Skip to main content

Pucker up: ‘Lip password’ verifies your identity through your lip motions

lip password biometric lips lightstargod
A team of scientists have developed a new biometric authentication method that identifies someone through the motions of their lips.

The “lip motion password,” or lip password, has been designed by Professor Cheung Yiu-ming and researchers at Hong Kong Baptist University. The method involves matching the lip motion associated with saying your password to the user’s lip characteristics.

The researchers at the university’s department of computer science claim that lip movement is unique to the individual. It cannot be easily impersonated and an impostor will be denied entry by the system, they said. “The same password spoken by two persons is different and a learning system can distinguish them,” commented Professor Cheung.

Cheung and his team developed a computational learning model that examined the visual features of a person’s lips including shape, texture, and movement.

lip password
Professor Cheung Yiu-ming Hong Kong Baptist University

This biometric authentication method could provide an additional layer of security for access to programs or systems. According to Cheung, it is a better system than voice activation, which can be inhibited by background noise. Further, lip passwords can be used by people with hearing or speech impairments and the method is not susceptible to language barriers, allowing anyone to use it, at least in theory.

In the future, the lip password could be integrated with facial recognition authentication systems for even more robust security and verification, the researchers said.

Biometrics using features like fingerprints have become much more common in recent years but they present a fundamental problem – they can’t be changed. If fingerprint scan data is ever stolen, the user needs to find a new method of authentication. The researchers in Hong Kong believe their new method of lip motions can provide security while allowing the user to change or reset it when they want.

The researchers have already obtained a patent for the method and expect to see it first deployed in financial transaction verification. They added that other use cases include ATM verification, mobile payments, and managing access to private premises.

Editors' Recommendations