SlideShare a Scribd company logo
1 of 31
Download to read offline
EarAuthCam:
Personal Identification and Authentication Method Using
Ear Images Acquired with a Camera-Equipped Hearable Device
Ke io U niv e rsity
Yurina Mizuho, Yohei Kawasaki,
Takashi Amesaka, Yuta Sugiura
The Augmented Humans International Conference 2024
• Hearable devices
• Used for more diverse purposes
• Listening to music, phone calls, operating applications, etc.
• Record daily activities
• Lifelog, location
• Access to private information via voice control
• Calendar/Mail/ lifelog
• Risk of information leakage due to theft or loss
2
Background
Calendar
Address
Voice Memo Location
Lifelog
Personal authentication using camera attached to hearable devices
• Purpose
• Add security to hearable devices
• Reducing the risk of information leakage
• Additional functions
• payment, healthcare
• Proposed method
• Attach a small camera to a hearable device
• Identify / Authenticate the wearer using an ear image
3
Our Approach:EarAuthCam
4
[1] RN002 TW, https://amzn.asia/d/bDP2Id3 (Accessed on 04/03/2024).
Related Works
Hand gesture recognition
[Tamaki, 2009]
Facial expression reconstruction
[Chen, 2020]
Hearable devices×Biometrics
Ear Acoustic
[Gao, 2019]
PPG signals
[Choi, 2024]
Ear Acoustic
[RN002 TW[1]]
△Environmental sound, ear conditions
Hearable devices×Camera
Tooth sound
[Wang, 2022]
• Ear shape varies from individual to individual
• stable against aging [Iannarelli, 1989]
• has a highly complex asymmetric structure [Hurley, 2007]
• There are many biometrics using ear shapes
• Cannot be integrated into hearable devices
5
Ear Biometrics
Bodyprint
[Holz, 2015]
Model-based human ear identification
[Jeges, 2006]
Characteristic ear parts
6
Flow of the proposed method
Collect
ear image
Remove
background
(Mask R-CNN)
Resize
HOG
features
SVM
Auto encoder
Calculate
error rates
Identification
Authentication
Capturing Ear Images Image Processing Identification・Authentication
• Attach a small camera (3 mm2) to earphone
• Angle and position of camera to be fixed with tape
• Connected to PC and operated manually
7
Method:Hardware
Camera connected to PC
Earphone with camera
Camera
PC
Evaluation
board
Camera (SONY, IU233N2-Z)
Capturing Ear Images Image Processing Identification・Authentication
• Capture the upper part of the ear
• Particularly high concentration of individuality [Ryu, 1998]
• 640×480 pixel
8
Method
Capturing Ear Images Image Processing Identification・Authentication
Camera direction Example of an ear image
Characteristic ear parts
• Mask R-CNN[3]
• Framework for object detection in images
• Use to
• Estimate the ear region
• Remove the background
9
[3] K He, G Gkioxari, P Dollar et al., "Mask r-cnn", Proceedings of the IEEE international conference on computer vision, pp. 2961-2969,(2017).
[4] Lin, T-Y., Maire, M., et al.: Microsoft COCO: Common objects in context; In proceedings of the 13th European Conference on Computer Vision, pp. 740-755 (2014).
Method:Background Removal
Capturing Ear Images Image Processing Identification・Authentication
Annotated ear region
train : validation 8 : 2
Annotation tool VIA
(VGG Image Annotator)
Pre-trained weights Microsoft COCO[4]
Environment Google Colaboratory
Epoch 50
Mask R-CNN training
• Remove background except for the estimated ear regions
• Resize
• 640×480 pixel →128×96 pixel
10
Method:Background Removal
The estimated ear region The image without background
Capturing Ear Images Image Processing Identification・Authentication
• Difference between identification and authentication
11
Method
Capturing Ear Images Image Processing Identification・Authentication
Task Evaluation Use case
Identification
Whose data the input data is.
(Classification)
Accuracy
(Correct
Answer rate)
Share a hearable device
→ Personalized information
Authentication
Whether the input data is
the person’s data or not.
Equal Error Rate
(EER)
One person uses a device
→ Additional functions
• HOG features
• Histograms of Oriented Gradient
• robust to local brightness changes
• 5940 dimensions per image
• SVM
• Support Vector Machine
• Using data from all the people we wanted to identify
• Evaluation
• 10-fold cross-validation
12
Method:Identification
window size 128 × 96
block size 16 × 16
block stride 8 × 8
cell size 8 × 8
bin 9
Parameters of HOG features
Capturing Ear Images Image Processing Identification・Authentication
• Autoencoder
• Compress input data, extract features, reconstruct the output
• Train to minimize the difference between input and output (similarity Score)
• Use only the data from the person in question
• If the Score is
• below the threshold
• ⇒User
• greater than the threshold
• ⇒Stranger
13
Method:Authentication
Capturing Ear Images Image Processing Identification・Authentication
Authentication using autoencoder
• FRR (False Rejection Rate)
• Percentage of recognizing oneself as others
• FAR (False Acceptance Rate)
• Percentage of recognizing others as oneself
• EER (Equal Error Rate)
• The rate when FRR and FAR are equal
14
Method:Authentication
EER
Error rate with threshold change
Capturing Ear Images Image Processing Identification・Authentication
Varies in trade-offs
depending on the threshold
15
Experiment
• 20 participants×50 images = 1000 images
• Condition
• Indoors
• Bright/dark × 4 directions
• Sitting
• Reattach after each shot
Captured ear image
Number of participants 20 (11 males, 9 females)
Age 24.2 ± 6.9
Number of images per person 50
Train : Test 9 : 1 (10-fold cross validation)
Wearing position Right ear
Mask R-CNN training 100
(2 participants ×50 images)
Identification/Authentication 900
(18 participants ×50 images)
Participants’ information
Capturing Ear Images Image Processing Identification・Authentication
• Identification
• Accuracy 84.1%
16
Result
Capturing Ear Images Image Processing Identification・Authentication
Identification results for 18 participants
• Authentication
• EER 8.36%
Authentication results for 18 participants
• 6 participants×30 images×3 conditions = 540 images
• Lighting conditions
• Bright (1000 lx)
• Normal (300 lx)
• Dark (30 lx)
17
Additional Experiment
Number of participants 6(2 males, 4 females)
Age 22.3 ± 0.75
Number of images per person 30×3 conditions
Wearing position Right ear
Participants’ information
Capturing Ear Images Image Processing Identification・Authentication
• The model trained using images in all three conditions
• Identification:98.3%
• Authentication:5.61%
• Set up in a bright condition
• Add data in other conditions
18
Additional Experiment:Results and Discussion
Capturing Ear Images Image Processing Identification・Authentication
Results under different lighting conditions.
• Constraints in the experiment
• Lighting, Hair, Body movement
• Combining with non-image-based methods
• Acoustic microphone, infrared sensor, etc.
• Improve accuracy
• Use images of both ear
• Increase training data of Mask R-CNN
• Camera angle
• Include more ear features in the images using fisheye lens
19
Limitations and Future works
Characteristic ear parts
20
Summary
Background Access more sensitive information through hearable devices
Related works Biometrics using ear acoustic and ear shape
Our approach Identification / Authentication using earphone with camera
Use case Tailored information presentation to the user
Implementation Attach a small camera to earphone
Results Identification: 84.1%, Authentication: EER 8.36%
Future work Improving accuracy, combining with other methods
• [Gao, 2019] Yang Gao, Wei Wang, Vir V. Phoha, Wei Sun, and Zhanpeng Jin. 2019. EarEcho:Using ear canal echo for wearable authentication. Proc. ACM Interact. Mob.
Wearable Ubiquitous Technol. 3, 3, Article 81 (Sep 2019), 1–24 pages. https://doi.org/10.1145/3351239
• [Choi, 2023] Seokmin Choi, Junghwan Yim, Yincheng Jin, Yang Gao, Jiyang Li, and Zhanpeng Jin. 2023. EarPPG: Securing Your Identity with Your Ears. In Proceedings of
the 28th International Conference on Intelligent User Interfaces (Sydney, NSW, Australia) (IUI ’23). Association for Computing Machinery, New York, NY, USA, 835–849.
https://doi.org/10.1145/3581641.3584070
• [Wang, 2022] Zi Wang, Yili Ren, Yingying Chen, and Jie Yang. 2022. ToothSonic: Earable authentication via acoustic toothprint. Proc. ACM Interact. Mob.Wearable
Ubiquitous Technol. 6, 2, Article 78 (Jul 2022), 1–24 pages. https://doi.org/10.1145/3534606
• [Iannarelli, 1989] A.V. Iannarelli. 1989. Ear identification. Paramount Publishing Company, Fremont, CA. https://books.google.co.jp/books?id=jgPkAAAACAAJ
• [Hurley,2007] D. J. Hurley, B. Arbab-Zavar, and M. S. Nixon. 2007. The ear as a biometric. In 2007 15th European Signal Processing Conference. IEEE, Poznan, Poland,
25–29.
• [Holz, 2015] Christian Holz, Senaka Buthpitiya, and Marius Knaust. 2015. Bodyprint: Biometric user identification on mobile devices using the capacitive touchscreen to
scan body parts. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI ’15). Association for Computing Machinery, New
York, NY, USA, 3011–3014. https://doi.org/10.1145/2702123.2702518
• [Jeges, 2006] Erno Jeges and Laszlo Mate. 2006. Model-based human ear identification. In 2006 World Automation Congress. IEEE, Budapest, Hungary, 1–6.
https://doi.org/10.1109/WAC.2006.375757
• [Tamaki, 2009] Emi Tamaki, Takashi Miyaki, and Jun Rekimoto. 2009. Brainy Hand: An Ear-Worn Hand Gesture Interaction Device. In CHI ’09 Extended Abstracts on
Human Factors in Computing Systems (Boston, MA, USA) (CHI EA ’09). Association for Computing Machinery, New York, NY, USA, 4255—-4260.
https://doi.org/10.1145/1520340.1520649
• [Chen, 2020] Tuochao Chen, Benjamin Steeper, Kinan Alsheikh, Songyun Tao, François Guimbretière, and Cheng Zhang. 2020. C-Face: Continuously Reconstructing
Facial Expressions by Deep Learning Contours of the Face with Ear-Mounted Miniature Cameras. In Proceedings of the 33rd Annual ACM Symposium on User Interface
Software and Technology (Virtual Event, USA) (UIST ’20). Association for Computing Machinery, New York, NY, USA, 112—-125.
https://doi.org/10.1145/3379337.3415879
• [Ryu, 1998] Onebae Ryu, Tatsuhiro Tamura, and Katsuyuki Shinohara. 1998. The Individual Identification with Pinna Image: An Examination for Auto Detection of Pinna
Area and Individuality. ITE Tech. Report 22, 45 (1998), 49–53.
21
Reference
Appendix
• Identification
• Accuracy 84.1%
23
Result
Capturing Ear Images Image Processing Identification・Authentication
Identification results for 18 participants
Classifier Identification Accuracy (%)
Random forest 77.8
K-nearest neighbor 78.6
SVM (our approach) 84.1
Comparison of with other classifiers
• Authentication
• Total EER 8.36%
24
Result
Capturing Ear Images Image Processing Identification・Authentication
The EER for each participant Authentication results for 18 participants
• The number of ear images for each participant
• 50 images
• Identification:84.1%
• Authentication:8.36%
• 10 images
• Identification:82.8%
• Authentication:10.9%
25
Discussion:The number of training data
Relationship between
the number of ear images and accuracy
Capturing Ear Images Image Processing Identification・Authentication
• The number of ear images
• Only 10 images
• Identification:82.8%
• Authentication:10.9%
• Processing time
• In Google Colaboratory
• Set up: 2 minutes
• Process a single image
• Identification:4.33 seconds
• Authentication:4.7 seconds
26
Discussion:Usability
Relationship between
the number of ear images and accuracy
• The accuracy of background removal
• Directly affect to identification/authentication accuracy
• Increase the data for training
• Data augmentation
• Use large number of individuals
• Increase pattern of ear images
• Dataset quality
• Remove the outlier images before training
27
Discussion:Background Removal
• Keeping the camera running all the time consumes a lot of battery
• Leading to heat generation
• Activate camera only when necessary
• When detecting the attachment, accessing more personal information
• Reduce the frame rate
28
Discussion:Battery Consumption
• Camera-based method
• Privacy issues
• Extract only the calculated features from the image
• Use infrared camera
• Make people around the camera aware of its use
• Shining an LED while the camera is activated
29
Discussion:Privacy
30
Comparison with related work using ear images
• Existing products
31
https://www.amazon.in/V-T-I-Bluetooth-Headphones-Canceling-Microphone/dp/B07YB743JM (Accessed on 04/03/2024).
Camera equipped with a hearable device

More Related Content

Similar to EarAuthCam: Personal Identification and Authentication Method Using Ear Images Acquired with a Camera-Equipped Hearable Device

Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...
Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...
Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...shritosh kumar
 
Review of Detection & Recognition Techniques for 2D Ear Biometrics System
Review of Detection & Recognition Techniques for 2D Ear Biometrics SystemReview of Detection & Recognition Techniques for 2D Ear Biometrics System
Review of Detection & Recognition Techniques for 2D Ear Biometrics Systemshritosh kumar
 
Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013ijcsbi
 
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...IOSR Journals
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4sakshi_20
 
Personal Identification using Gait Data on Slipper-device with Accelerometer ...
Personal Identification using Gait Data on Slipper-device with Accelerometer ...Personal Identification using Gait Data on Slipper-device with Accelerometer ...
Personal Identification using Gait Data on Slipper-device with Accelerometer ...sugiuralab
 
A Survey on Human Ear Recognition
A Survey on Human Ear RecognitionA Survey on Human Ear Recognition
A Survey on Human Ear RecognitionIJERA Editor
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
IRJET- Real Time Attendance System using Face Recognition
IRJET-  	  Real Time Attendance System using Face RecognitionIRJET-  	  Real Time Attendance System using Face Recognition
IRJET- Real Time Attendance System using Face RecognitionIRJET Journal
 
RECENT ADVANCES IN ORTHODONTIC DIAGNOSTIC AIDS
RECENT ADVANCES IN ORTHODONTIC DIAGNOSTIC AIDSRECENT ADVANCES IN ORTHODONTIC DIAGNOSTIC AIDS
RECENT ADVANCES IN ORTHODONTIC DIAGNOSTIC AIDSShehnaz Jahangir
 
Palmprint Identification Based on Principle Line Using Machine Learning Tech...
Palmprint Identification Based on Principle Line Using Machine  Learning Tech...Palmprint Identification Based on Principle Line Using Machine  Learning Tech...
Palmprint Identification Based on Principle Line Using Machine Learning Tech...IJMER
 
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...ijtsrd
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceIOSR Journals
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...CSCJournals
 

Similar to EarAuthCam: Personal Identification and Authentication Method Using Ear Images Acquired with a Camera-Equipped Hearable Device (20)

Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...
Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...
Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...
 
Review of Detection & Recognition Techniques for 2D Ear Biometrics System
Review of Detection & Recognition Techniques for 2D Ear Biometrics SystemReview of Detection & Recognition Techniques for 2D Ear Biometrics System
Review of Detection & Recognition Techniques for 2D Ear Biometrics System
 
Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013
 
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Personal Identification using Gait Data on Slipper-device with Accelerometer ...
Personal Identification using Gait Data on Slipper-device with Accelerometer ...Personal Identification using Gait Data on Slipper-device with Accelerometer ...
Personal Identification using Gait Data on Slipper-device with Accelerometer ...
 
A Survey on Human Ear Recognition
A Survey on Human Ear RecognitionA Survey on Human Ear Recognition
A Survey on Human Ear Recognition
 
Anits dip
Anits dipAnits dip
Anits dip
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
IRJET- Real Time Attendance System using Face Recognition
IRJET-  	  Real Time Attendance System using Face RecognitionIRJET-  	  Real Time Attendance System using Face Recognition
IRJET- Real Time Attendance System using Face Recognition
 
RECENT ADVANCES IN ORTHODONTIC DIAGNOSTIC AIDS
RECENT ADVANCES IN ORTHODONTIC DIAGNOSTIC AIDSRECENT ADVANCES IN ORTHODONTIC DIAGNOSTIC AIDS
RECENT ADVANCES IN ORTHODONTIC DIAGNOSTIC AIDS
 
Palmprint Identification Based on Principle Line Using Machine Learning Tech...
Palmprint Identification Based on Principle Line Using Machine  Learning Tech...Palmprint Identification Based on Principle Line Using Machine  Learning Tech...
Palmprint Identification Based on Principle Line Using Machine Learning Tech...
 
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Final_ppt1
Final_ppt1Final_ppt1
Final_ppt1
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...
 

More from sugiuralab

TataPixel: 畳の異方性を利用した切り替え可能なディスプレイの提案
TataPixel: 畳の異方性を利用した切り替え可能なディスプレイの提案TataPixel: 畳の異方性を利用した切り替え可能なディスプレイの提案
TataPixel: 畳の異方性を利用した切り替え可能なディスプレイの提案sugiuralab
 
Selfie WanD: 自撮り棒を動かすことによる撮影用入力インタフェース
Selfie WanD: 自撮り棒を動かすことによる撮影用入力インタフェースSelfie WanD: 自撮り棒を動かすことによる撮影用入力インタフェース
Selfie WanD: 自撮り棒を動かすことによる撮影用入力インタフェースsugiuralab
 
スマートフォンを用いた新生児あやし動作の教示システム
スマートフォンを用いた新生児あやし動作の教示システムスマートフォンを用いた新生児あやし動作の教示システム
スマートフォンを用いた新生児あやし動作の教示システムsugiuralab
 
プレイマットのパターン生成支援ツールの評価
プレイマットのパターン生成支援ツールの評価プレイマットのパターン生成支援ツールの評価
プレイマットのパターン生成支援ツールの評価sugiuralab
 
プレイマットのパターン生成支援ツール
プレイマットのパターン生成支援ツールプレイマットのパターン生成支援ツール
プレイマットのパターン生成支援ツールsugiuralab
 
EarHover:ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識
EarHover:ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識EarHover:ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識
EarHover:ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識sugiuralab
 
SkinRing: 装着方向に依らない指側面でのジェスチャ入力可能なリング型デバイス
SkinRing: 装着方向に依らない指側面でのジェスチャ入力可能なリング型デバイスSkinRing: 装着方向に依らない指側面でのジェスチャ入力可能なリング型デバイス
SkinRing: 装着方向に依らない指側面でのジェスチャ入力可能なリング型デバイスsugiuralab
 
バイオリンの運弓動作計測による初心者と経験者の差異分析
バイオリンの運弓動作計測による初心者と経験者の差異分析バイオリンの運弓動作計測による初心者と経験者の差異分析
バイオリンの運弓動作計測による初心者と経験者の差異分析sugiuralab
 
Converting Tatamis into Touch Sensors by Measuring Capacitance
Converting Tatamis into Touch Sensors by Measuring CapacitanceConverting Tatamis into Touch Sensors by Measuring Capacitance
Converting Tatamis into Touch Sensors by Measuring Capacitancesugiuralab
 
Pinch Force Measurement Using a Geomagnetic Sensor
Pinch Force Measurement Using a Geomagnetic SensorPinch Force Measurement Using a Geomagnetic Sensor
Pinch Force Measurement Using a Geomagnetic Sensorsugiuralab
 
Smartphone-Based Teaching System for Neonate Soothing Motions
Smartphone-Based Teaching System for Neonate Soothing MotionsSmartphone-Based Teaching System for Neonate Soothing Motions
Smartphone-Based Teaching System for Neonate Soothing Motionssugiuralab
 
Tactile Presentation of Orchestral Conductor's Motion Trajectory
Tactile Presentation of Orchestral Conductor's Motion TrajectoryTactile Presentation of Orchestral Conductor's Motion Trajectory
Tactile Presentation of Orchestral Conductor's Motion Trajectorysugiuralab
 
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
 
Seeing the Wind: An Interactive Mist Interface for Airflow Input
Seeing the Wind: An Interactive Mist Interface for Airflow InputSeeing the Wind: An Interactive Mist Interface for Airflow Input
Seeing the Wind: An Interactive Mist Interface for Airflow Inputsugiuralab
 
Estimation of Violin Bow Pressure Using Photo-Reflective Sensors
Estimation of Violin Bow Pressure Using Photo-Reflective SensorsEstimation of Violin Bow Pressure Using Photo-Reflective Sensors
Estimation of Violin Bow Pressure Using Photo-Reflective Sensorssugiuralab
 
バウンサーを動かす外付けデバイス
バウンサーを動かす外付けデバイスバウンサーを動かす外付けデバイス
バウンサーを動かす外付けデバイスsugiuralab
 
A Virtual Window Using Curtains and Image Projection
A Virtual Window Using Curtains and Image ProjectionA Virtual Window Using Curtains and Image Projection
A Virtual Window Using Curtains and Image Projectionsugiuralab
 
スマートフォンを用いた新生児あやし動作の教示システム
スマートフォンを用いた新生児あやし動作の教示システムスマートフォンを用いた新生児あやし動作の教示システム
スマートフォンを用いた新生児あやし動作の教示システムsugiuralab
 
指側面を入力インタフェース化するリング型デバイス
指側面を入力インタフェース化するリング型デバイス指側面を入力インタフェース化するリング型デバイス
指側面を入力インタフェース化するリング型デバイスsugiuralab
 
ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識
ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識
ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識sugiuralab
 

More from sugiuralab (20)

TataPixel: 畳の異方性を利用した切り替え可能なディスプレイの提案
TataPixel: 畳の異方性を利用した切り替え可能なディスプレイの提案TataPixel: 畳の異方性を利用した切り替え可能なディスプレイの提案
TataPixel: 畳の異方性を利用した切り替え可能なディスプレイの提案
 
Selfie WanD: 自撮り棒を動かすことによる撮影用入力インタフェース
Selfie WanD: 自撮り棒を動かすことによる撮影用入力インタフェースSelfie WanD: 自撮り棒を動かすことによる撮影用入力インタフェース
Selfie WanD: 自撮り棒を動かすことによる撮影用入力インタフェース
 
スマートフォンを用いた新生児あやし動作の教示システム
スマートフォンを用いた新生児あやし動作の教示システムスマートフォンを用いた新生児あやし動作の教示システム
スマートフォンを用いた新生児あやし動作の教示システム
 
プレイマットのパターン生成支援ツールの評価
プレイマットのパターン生成支援ツールの評価プレイマットのパターン生成支援ツールの評価
プレイマットのパターン生成支援ツールの評価
 
プレイマットのパターン生成支援ツール
プレイマットのパターン生成支援ツールプレイマットのパターン生成支援ツール
プレイマットのパターン生成支援ツール
 
EarHover:ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識
EarHover:ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識EarHover:ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識
EarHover:ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識
 
SkinRing: 装着方向に依らない指側面でのジェスチャ入力可能なリング型デバイス
SkinRing: 装着方向に依らない指側面でのジェスチャ入力可能なリング型デバイスSkinRing: 装着方向に依らない指側面でのジェスチャ入力可能なリング型デバイス
SkinRing: 装着方向に依らない指側面でのジェスチャ入力可能なリング型デバイス
 
バイオリンの運弓動作計測による初心者と経験者の差異分析
バイオリンの運弓動作計測による初心者と経験者の差異分析バイオリンの運弓動作計測による初心者と経験者の差異分析
バイオリンの運弓動作計測による初心者と経験者の差異分析
 
Converting Tatamis into Touch Sensors by Measuring Capacitance
Converting Tatamis into Touch Sensors by Measuring CapacitanceConverting Tatamis into Touch Sensors by Measuring Capacitance
Converting Tatamis into Touch Sensors by Measuring Capacitance
 
Pinch Force Measurement Using a Geomagnetic Sensor
Pinch Force Measurement Using a Geomagnetic SensorPinch Force Measurement Using a Geomagnetic Sensor
Pinch Force Measurement Using a Geomagnetic Sensor
 
Smartphone-Based Teaching System for Neonate Soothing Motions
Smartphone-Based Teaching System for Neonate Soothing MotionsSmartphone-Based Teaching System for Neonate Soothing Motions
Smartphone-Based Teaching System for Neonate Soothing Motions
 
Tactile Presentation of Orchestral Conductor's Motion Trajectory
Tactile Presentation of Orchestral Conductor's Motion TrajectoryTactile Presentation of Orchestral Conductor's Motion Trajectory
Tactile Presentation of Orchestral Conductor's Motion Trajectory
 
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
 
Seeing the Wind: An Interactive Mist Interface for Airflow Input
Seeing the Wind: An Interactive Mist Interface for Airflow InputSeeing the Wind: An Interactive Mist Interface for Airflow Input
Seeing the Wind: An Interactive Mist Interface for Airflow Input
 
Estimation of Violin Bow Pressure Using Photo-Reflective Sensors
Estimation of Violin Bow Pressure Using Photo-Reflective SensorsEstimation of Violin Bow Pressure Using Photo-Reflective Sensors
Estimation of Violin Bow Pressure Using Photo-Reflective Sensors
 
バウンサーを動かす外付けデバイス
バウンサーを動かす外付けデバイスバウンサーを動かす外付けデバイス
バウンサーを動かす外付けデバイス
 
A Virtual Window Using Curtains and Image Projection
A Virtual Window Using Curtains and Image ProjectionA Virtual Window Using Curtains and Image Projection
A Virtual Window Using Curtains and Image Projection
 
スマートフォンを用いた新生児あやし動作の教示システム
スマートフォンを用いた新生児あやし動作の教示システムスマートフォンを用いた新生児あやし動作の教示システム
スマートフォンを用いた新生児あやし動作の教示システム
 
指側面を入力インタフェース化するリング型デバイス
指側面を入力インタフェース化するリング型デバイス指側面を入力インタフェース化するリング型デバイス
指側面を入力インタフェース化するリング型デバイス
 
ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識
ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識
ヒアラブルデバイスにおける音漏れ信号を用いた空中ジェスチャ認識
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

EarAuthCam: Personal Identification and Authentication Method Using Ear Images Acquired with a Camera-Equipped Hearable Device

  • 1. EarAuthCam: Personal Identification and Authentication Method Using Ear Images Acquired with a Camera-Equipped Hearable Device Ke io U niv e rsity Yurina Mizuho, Yohei Kawasaki, Takashi Amesaka, Yuta Sugiura The Augmented Humans International Conference 2024
  • 2. • Hearable devices • Used for more diverse purposes • Listening to music, phone calls, operating applications, etc. • Record daily activities • Lifelog, location • Access to private information via voice control • Calendar/Mail/ lifelog • Risk of information leakage due to theft or loss 2 Background Calendar Address Voice Memo Location Lifelog
  • 3. Personal authentication using camera attached to hearable devices • Purpose • Add security to hearable devices • Reducing the risk of information leakage • Additional functions • payment, healthcare • Proposed method • Attach a small camera to a hearable device • Identify / Authenticate the wearer using an ear image 3 Our Approach:EarAuthCam
  • 4. 4 [1] RN002 TW, https://amzn.asia/d/bDP2Id3 (Accessed on 04/03/2024). Related Works Hand gesture recognition [Tamaki, 2009] Facial expression reconstruction [Chen, 2020] Hearable devices×Biometrics Ear Acoustic [Gao, 2019] PPG signals [Choi, 2024] Ear Acoustic [RN002 TW[1]] △Environmental sound, ear conditions Hearable devices×Camera Tooth sound [Wang, 2022]
  • 5. • Ear shape varies from individual to individual • stable against aging [Iannarelli, 1989] • has a highly complex asymmetric structure [Hurley, 2007] • There are many biometrics using ear shapes • Cannot be integrated into hearable devices 5 Ear Biometrics Bodyprint [Holz, 2015] Model-based human ear identification [Jeges, 2006] Characteristic ear parts
  • 6. 6 Flow of the proposed method Collect ear image Remove background (Mask R-CNN) Resize HOG features SVM Auto encoder Calculate error rates Identification Authentication Capturing Ear Images Image Processing Identification・Authentication
  • 7. • Attach a small camera (3 mm2) to earphone • Angle and position of camera to be fixed with tape • Connected to PC and operated manually 7 Method:Hardware Camera connected to PC Earphone with camera Camera PC Evaluation board Camera (SONY, IU233N2-Z) Capturing Ear Images Image Processing Identification・Authentication
  • 8. • Capture the upper part of the ear • Particularly high concentration of individuality [Ryu, 1998] • 640×480 pixel 8 Method Capturing Ear Images Image Processing Identification・Authentication Camera direction Example of an ear image Characteristic ear parts
  • 9. • Mask R-CNN[3] • Framework for object detection in images • Use to • Estimate the ear region • Remove the background 9 [3] K He, G Gkioxari, P Dollar et al., "Mask r-cnn", Proceedings of the IEEE international conference on computer vision, pp. 2961-2969,(2017). [4] Lin, T-Y., Maire, M., et al.: Microsoft COCO: Common objects in context; In proceedings of the 13th European Conference on Computer Vision, pp. 740-755 (2014). Method:Background Removal Capturing Ear Images Image Processing Identification・Authentication Annotated ear region train : validation 8 : 2 Annotation tool VIA (VGG Image Annotator) Pre-trained weights Microsoft COCO[4] Environment Google Colaboratory Epoch 50 Mask R-CNN training
  • 10. • Remove background except for the estimated ear regions • Resize • 640×480 pixel →128×96 pixel 10 Method:Background Removal The estimated ear region The image without background Capturing Ear Images Image Processing Identification・Authentication
  • 11. • Difference between identification and authentication 11 Method Capturing Ear Images Image Processing Identification・Authentication Task Evaluation Use case Identification Whose data the input data is. (Classification) Accuracy (Correct Answer rate) Share a hearable device → Personalized information Authentication Whether the input data is the person’s data or not. Equal Error Rate (EER) One person uses a device → Additional functions
  • 12. • HOG features • Histograms of Oriented Gradient • robust to local brightness changes • 5940 dimensions per image • SVM • Support Vector Machine • Using data from all the people we wanted to identify • Evaluation • 10-fold cross-validation 12 Method:Identification window size 128 × 96 block size 16 × 16 block stride 8 × 8 cell size 8 × 8 bin 9 Parameters of HOG features Capturing Ear Images Image Processing Identification・Authentication
  • 13. • Autoencoder • Compress input data, extract features, reconstruct the output • Train to minimize the difference between input and output (similarity Score) • Use only the data from the person in question • If the Score is • below the threshold • ⇒User • greater than the threshold • ⇒Stranger 13 Method:Authentication Capturing Ear Images Image Processing Identification・Authentication Authentication using autoencoder
  • 14. • FRR (False Rejection Rate) • Percentage of recognizing oneself as others • FAR (False Acceptance Rate) • Percentage of recognizing others as oneself • EER (Equal Error Rate) • The rate when FRR and FAR are equal 14 Method:Authentication EER Error rate with threshold change Capturing Ear Images Image Processing Identification・Authentication Varies in trade-offs depending on the threshold
  • 15. 15 Experiment • 20 participants×50 images = 1000 images • Condition • Indoors • Bright/dark × 4 directions • Sitting • Reattach after each shot Captured ear image Number of participants 20 (11 males, 9 females) Age 24.2 ± 6.9 Number of images per person 50 Train : Test 9 : 1 (10-fold cross validation) Wearing position Right ear Mask R-CNN training 100 (2 participants ×50 images) Identification/Authentication 900 (18 participants ×50 images) Participants’ information Capturing Ear Images Image Processing Identification・Authentication
  • 16. • Identification • Accuracy 84.1% 16 Result Capturing Ear Images Image Processing Identification・Authentication Identification results for 18 participants • Authentication • EER 8.36% Authentication results for 18 participants
  • 17. • 6 participants×30 images×3 conditions = 540 images • Lighting conditions • Bright (1000 lx) • Normal (300 lx) • Dark (30 lx) 17 Additional Experiment Number of participants 6(2 males, 4 females) Age 22.3 ± 0.75 Number of images per person 30×3 conditions Wearing position Right ear Participants’ information Capturing Ear Images Image Processing Identification・Authentication
  • 18. • The model trained using images in all three conditions • Identification:98.3% • Authentication:5.61% • Set up in a bright condition • Add data in other conditions 18 Additional Experiment:Results and Discussion Capturing Ear Images Image Processing Identification・Authentication Results under different lighting conditions.
  • 19. • Constraints in the experiment • Lighting, Hair, Body movement • Combining with non-image-based methods • Acoustic microphone, infrared sensor, etc. • Improve accuracy • Use images of both ear • Increase training data of Mask R-CNN • Camera angle • Include more ear features in the images using fisheye lens 19 Limitations and Future works Characteristic ear parts
  • 20. 20 Summary Background Access more sensitive information through hearable devices Related works Biometrics using ear acoustic and ear shape Our approach Identification / Authentication using earphone with camera Use case Tailored information presentation to the user Implementation Attach a small camera to earphone Results Identification: 84.1%, Authentication: EER 8.36% Future work Improving accuracy, combining with other methods
  • 21. • [Gao, 2019] Yang Gao, Wei Wang, Vir V. Phoha, Wei Sun, and Zhanpeng Jin. 2019. EarEcho:Using ear canal echo for wearable authentication. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3, 3, Article 81 (Sep 2019), 1–24 pages. https://doi.org/10.1145/3351239 • [Choi, 2023] Seokmin Choi, Junghwan Yim, Yincheng Jin, Yang Gao, Jiyang Li, and Zhanpeng Jin. 2023. EarPPG: Securing Your Identity with Your Ears. In Proceedings of the 28th International Conference on Intelligent User Interfaces (Sydney, NSW, Australia) (IUI ’23). Association for Computing Machinery, New York, NY, USA, 835–849. https://doi.org/10.1145/3581641.3584070 • [Wang, 2022] Zi Wang, Yili Ren, Yingying Chen, and Jie Yang. 2022. ToothSonic: Earable authentication via acoustic toothprint. Proc. ACM Interact. Mob.Wearable Ubiquitous Technol. 6, 2, Article 78 (Jul 2022), 1–24 pages. https://doi.org/10.1145/3534606 • [Iannarelli, 1989] A.V. Iannarelli. 1989. Ear identification. Paramount Publishing Company, Fremont, CA. https://books.google.co.jp/books?id=jgPkAAAACAAJ • [Hurley,2007] D. J. Hurley, B. Arbab-Zavar, and M. S. Nixon. 2007. The ear as a biometric. In 2007 15th European Signal Processing Conference. IEEE, Poznan, Poland, 25–29. • [Holz, 2015] Christian Holz, Senaka Buthpitiya, and Marius Knaust. 2015. Bodyprint: Biometric user identification on mobile devices using the capacitive touchscreen to scan body parts. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI ’15). Association for Computing Machinery, New York, NY, USA, 3011–3014. https://doi.org/10.1145/2702123.2702518 • [Jeges, 2006] Erno Jeges and Laszlo Mate. 2006. Model-based human ear identification. In 2006 World Automation Congress. IEEE, Budapest, Hungary, 1–6. https://doi.org/10.1109/WAC.2006.375757 • [Tamaki, 2009] Emi Tamaki, Takashi Miyaki, and Jun Rekimoto. 2009. Brainy Hand: An Ear-Worn Hand Gesture Interaction Device. In CHI ’09 Extended Abstracts on Human Factors in Computing Systems (Boston, MA, USA) (CHI EA ’09). Association for Computing Machinery, New York, NY, USA, 4255—-4260. https://doi.org/10.1145/1520340.1520649 • [Chen, 2020] Tuochao Chen, Benjamin Steeper, Kinan Alsheikh, Songyun Tao, François Guimbretière, and Cheng Zhang. 2020. C-Face: Continuously Reconstructing Facial Expressions by Deep Learning Contours of the Face with Ear-Mounted Miniature Cameras. In Proceedings of the 33rd Annual ACM Symposium on User Interface Software and Technology (Virtual Event, USA) (UIST ’20). Association for Computing Machinery, New York, NY, USA, 112—-125. https://doi.org/10.1145/3379337.3415879 • [Ryu, 1998] Onebae Ryu, Tatsuhiro Tamura, and Katsuyuki Shinohara. 1998. The Individual Identification with Pinna Image: An Examination for Auto Detection of Pinna Area and Individuality. ITE Tech. Report 22, 45 (1998), 49–53. 21 Reference
  • 23. • Identification • Accuracy 84.1% 23 Result Capturing Ear Images Image Processing Identification・Authentication Identification results for 18 participants Classifier Identification Accuracy (%) Random forest 77.8 K-nearest neighbor 78.6 SVM (our approach) 84.1 Comparison of with other classifiers
  • 24. • Authentication • Total EER 8.36% 24 Result Capturing Ear Images Image Processing Identification・Authentication The EER for each participant Authentication results for 18 participants
  • 25. • The number of ear images for each participant • 50 images • Identification:84.1% • Authentication:8.36% • 10 images • Identification:82.8% • Authentication:10.9% 25 Discussion:The number of training data Relationship between the number of ear images and accuracy Capturing Ear Images Image Processing Identification・Authentication
  • 26. • The number of ear images • Only 10 images • Identification:82.8% • Authentication:10.9% • Processing time • In Google Colaboratory • Set up: 2 minutes • Process a single image • Identification:4.33 seconds • Authentication:4.7 seconds 26 Discussion:Usability Relationship between the number of ear images and accuracy
  • 27. • The accuracy of background removal • Directly affect to identification/authentication accuracy • Increase the data for training • Data augmentation • Use large number of individuals • Increase pattern of ear images • Dataset quality • Remove the outlier images before training 27 Discussion:Background Removal
  • 28. • Keeping the camera running all the time consumes a lot of battery • Leading to heat generation • Activate camera only when necessary • When detecting the attachment, accessing more personal information • Reduce the frame rate 28 Discussion:Battery Consumption
  • 29. • Camera-based method • Privacy issues • Extract only the calculated features from the image • Use infrared camera • Make people around the camera aware of its use • Shining an LED while the camera is activated 29 Discussion:Privacy
  • 30. 30 Comparison with related work using ear images