{"created":"2025-01-19T01:11:52.904251+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00210676","sets":["581:10433:10437"]},"path":["10437"],"owner":"44499","recid":"210676","title":["User Authentication Method Using Active Acoustic Sensing"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-04-15"},"_buckets":{"deposit":"b2eb6795-9767-412a-90b6-fe768519166a"},"_deposit":{"id":"210676","pid":{"type":"depid","value":"210676","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"User Authentication Method Using Active Acoustic Sensing","author_link":["533981","533979","533982","533984","533980","533983"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"User Authentication Method Using Active Acoustic Sensing"},{"subitem_title":"User Authentication Method Using Active Acoustic Sensing","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[一般論文] wearable computing, smartwatch, user identification, user authentification, ultrasound","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2021-04-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Hokkaido University"},{"subitem_text_value":"Hokkaido University"},{"subitem_text_value":"Hokkaido University"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Hokkaido University","subitem_text_language":"en"},{"subitem_text_value":"Hokkaido University","subitem_text_language":"en"},{"subitem_text_value":"Hokkaido University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/210676/files/IPSJ-JNL6204024.pdf","label":"IPSJ-JNL6204024.pdf"},"date":[{"dateType":"Available","dateValue":"2023-04-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6204024.pdf","filesize":[{"value":"1.9 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"416779d4-1e3c-42b8-a529-dee677b9533c","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Watanabe"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroaki, Kakizawa"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masanori, Sugimoto"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Watanabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroaki, Kakizawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masanori, Sugimoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Personal authentication of the wearable device is important because it has become personalized. Personal identification number (PIN) is generally used to identify the user. However, the user has to remember the PIN and it is easily attacked by shoulder hacking. Therefore, in this study, we propose an authentication method using active acoustic sensing to the user's body. Concretely, the speaker transmits the ultrasonic signal to the user's body and the microphone receives the reflected signal from the body. Each user has a different body composition, and it causes a different frequency response. The system authenticates the user utilizing the difference. Moreover, to improve authentication performance, we add four hand poses to authenticate. Since the proposed method requires one hand for authentication, it is suitable for the wearable computing environment. We implemented the prototype and evaluated the proposed method with nine participants. The evaluation results confirmed that the accuracy of user identification was 91.2% and the equal error rate of user authentication was 2.94% using four hand poses.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.29(2021) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.29.370\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Personal authentication of the wearable device is important because it has become personalized. Personal identification number (PIN) is generally used to identify the user. However, the user has to remember the PIN and it is easily attacked by shoulder hacking. Therefore, in this study, we propose an authentication method using active acoustic sensing to the user's body. Concretely, the speaker transmits the ultrasonic signal to the user's body and the microphone receives the reflected signal from the body. Each user has a different body composition, and it causes a different frequency response. The system authenticates the user utilizing the difference. Moreover, to improve authentication performance, we add four hand poses to authenticate. Since the proposed method requires one hand for authentication, it is suitable for the wearable computing environment. We implemented the prototype and evaluated the proposed method with nine participants. The evaluation results confirmed that the accuracy of user identification was 91.2% and the equal error rate of user authentication was 2.94% using four hand poses.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.29(2021) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.29.370\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2021-04-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"62"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":210676,"updated":"2025-01-19T18:03:34.444007+00:00","links":{}}