User authentication based on foot motion

被引:0
作者
Davrondzhon Gafurov
Patrick Bours
Einar Snekkenes
机构
[1] Gjøvik University College,Norwegian Information Security Lab
来源
Signal, Image and Video Processing | 2011年 / 5卷
关键词
User authentication; Biometrics; Gait recognition; Acceleration signal; Foot motion; Wearable sensor;
D O I
暂无
中图分类号
学科分类号
摘要
In nearly all current systems, user authentication mechanism is one time and static. Although such type of user authentication is sufficient for many types of applications, in some scenarios, continuous or periodic re-verification of the identity is desirable, especially in high-security application. In this paper, we study user authentication based on 3D foot motion, which can be suitable for periodic identity re-verification purposes. Three-directional (3D) motion of the foot (in terms of acceleration signals) is collected using a wearable accelerometer sensor attached to the ankle of the person. Ankle accelerations from three directions (up-down, forward-backward and sideways) are analyzed for person authentication. Applied recognition method is based on detecting individual cycles in the signal and then finding best matching cycle pair between two acceleration signals. Using experimental data from 30 subjects, obtained EERs (Equal Error Rates) were in the range of 1.6–23.7% depending on motion directions and shoe types. Furthermore, by combining acceleration signals from 2D and 3D and then applying fusing techniques, recognition accuracies could be improved even further. The achieved performance improvements (in terms of EER) were up to 68.8%.
引用
收藏
页码:457 / 467
页数:10
相关论文
共 20 条
  • [1] Sarkar S.(2005)The humanID gait challenge problem: data sets, performance, and analysis IEEE Trans. Pattern Anal. Mach. Intell. 27 162-177
  • [2] Phillips P.J.(2000)Footprint-based personal recognition IEEE Trans. Biomed. Eng. 47 1534-1537
  • [3] Liu Z.(2008)Methods for person identification on a pressure-sensitive floor: experiments with multiple classifiers and reject option Inf. Fusion 9 21-40
  • [4] Vega I.R.(2006)New products IEEE Pervasive Comput. 5 12-15
  • [5] Grother P.(2007)Spoof attacks on gait authentication system IEEE Trans. Inf. Forensics Secur. 2 491-502
  • [6] Bowyer K.W.(2009)Handwriting verification-comparison of a multi-algorithmic and a multi-semantic approach Image Vision Comput. 27 269-278
  • [7] Nakajima K.(undefined)undefined undefined undefined undefined-undefined
  • [8] Mizukami Y.(undefined)undefined undefined undefined undefined-undefined
  • [9] Tanaka K.(undefined)undefined undefined undefined undefined-undefined
  • [10] Tamura T.(undefined)undefined undefined undefined undefined-undefined