{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T00:10:24Z","timestamp":1734653424865,"version":"3.32.0"},"reference-count":61,"publisher":"Association for Computing Machinery (ACM)","issue":"4","funder":[{"name":"Key R\\&D Program of Shandong Province","award":["No. 2022CXPT055"]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 62076187, 62172303, 62302343"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key R\\&D Program of Hubei Province","award":["No. 2022BAA039"]},{"DOI":"10.13039\/501100012166","name":"National Key R\\&D Program of China","doi-asserted-by":"crossref","award":["No. 2021YFB2700200"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2024,11,21]]},"abstract":"Earables, or ear wearables, are increasingly being used for a variety of personal applications, prompting the development of authentication schemes to safeguard user privacy. Existing authentications are designed for traditional in-ear earphones, relying on a closed ear canal environment, which is not suited for bone conduction earphones that feature an open-ear design. In this paper, we propose HCR-Auth, a new authentication approach for bone conduction earphones based on head biometrics. It employs a modulated chirp signal, emitted by the earphone speaker, to actively sense the user's head structure, and captures the response through the earphone's accelerometer. It operates implicitly, eliminating additional efforts from the user to perform authentication. Through extensive experiments involving 60 subjects, we determine that HCR-Auth achieves a commendable balanced accuracy of 96.55% using only 10 registration samples, proving its efficacy and resilience against potential threats. Our dataset and source codes are available at https:\/\/anonymous.4open.science\/r\/HCR-Auth-D43B\/.<\/jats:p>","DOI":"10.1145\/3699780","type":"journal-article","created":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T17:23:32Z","timestamp":1732209812000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7553-8699","authenticated-orcid":false,"given":"Zhixiang","family":"He","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7212-5297","authenticated-orcid":false,"given":"Jing","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0930-0283","authenticated-orcid":false,"given":"Cong","family":"Wu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3472-419X","authenticated-orcid":false,"given":"Kun","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3634-3385","authenticated-orcid":false,"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1228-3274","authenticated-orcid":false,"given":"Ju","family":"Jia","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, JiangSu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3733-945X","authenticated-orcid":false,"given":"Yangyang","family":"Gu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7827-6379","authenticated-orcid":false,"given":"Xiping","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]}],"member":"320","published-online":{"date-parts":[[2024,11,21]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2024. Report: bone conduction headphones market. https:\/\/www.linkedin.com\/pulse\/bone-conduction-headphones-market-segmentation-zkqxe."},{"key":"e_1_2_1_2_1","volume-title":"Acoustics: Normal Equal-loudness-level Contours.","author":"ISO","year":"2003","unstructured":"ISO 226:2003. 2003. Acoustics: Normal Equal-loudness-level Contours."},{"key":"e_1_2_1_3_1","volume-title":"IEEE Symposium on Security and Privacy (SP).","author":"Abhishek Anand S","year":"2020","unstructured":"S Abhishek Anand and Nitesh Saxena. 2020. Speechless: Analyzing the threat to speech privacy from smartphone motion sensors. In IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_2_1_4_1","volume-title":"Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. In Network and Distributed System Security Symposium (NDSS).","author":"Ba Zhongjie","year":"2020","unstructured":"Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, and Kui Ren. 2020. Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.764"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345454"},{"key":"e_1_2_1_8_1","volume-title":"HeartPrint: Passive Heart Sounds Authentication Exploiting In-Ear Microphones. In IEEE Conference on Computer Communications (INFOCOM).","author":"Cao Yetong","year":"2023","unstructured":"Yetong Cao, Chao Cai, Fan Li, Zhe Chen, and Luo Jun. 2023. HeartPrint: Passive Heart Sounds Authentication Exploiting In-Ear Microphones. In IEEE Conference on Computer Communications (INFOCOM)."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300124"},{"key":"e_1_2_1_10_1","volume-title":"Yincheng Jin, Di Wu, and Zhanpeng Jin.","author":"Choi Seokmin","year":"2023","unstructured":"Seokmin Choi, Junghwan Yim, Se Jun Kim, Yincheng Jin, Di Wu, and Zhanpeng Jin. 2023. VibPath: Two-Factor Authentication with Your Hand's Vibration Response to Unlock Your Phone. ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (2023)."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446382.3450216"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23194"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483240"},{"key":"e_1_2_1_15_1","unstructured":"Anthony Philip French. 2017. Vibrations and waves."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448113"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351239"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560660"},{"key":"e_1_2_1_19_1","volume-title":"BreathSign: Transparent and Continuous In-ear Authentication Using Bone-conducted Breathing Biometrics. In IEEE Conference on Computer Communications (INFOCOM).","author":"Han Feiyu","year":"2023","unstructured":"Feiyu Han, Panlong Yang, Shaojie Yan, Haohua Du, and Yuanhao Feng. 2023. BreathSign: Transparent and Continuous In-ear Authentication Using Bone-conducted Breathing Biometrics. In IEEE Conference on Computer Communications (INFOCOM)."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483277"},{"key":"e_1_2_1_21_1","volume-title":"50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern recognition letters","author":"Jain Anil K","year":"2016","unstructured":"Anil K Jain, Karthik Nandakumar, and Arun Ross. 2016. 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern recognition letters (2016)."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534613"},{"key":"e_1_2_1_23_1","volume-title":"Real-time human ambulation, activity, and physiological monitoring: Taxonomy of issues, techniques, applications, challenges and limitations. Sensors","author":"Khusainov Rinat","year":"2013","unstructured":"Rinat Khusainov, Djamel Azzi, Ifeyinwa E Achumba, and Sebastian D Bersch. 2013. Real-time human ambulation, activity, and physiological monitoring: Taxonomy of issues, techniques, applications, challenges and limitations. Sensors (2013)."},{"key":"e_1_2_1_24_1","volume-title":"Adam: A method for stochastic optimization. arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980 (2014)."},{"key":"e_1_2_1_25_1","unstructured":"Gregory Koch Richard Zemel Ruslan Salakhutdinov et al. 2015. Siamese neural networks for one-shot image recognition. In ICML deep learning workshop."},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Bettina Laugwitz Theo Held and Martin Schrepp. 2008. Construction and evaluation of a user experience questionnaire. In The Workgroup Human-Computer Interaction and Usability Engineering of the Austrian Computer Society.","DOI":"10.1007\/978-3-540-89350-9_6"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484553"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354242"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534621"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3193847"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133964"},{"key":"e_1_2_1_32_1","volume-title":"USENIX Security Symposium (USENIX).","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing speech from gyroscope signals. In USENIX Security Symposium (USENIX)."},{"key":"e_1_2_1_33_1","volume-title":"A study on tolerable waiting time: how long are web users willing to wait? Behaviour & Information Technology","author":"Fui-Hoon Nah Fiona","year":"2004","unstructured":"Fiona Fui-Hoon Nah. 2004. A study on tolerable waiting time: how long are web users willing to wait? Behaviour & Information Technology (2004)."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419197"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_86"},{"key":"e_1_2_1_36_1","volume-title":"Adaptive biometric systems that can improve with use. Advances in Biometrics: Sensors, Algorithms and Systems","author":"Roli Fabio","year":"2008","unstructured":"Fabio Roli, Luca Didaci, and Gian Luca Marcialis. 2008. Adaptive biometric systems that can improve with use. Advances in Biometrics: Sensors, Algorithms and Systems (2008)."},{"key":"e_1_2_1_37_1","volume-title":"Craniofacial asymmetry in development: an anatomical study. The Angle Orthodontist","author":"Rossi Marcelle","year":"2003","unstructured":"Marcelle Rossi, Eduardo Ribeiro, and Ricardo Smith. 2003. Craniofacial asymmetry in development: an anatomical study. The Angle Orthodontist (2003)."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858152"},{"key":"e_1_2_1_39_1","volume-title":"Estimating the support of a high-dimensional distribution. Neural computation","author":"Sch\u00f6lkopf Bernhard","year":"2001","unstructured":"Bernhard Sch\u00f6lkopf, John C Platt, John Shawe-Taylor, Alex J Smola, and Robert C Williamson. 2001. Estimating the support of a high-dimensional distribution. Neural computation (2001)."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543758.3547542"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642506"},{"key":"e_1_2_1_42_1","unstructured":"William E Siri. 1956. The gross composition of the body. In Advances in biological and medical physics."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23351"},{"key":"e_1_2_1_44_1","volume-title":"Earmonitor: In-ear Motion-resilient Acoustic Sensing Using Commodity Earphones. ACM Conference on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT).","author":"Sun Xue","year":"2023","unstructured":"Xue Sun, Jie Xiong, Chao Feng, Wenwen Deng, Xudong Wei, Dingyi Fang, and Xiaojiang Chen. 2023. Earmonitor: In-ear Motion-resilient Acoustic Sensing Using Commodity Earphones. ACM Conference on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). (2023)."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_2_1_46_1","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research (JMLR). (2008)."},{"key":"e_1_2_1_47_1","volume-title":"Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance. In IEEE Symposium on Security and Privacy (SP).","author":"Wang Ruxin","year":"2023","unstructured":"Ruxin Wang, Long Huang, and Chen Wang. 2023. Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance. In IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534606"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448098"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643515"},{"key":"e_1_2_1_51_1","volume-title":"The use of fast Fourier transform for the estimation of power spectra: a method based on time averaging over short, modified periodograms","author":"Welch Peter","year":"1967","unstructured":"Peter Welch. 1967. The use of fast Fourier transform for the estimation of power spectra: a method based on time averaging over short, modified periodograms. IEEE Transactions on audio and electroacoustics (1967)."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560553"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761435"},{"key":"e_1_2_1_54_1","volume-title":"CaiAuth: Context-aware implicit authentication when the screen is awake","author":"Wu Cong","year":"2020","unstructured":"Cong Wu, Kun He, Jing Chen, Ruiying Du, and Yang Xiang. 2020. CaiAuth: Context-aware implicit authentication when the screen is awake. IEEE Internet of Things Journal (IOT) (2020)."},{"key":"e_1_2_1_55_1","volume-title":"USENIX Security Symposium (USENIX).","author":"Wu Cong","year":"2020","unstructured":"Cong Wu, Kun He, Jing Chen, Ziming Zhao, and Ruiying Du. 2020. Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks. In USENIX Security Symposium (USENIX)."},{"key":"e_1_2_1_56_1","volume-title":"Toward robust detection of puppet attacks via characterizing fingertip-touch behaviors","author":"Wu Cong","year":"2021","unstructured":"Cong Wu, Kun He, Jing Chen, Ziming Zhao, and Ruiying Du. 2021. Toward robust detection of puppet attacks via characterizing fingertip-touch behaviors. IEEE Transactions on Dependable and Secure Computing (TDSC) (2021)."},{"key":"e_1_2_1_57_1","volume-title":"EarSpiro: Earphone-based Spirometry for Lung Function Assessment. ACM Conference on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT).","author":"Xie Wentao","year":"2023","unstructured":"Wentao Xie, Qingyong Hu, Jin Zhang, and Qian Zhang. 2023. EarSpiro: Earphone-based Spirometry for Lung Function Assessment. ACM Conference on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). (2023)."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796951"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380901"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623209"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24298"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3699780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T23:35:24Z","timestamp":1734651324000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3699780"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,21]]},"references-count":61,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,11,21]]}},"alternative-id":["10.1145\/3699780"],"URL":"https:\/\/doi.org\/10.1145\/3699780","relation":{},"ISSN":["2474-9567"],"issn-type":[{"type":"electronic","value":"2474-9567"}],"subject":[],"published":{"date-parts":[[2024,11,21]]},"assertion":[{"value":"2024-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}