filter approach for malware detection. (2014).

3. Mamoun Alazab Robert Layton Roderic Broadhurst and Brigitte Bouhours. 2013. Malicious spam emails developments and authorship attribution. In 2013 fourth cybercrime and trustworthy computing workshop. 58–68. Mamoun Alazab Robert Layton Roderic Broadhurst and Brigitte Bouhours. 2013. Malicious spam emails developments and authorship attribution. In 2013 fourth cybercrime and trustworthy computing workshop. 58–68.

4. Apple. 2022. About Face ID advanced technology. https://support.apple.com/en-us/HT208108. Apple. 2022. About Face ID advanced technology. https://support.apple.com/en-us/HT208108.

5. ARDUINO. 2022. Arduino Uno Rev3. https://store-usa.arduino.cc/products/arduino-uno-rev3?selectedStore=us. ARDUINO. 2022. Arduino Uno Rev3. https://store-usa.arduino.cc/products/arduino-uno-rev3?selectedStore=us.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3