{"id":30756,"date":"2022-07-18T23:16:59","date_gmt":"2022-07-18T12:16:59","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/odor-based-authentication\/30756\/"},"modified":"2022-07-18T23:17:04","modified_gmt":"2022-07-18T12:17:04","slug":"odor-based-authentication","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/odor-based-authentication\/30756\/","title":{"rendered":"Just breathe! Unusual biometrics based on odor"},"content":{"rendered":"<p>A group of researchers from several Japanese universities recently published an <a href=\"https:\/\/pubs.rsc.org\/en\/content\/articlelanding\/2022\/CC\/D1CC06384G\" target=\"_blank\" rel=\"nofollow noopener\">interesting study<\/a> describing a completely new form of biometric authentication: breath analysis. The idea is similar to the breath alcohol tests that ordinary drivers like you and me are sometimes subjected to, and which professional drivers and people in other hazardous occupations undergo on a regular basis.<\/p>\n<p>However, the similarity ends there. The method proposed in the study is much more complicated. For a start, it has to identify not one but several different chemical compounds in the breath. And what\u2019s more, the procedure needs not only to determine the concentration of certain substances, but to also distinguish one person from another by their chemical \u201cbreathprint\u201d.<\/p>\n<h2>But\u2026why?<\/h2>\n<p>\nThe neat thing about the work of these academic researchers is that they don\u2019t have to set themselves any practical goals! That is, they\u2019re doing it simply because they can.<\/p>\n<p>Overall, breath analysis is considered to be a cutting-edge area of research. With the help of machine learning to process data, serious breakthroughs have been made in this area\u00a0\u2014 for example, in the <a href=\"https:\/\/www.researchgate.net\/publication\/341693985_Medical_diagnosis_by_breath_analysis_odor_sensors\" target=\"_blank\" rel=\"nofollow noopener\">diagnosis of respiratory diseases<\/a>. So if the systems of analysis and learning algorithms are already available, why not investigate the possibility of authentication?<\/p>\n<h2>How does odor-based authentication work?<\/h2>\n<p>\nAt the first stage, test subjects\u2019 exhaled air is collected. Then, that air is passed through a 16-channel analyzer (the researchers tried collecting data through a fewer number of sensors, but this immediately reduced the method\u2019s effectiveness).<\/p>\n<p>Each channel separately detects a certain chemical compound in the air. The analyzer records not only the intensity of the signal from the sensors, but also how that intensity changes over time.<\/p>\n<div id=\"attachment_44949\" style=\"width: 1606px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2022\/07\/18231640\/odor-based-authentication-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-44949\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2022\/07\/18231640\/odor-based-authentication-1.png\" alt=\"This is how the breath-based authentication system works at this stage\" width=\"1596\" height=\"961\" class=\"size-full wp-image-44949\"><\/a><p id=\"caption-attachment-44949\" class=\"wp-caption-text\">This is how the breath-based authentication system works at this stage <a href=\"https:\/\/pubs.rsc.org\/en\/content\/articlelanding\/2022\/CC\/D1CC06384G\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<p>As a result, quite a large array of data is collected, which is then processed with the help of a machine-learning algorithm. After being trained on the test data, the algorithm can fairly accurately identify a person by their breath.<\/p>\n<h2>How reliable is it?<\/h2>\n<p>\nThe Japanese scientists were able to accurately identify a person by their breath in 97% of cases. Can that be deemed a success? There\u2019s not enough data in this study to fully answer that question.<\/p>\n<p>We can compare the overall performance with data from a 2016 <a href=\"https:\/\/www.researchgate.net\/publication\/306072438_Review_Paper_on_Applications_of_Principal_Component_Analysis_in_Multimodal_Biometrics_System\" target=\"_blank\" rel=\"nofollow noopener\">study<\/a>, which, among other things, investigated the features of the assessment of biometric systems. On the surface, the breath method is just as reliable as common fingerprint scanners, and even slightly outperforms face recognition technologies.<\/p>\n<div id=\"attachment_44948\" style=\"width: 1672px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2022\/07\/18231652\/odor-based-authentication-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-44948\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2022\/07\/18231652\/odor-based-authentication-2.png\" alt=\"Accuracy of various biometric authentication technologies\" width=\"1662\" height=\"427\" class=\"size-full wp-image-44948\"><\/a><p id=\"caption-attachment-44948\" class=\"wp-caption-text\">Accuracy of various biometric authentication technologies. <a href=\"https:\/\/www.researchgate.net\/publication\/306072438_Review_Paper_on_Applications_of_Principal_Component_Analysis_in_Multimodal_Biometrics_System\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<p>However, as emphasized in the above-mentioned 2016 study, it\u2019s important to take into account the ratio of false negatives (failing to recognize registered users) to false positives (authenticating a stranger). We meet the problem of false negatives every day when our smartphones don\u2019t recognize us\u00a0\u2014 albeit not the gravest of problems. False positives, on the other hand, are unpleasant, so eliminating them is a top priority. That said, there\u2019s not enough detailed information in this study about how odor-based authentication is doing on this front.<\/p>\n<p>On an interesting side note, the breath analysis researchers also referenced previous studies\u00a0\u2014 including their own\u00a0\u2014 and recorded the progress, for example, in comparison with the chemical analysis of human sweat. (Yes, sweat-based authentication has also been researched!)<\/p>\n<h2>How practical is it?<\/h2>\n<p>\nThe researchers used expensive lab equipment that you can\u2019t just attach to a laptop, phone, or even a car. Though these days it\u2019s possible to equip a car with a lock that blocks the car\u2019s ignition if alcohol is detected in the air, the equipment required for breath-based authentication is significantly more sophisticated and expensive.<\/p>\n<p>Besides, when reading the study in more detail, your come across even more reasons why we won\u2019t all be breathing into our smartphones to unlock them in the foreseeable future: as already mentioned, to increase accuracy, they also measured the decay time of certain chemical compounds\u00a0\u2014 which took as long as 40 minutes!<\/p>\n<p>And that\u2019s not all: the test subjects were not allowed to eat for six hours before the experiment. The authors note that the accuracy of the results can be influenced by a recent dinner, as well as the compounds found in the breath that accompany a range of illnesses. Seems like the light aroma of alcohol or simply a head cold could mess up the test.<\/p>\n<p>To sum up: here and now, there\u2019s not much practical use for this technology. But it\u2019s clearly an interesting area of research which could be developed further in the future\u00a0\u2014 if not in the form of \u201cbreathe into this tube\u201d authentication, at least, for example, in improved medical diagnosis systems.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"earth-2050\">\n","protected":false},"excerpt":{"rendered":"<p>We review a recent study on biometric authentication that uses breath analysis.<\/p>\n","protected":false},"author":665,"featured_media":30758,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1789],"tags":[1218,359,321],"class_list":{"0":"post-30756","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-2fa","9":"tag-authentication","10":"tag-technology"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/odor-based-authentication\/30756\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/odor-based-authentication\/24391\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/odor-based-authentication\/19857\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/odor-based-authentication\/26781\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/odor-based-authentication\/24690\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/odor-based-authentication\/25078\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/odor-based-authentication\/27427\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/odor-based-authentication\/27097\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/odor-based-authentication\/33531\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/odor-based-authentication\/10860\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/odor-based-authentication\/44945\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/odor-based-authentication\/19198\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/odor-based-authentication\/19756\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/odor-based-authentication\/29065\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/odor-based-authentication\/25263\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/odor-based-authentication\/30503\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/2fa\/","name":"2FA"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=30756"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30756\/revisions"}],"predecessor-version":[{"id":30757,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/30756\/revisions\/30757"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/30758"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=30756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=30756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=30756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}