Abstract
In this paper, we propose a secure key pairing system, FaceMatch, to enable confidential communication for smartphones. The idea is to leverage a natural human interaction mode: face-to-face interaction. Two users raise up their smartphones to establish a secure channel based on their similar observations via the smartphones’ cameras. One user acts as the initiator and uses the front-facing camera to snap his/her face. The other user captures the initiator’s face using his/her rear camera. Utilizing the facial appearance as a secret substitution, the initiator delivers a randomly generated key to the other user. Based on this key, two users establish a confidential communication channel between their devices. FaceMatch achieves secure device pairing without the complex operations needed in prior works. We implemented FaceMatch using off-the-shelf iPhones. The experimental results show that FaceMatch can establish a 128-bit encrypted connection in less than 3 s.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cai, L., Zeng, K., Chen, H., Mohapatra, P.: Good neighbor: ad hoc pairing of nearby wireless devices by multiple antennas. In: Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, U.S. (2011)
Cristinacce, D., Cootes, T.F.: Feature detection and tracking with constrained local models. In: British Machine Vision Conference 2006, Edinburgh, UK, pp. 929–938 (2006)
Farb, M., Lin, Y.H., Kim, H.J., Mccune, J., Perrig, A.: Safeslinger: easy-to-use and secure public-key exchange. In: ACM International Conference on Mobile Computing and Networking (ACM MobiCom), pp. 417–428 (2013)
Halperin, D., Hu, W., Sheth, A., Wetherall, D.: Tool release: gathering 802.11n traces with channel state information. ACM SIGCOMM Comput. Commun. Rev. 41(1), 53 (2011)
He, X., Cai, D., Niyogi, P.: Laplacian score for feature selection. In: International Conference on Neural Information Processing Systems, pp. 507–514 (2005)
Jain, A.K., Farrokhnia, F.: Unsupervised texture segmentation using gabor filters. Pattern Recogn. 24(12), 1167–1186 (1991)
Kalal, Z., Mikolajczyk, K., Matas, J.: Forward-backward error: automatic detection of tracking failures. In: International Conference on Pattern Recognition, pp. 2756–2759 (2010)
Kalal, Z., Mikolajczyk, K., Matas, J.: Tracking-learning-detection. IEEE Trans. Pattern Anal. Mach. Intell. 34(7), 1409–1422 (2012)
Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1867–1874 (2014)
Le, V., Brandt, J., Lin, Z., Bourdev, L., Huang, T.S.: Interactive facial feature localization. In: Fitzgibbon, A., Lazebnik, S., Perona, P., Sato, Y., Schmid, C. (eds.) ECCV 2012, Part III. LNCS, vol. 7574, pp. 679–692. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33712-3_49
Lee, D., Park, H., Chang, D.Y.: Face alignment using cascade Gaussian process regression trees. In: Computer Vision and Pattern Recognition, pp. 4204–4212 (2015)
Li, L., Zhao, X., Xue, G.: Near field authentication for smart devices. In: IEEE INFOCOM, pp. 375–379 (2013)
Mathur, S., Miller, R., Varshavsky, A., Trappe, W., Mandayam, N.: Proximate: proximity-based secure pairing using ambient wireless signals. In: International Conference on Mobile Systems, Applications, and Services, pp. 211–224 (2011)
Matthews, I., Baker, S.: Active appearance models revisited. Int. J. Comput. Vis. 60(2), 135–164 (2004)
Maurer, U., Wolf, S.: Information-theoretic key agreement: from weak to strong secrecy for free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 351–368. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-45539-6_24
Mayrhofer, R., Gellersen, H.: Shake well before use: authentication based on accelerometer data. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 144–161. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72037-9_9
Milborrow, S., Nicolls, F.: Locating Facial features with an extended active shape model. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008, Part IV. LNCS, vol. 5305, pp. 504–513. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88693-8_37
Nandakumar, R., Chintalapudi, K.K., Padmanabhan, V., Venkatesan, R.: Dhwani: secure peer-to-peer acoustic NFC. In: ACM SIGCOMM, pp. 63–74 (2013)
Sauer, P., Cootes, T., Taylor, C.: Accurate regression procedures for active appearance models. In: BMVC, vol. 1(6), pp. 681–685 (2011)
Schurmann, D., Sigg, S.: Secure communication based on ambient audio. IEEE Trans. Mob. Comput. 12(2), 358–370 (2013)
Seshadri, K., Savvides, M.: Robust modified active shape model for automatic facial landmark annotation of frontal faces. In: IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp. 1–8 (2009)
Sethi, M., Antikainen, M., Aura, T.: Commitment-based device pairing with synchronized drawing. In: IEEE PerCom 2014 (2014)
Sun, Z., Purohit, A., Bose, R., Zhang, P.: Spartacus: spatially-aware interaction for mobile devices through energy-efficient audio sensing. In: Proceeding of the International Conference on Mobile Systems, Applications, and Services, pp. 263–276 (2013)
Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: IEEE Computer Society Conference on Computer Vision & Pattern Recognition, p. 511 (2001)
Xi, W., et al.: Keep: fast secret key extraction protocol for D2D communication. In: IEEE International Symposium of Quality of Service (IWQOS), pp. 350–359 (2014)
Zhang, S., Bauckhage, C., Cremers, A.B.: Informed haar-like features improve pedestrian detection. In: Computer Vision and Pattern Recognition, pp. 947–954 (2014)
Acknowledgements
This work is supported by the National Postdoctoral Program for Innovative Talent under Grant No. BX20180235, and National Natural Science Foundation of China (NSFC) under Grant No. 61502374 and 61272456. This work is also supported by Fundamental Research Funds for the Central Universities under project No. JB171003.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Jiang, Z., Li, R., Zhao, K., Chen, S. (2018). Secure Device Pairing via Facial Image Similarity. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11068. Springer, Cham. https://doi.org/10.1007/978-3-030-00021-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-00021-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00020-2
Online ISBN: 978-3-030-00021-9
eBook Packages: Computer ScienceComputer Science (R0)