{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:44:36Z","timestamp":1760784276771,"version":"3.41.0"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T00:00:00Z","timestamp":1495670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2017,5,31]]},"abstract":"<jats:p>\n            Biometric characteristics are often used as a supplementary component in user authentication and identification schemes. Many biometric traits, both physiological and behavioral, offering a wider range of security and stability, have been explored. We propose a new physiological trait based on the human body\u2019s electrical response to a square pulse signal, called\n            <jats:italic>pulse-response<\/jats:italic>\n            , and analyze how this biometric characteristic can be used to enhance security in the context of two example applications: (1) an additional authentication mechanism in PIN entry systems and (2) a means of continuous authentication on a secure terminal. The pulse-response biometric recognition is effective because each human body exhibits a unique response to a signal pulse applied at the palm of one hand and measured at the palm of the other. This identification mechanism integrates well with other established methods and could offer an additional layer of security, either on a continuous basis or at log-in time. We build a proof-of-concept prototype and perform experiments to assess the feasibility of pulse-response for biometric authentication. The results are very encouraging, achieving an equal error rate of 2% over a static dataset and 9% over a dataset with samples taken over several weeks. We also quantize resistance to attack by estimating individual worst-case probabilities for zero-effort impersonation in different experiments.\n          <\/jats:p>","DOI":"10.1145\/3064645","type":"journal-article","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T16:16:45Z","timestamp":1495729005000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Pulse-Response"],"prefix":"10.1145","volume":"20","author":[{"given":"Ivan","family":"Martinovic","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Kasper B.","family":"Rasmussen","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Marc","family":"Roeschlin","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"University of California, Irvine, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,25]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_1_1_1","DOI":"10.1109\/TSP.2004.839903(410) 53"},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.13176\/11.427"},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.1007\/978-3-642-02002-5_4"},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.1109\/34.62613"},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.1109\/PRISMS.2013.6927175"},{"doi-asserted-by":"publisher","key":"e_1_2_1_6_1","DOI":"10.1207\/S15327744JOCE1004_07"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1016\/j.cose.2006.08.008"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1145\/2594368.2594369"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 3rd USENIX Workshop on Health Security and Privacy (HealthSec\u201912)","author":"Cornelius Cory","year":"2012","unstructured":"Cory Cornelius , Jacob Sorber , Ronald A. Peterson , Joe Skinner , Ryan J. Halter , and David Kotz . 2012 . Who wears me? Bioimpedance as a passive biometric . In Proceedings of the 3rd USENIX Workshop on Health Security and Privacy (HealthSec\u201912) , Carl A. Gunter and Zachary N. J. Peterson (Eds.). Cory Cornelius, Jacob Sorber, Ronald A. Peterson, Joe Skinner, Ryan J. Halter, and David Kotz. 2012. Who wears me? Bioimpedance as a passive biometric. In Proceedings of the 3rd USENIX Workshop on Health Security and Privacy (HealthSec\u201912), Carl A. Gunter and Zachary N. J. Peterson (Eds.)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.1145\/2207676.2208544"},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.1109\/MITP.2013.50"},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.14722\/ndss.2015.23203"},{"doi-asserted-by":"publisher","key":"e_1_2_1_13_1","DOI":"10.1016\/j.patrec.2005.10.010"},{"volume-title":"IEEE Conference on Technologies for Homeland Security (HST\u201912)","author":"Feng Tao","unstructured":"Tao Feng , Ziyi Liu , Kyeong-An Kwon , Weidong Shi , B. Carbunar , Yifei Jiang , and N. Nguyen . 2012. Continuous mobile authentication using touchscreen gestures . In IEEE Conference on Technologies for Homeland Security (HST\u201912) . 451--456. Tao Feng, Ziyi Liu, Kyeong-An Kwon, Weidong Shi, B. Carbunar, Yifei Jiang, and N. Nguyen. 2012. Continuous mobile authentication using touchscreen gestures. In IEEE Conference on Technologies for Homeland Security (HST\u201912). 451--456.","key":"e_1_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_15_1","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_2_1_16_1","volume-title":"Briefings of the Black Hat Conference.","author":"Galbally Javier","year":"2012","unstructured":"Javier Galbally , Arun Ross , Marta Gomez-Barrero , Julian Fierrez , and Javier Ortega-Garcia . 2012 . From the Iriscode to the Iris: A new vulnerability of iris recognition systems. White paper . In Briefings of the Black Hat Conference. Javier Galbally, Arun Ross, Marta Gomez-Barrero, Julian Fierrez, and Javier Ortega-Garcia. 2012. From the Iriscode to the Iris: A new vulnerability of iris recognition systems. White paper. In Briefings of the Black Hat Conference."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of SPIE 5404","author":"Gamboa Hugo","year":"2004","unstructured":"Hugo Gamboa and Ana Fred . 2004 . A behavioral biometric system based on human-computer interaction, In Biometric Technology for Human Identification . Proceedings of SPIE 5404 , 381--392. Hugo Gamboa and Ana Fred. 2004. A behavioral biometric system based on human-computer interaction, In Biometric Technology for Human Identification. Proceedings of SPIE 5404, 381--392."},{"volume-title":"IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems (BTAS\u201909)","author":"Giot R.","unstructured":"R. Giot , M. El-Abed , and C. Rosenberger . 2009. Keystroke dynamics with low constraints SVM based passphrase enrollment . In IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems (BTAS\u201909) . 1--6. R. Giot, M. El-Abed, and C. Rosenberger. 2009. Keystroke dynamics with low constraints SVM based passphrase enrollment. In IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems (BTAS\u201909). 1--6.","key":"e_1_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_19_1","DOI":"10.1145\/1085126.1085129"},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.5555\/1929820.1929860"},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.1109\/AUTOID.2005.30"},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1145\/2807442.2807458"},{"unstructured":"Information Technology Laboratory -- National Institute of Standards and Technology. 2013. The Biometrics Resource Center. http:\/\/www.nist.gov\/itl\/csd\/biometrics\/index.cfm.  Information Technology Laboratory -- National Institute of Standards and Technology. 2013. The Biometrics Resource Center. http:\/\/www.nist.gov\/itl\/csd\/biometrics\/index.cfm.","key":"e_1_2_1_23_1"},{"volume-title":"Introduction to Biometrics","author":"Jain Anil K.","unstructured":"Anil K. Jain , Arun Ross , and Karthik Nandakumar . 2011. Introduction to Biometrics . Springer . Anil K. Jain, Arun Ross, and Karthik Nandakumar. 2011. Introduction to Biometrics. Springer.","key":"e_1_2_1_24_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_25_1","DOI":"10.1109\/TIFS.2006.873653"},{"doi-asserted-by":"publisher","key":"e_1_2_1_26_1","DOI":"10.1145\/1966913.1966983"},{"doi-asserted-by":"publisher","key":"e_1_2_1_27_1","DOI":"10.1145\/75577.75582"},{"key":"e_1_2_1_29_1","volume-title":"Retrieved","author":"Nara Lyra","year":"2013","unstructured":"Lyra Nara . 2013 . Hand Electrodes Brass (1 Pair). (2013) . Retrieved April 15, 2017 from http:\/\/www.lyranara.com\/hand-electrodes-brass-1-pair\/. Lyra Nara. 2013. Hand Electrodes Brass (1 Pair). (2013). Retrieved April 15, 2017 from http:\/\/www.lyranara.com\/hand-electrodes-brass-1-pair\/."},{"key":"e_1_2_1_30_1","volume-title":"Martinsen and Sverre Grimnes","author":"Orjan","year":"2011","unstructured":"Orjan G. Martinsen and Sverre Grimnes . 2011 . Bioimpedance and Bioelectricity Basics. Academic Press , Cambridge, MA. Orjan G. Martinsen and Sverre Grimnes. 2011. Bioimpedance and Bioelectricity Basics. Academic Press, Cambridge, MA."},{"doi-asserted-by":"publisher","key":"e_1_2_1_31_1","DOI":"10.1145\/319709.319720"},{"doi-asserted-by":"publisher","key":"e_1_2_1_32_1","DOI":"10.1109\/TSMCA.2010.2052602"},{"unstructured":"National Science 8 Technology Council. 2006. Biometrics Frequently Asked Questions. http:\/\/biometrics.gov\/Documents\/FAQ.pdf.  National Science 8 Technology Council. 2006. Biometrics Frequently Asked Questions. http:\/\/biometrics.gov\/Documents\/FAQ.pdf.","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","volume-title":"Briefings of the Black Hat Conference.","author":"Nguyen Minh Duc","year":"2009","unstructured":"Minh Duc Nguyen and Quang Minh Bui . 2009 . Your face is NOT your password: Face authentication bypassing - Lenovo - Asus - Toshiba. White paper . In Briefings of the Black Hat Conference. Minh Duc Nguyen and Quang Minh Bui. 2009. Your face is NOT your password: Face authentication bypassing - Lenovo - Asus - Toshiba. White paper. In Briefings of the Black Hat Conference."},{"key":"e_1_2_1_35_1","volume-title":"Jain","author":"Niinuma Koichiro","year":"2010","unstructured":"Koichiro Niinuma and Anil K . Jain . 2010 . Continuous user authentication using temporal information. In Technology for Human Identification VII. Proceedings of SPIE 7667, 76670L--76670L--11. Koichiro Niinuma and Anil K. Jain. 2010. Continuous user authentication using temporal information. In Technology for Human Identification VII. Proceedings of SPIE 7667, 76670L--76670L--11."},{"doi-asserted-by":"publisher","key":"e_1_2_1_36_1","DOI":"10.1145\/1029208.1029210"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 21st Annual Network and Distributed System Security Symposium.","author":"Rasmussen Kasper Bonne","year":"2014","unstructured":"Kasper Bonne Rasmussen , Marc Roeschlin , Ivan Martinovic , and Gene Tsudik . 2014 . Authentication using pulse-response biometrics . In Proceedings of the 21st Annual Network and Distributed System Security Symposium. Kasper Bonne Rasmussen, Marc Roeschlin, Ivan Martinovic, and Gene Tsudik. 2014. Authentication using pulse-response biometrics. In Proceedings of the 21st Annual Network and Distributed System Security Symposium."},{"volume-title":"Communications in Computer and Information Science","author":"Revett Kenneth","unstructured":"Kenneth Revett and S\u00e9rgio Tenreiro de Magalh\u00e3es . 2010. Cognitive biometrics: Challenges for the future . In Global Security, Safety, and Sustainability, S\u00e9rgio Tenreiro de Magalh\u00e3es, Hamid Jahankhani, and Ali G. Hessami (Eds.). Communications in Computer and Information Science , Vol. 92 . Springer , 79--86. Kenneth Revett and S\u00e9rgio Tenreiro de Magalh\u00e3es. 2010. Cognitive biometrics: Challenges for the future. In Global Security, Safety, and Sustainability, S\u00e9rgio Tenreiro de Magalh\u00e3es, Hamid Jahankhani, and Ali G. Hessami (Eds.). Communications in Computer and Information Science, Vol. 92. Springer, 79--86.","key":"e_1_2_1_38_1"},{"key":"e_1_2_1_39_1","volume-title":"Retrieved","author":"Sensible Vision Inc.","year":"2013","unstructured":"Sensible Vision Inc. 2013 . Facial Recognition Provides Continuous System Security . Retrieved April 15, 2017 from http:\/\/www.sensiblevision.com\/en-us\/fastaccessanywhere\/overview.aspx. Sensible Vision Inc. 2013. Facial Recognition Provides Continuous System Security. Retrieved April 15, 2017 from http:\/\/www.sensiblevision.com\/en-us\/fastaccessanywhere\/overview.aspx."},{"key":"e_1_2_1_40_1","first-page":"3346","article-title":"Keyboard apparatus for personal identification","volume":"17","author":"Spillane R.","year":"1975","unstructured":"R. Spillane . 1975 . Keyboard apparatus for personal identification . IBM Technical Disclosure Bulletin 17 , 3346 . R. Spillane. 1975. Keyboard apparatus for personal identification. IBM Technical Disclosure Bulletin 17, 3346.","journal-title":"IBM Technical Disclosure Bulletin"},{"key":"e_1_2_1_41_1","volume-title":"Andrew Beng Jin Teoh, and Shigang Yue","author":"Teh Pin Shen","year":"2013","unstructured":"Pin Shen Teh , Andrew Beng Jin Teoh, and Shigang Yue . 2013 . A survey of keystroke dynamics biometrics. The Scientific World Journal 2013 (2013). Pin Shen Teh, Andrew Beng Jin Teoh, and Shigang Yue. 2013. A survey of keystroke dynamics biometrics. The Scientific World Journal 2013 (2013)."},{"key":"e_1_2_1_42_1","volume-title":"20th Annual Network and Distributed System Security Symposium (NDSS\u201913)","author":"Tey Chee Meng","year":"2013","unstructured":"Chee Meng Tey , Payas Gupta , and Debin Gao . 2013 . I can be you: Questioning the use of keystroke dynamics as biometrics . In 20th Annual Network and Distributed System Security Symposium (NDSS\u201913) , San Diego, California, February 24--27 , 2013. http:\/\/internetsociety.org\/doc\/i-can-be-you-questioning-use-keystroke-dynamics-biometrics. Chee Meng Tey, Payas Gupta, and Debin Gao. 2013. I can be you: Questioning the use of keystroke dynamics as biometrics. In 20th Annual Network and Distributed System Security Symposium (NDSS\u201913), San Diego, California, February 24--27, 2013. http:\/\/internetsociety.org\/doc\/i-can-be-you-questioning-use-keystroke-dynamics-biometrics."},{"doi-asserted-by":"publisher","key":"e_1_2_1_43_1","DOI":"10.5555\/1353862.1353878"},{"doi-asserted-by":"publisher","key":"e_1_2_1_44_1","DOI":"10.1016\/S0020-7373(85)80036-5"},{"key":"e_1_2_1_45_1","volume-title":"Video.Retrieved","author":"Biometric VIRDI","year":"2009","unstructured":"VIRDI Biometric . 2009 . How to make the fake fingerprints (by VIRDI) . Video.Retrieved April 15, 2017 from http:\/\/www.youtube.com\/watch?v&equals;-H71tyMupqk last accessed 03.08.2013. VIRDI Biometric. 2009. How to make the fake fingerprints (by VIRDI). Video.Retrieved April 15, 2017 from http:\/\/www.youtube.com\/watch?v&equals;-H71tyMupqk last accessed 03.08.2013."},{"unstructured":"John Woodward Nicholas Orlans and Peter Higgins. 2003. Biometrics. McGraw-Hill\/Osborne New York NY.   John Woodward Nicholas Orlans and Peter Higgins. 2003. Biometrics. McGraw-Hill\/Osborne New York NY.","key":"e_1_2_1_46_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_47_1","DOI":"10.1145\/2046707.2046725"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3064645","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3064645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:15Z","timestamp":1750217775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3064645"}},"subtitle":["Exploring Human Body Impedance for Biometric Recognition"],"short-title":[],"issued":{"date-parts":[[2017,5,25]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,5,31]]}},"alternative-id":["10.1145\/3064645"],"URL":"https:\/\/doi.org\/10.1145\/3064645","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2017,5,25]]},"assertion":[{"value":"2016-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}