Accuth+: Accelerometer-Based Anti-Spoofing Voice Authentication on Wrist-Worn Wearables

被引:9
作者
Han, Feiyu [1 ]
Yang, Panlong [2 ,3 ]
Du, Haohua [4 ]
Li, Xiang-Yang [1 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, CAS Key Lab Wireless Opt Commun, Hefei 101127, Peoples R China
[2] Univ Sci & Technol China, Hefei, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Nanjing, Peoples R China
[4] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
关键词
Accelerometers; Authentication; Wearable computers; Vibrations; Loudspeakers; Microphones; Feature extraction; Mobile computing; voice authentication; accelerometer; spoofing detection; SPEECH;
D O I
10.1109/TMC.2023.3314837
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most existing voice-based user authentication systems mainly rely on microphones to capture the unique vocal characteristics of an individual, which are vulnerable to various acoustic attacks and may suffer high-security risks. In this work, we present Accuth(+), a novel authentication system on the wrist-worn device that takes advantage of a low-cost accelerometer to verify the user's identity and resist spoofing acoustic attacks. Accuth(+) captures unique sound vibrations during the human pronunciation process and extracts multi-level features to verify the user's identity. Specifically, we analyze and model the differences between the physical sound field of human beings and loudspeakers, and extract a novel sound-field-level liveness feature to defend against spoofing attacks. Accuth(+) is an effective complement to existing wearable authentication approaches as it only leverages a ubiquitous, low-cost, and small-size accelerometer. In real-world experiments. Accuth(+) achieves over 92.85% averaged identification accuracy among 15 human participants and an averaged equal error rate (EER) of 1.91% for spoofing attack detection.
引用
收藏
页码:5571 / 5588
页数:18
相关论文
共 57 条
[11]   Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer [J].
Ba, Zhongjie ;
Zheng, Tianhang ;
Zhang, Xinyu ;
Qin, Zhan ;
Li, Baochun ;
Liu, Xue ;
Ren, Kui .
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
[12]  
Beranek LL, 2012, ACOUSTICS: SOUND FIELDS AND TRANSDUCERS, P1
[13]   You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones [J].
Chen, Si ;
Ren, Kui ;
Piao, Sixu ;
Wang, Cong ;
Wang, Qian ;
Weng, Jian ;
Su, Lu ;
Mohaisen, Aziz .
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, :183-195
[14]   Continuous Authentication for Voice Assistants [J].
Feng, Huan ;
Fawaz, Kassem ;
Shin, Kang G. .
PROCEEDINGS OF THE 23RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM '17), 2017, :343-355
[15]   A new approach for speech enhancement based on the adaptive thresholding of the wavelet packets [J].
Ghanbari, Yasser ;
Karami-Mollaei, Mohammad Reza .
SPEECH COMMUNICATION, 2006, 48 (08) :927-940
[16]   Accuth: Anti-Spoofing Voice Authentication via Accelerometer [J].
Han, Feiyu ;
Yang, Panlong ;
Du, Haohua ;
Li, Xiang-Yang .
PROCEEDINGS OF THE TWENTIETH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, SENSYS 2022, 2022, :637-650
[17]   PitchIn: Eavesdropping via Intelligible Speech Reconstruction using Non-Acoustic Sensor Fusion [J].
Han, Jun ;
Chung, Albert Jin ;
Tague, Patrick .
2017 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN), 2017, :181-192
[18]  
Hansen C., 2001, Occupational exposure to noise: Evaluation, prevention, and control, P23
[19]  
Hongjun Li, 2020, Pattern Recognition and Artificial Intelligence. International Conference, ICPRAI 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12068), P312, DOI 10.1007/978-3-030-59830-3_27
[20]   Combining vocal source and MFCC features for enhanced speaker recognition performance using GMMs [J].
Hosseinzadeh, Danoush ;
Krishnan, Sridhar .
2007 IEEE NINTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2007, :365-368