7 research outputs found

    Comparison Analysis of Gait Classification For Human Motion Identification Using Embedded Computer

    Get PDF
    In this paper, it will be discussed about comparison between two kinds of classification methods in order to improve security system based of human gait. Gait is one of biometric methods which can be used to identify person. K-Nearest Neighbour has parallelly implemented with Support Vector Machine for classifying human gait in same basic system. Generally, system has been built using Histogram and Principal Component Analysis for gait detection and its feature extraction. Then, the result of the simulation showed that K-Nearest Neighbour is slower in processing and less accurate than Support Vector Machine in gait classification

    Appropriateness of gait analysis for biometrics: Initial study using FDA method

    Get PDF
    Human body movement has been under continuous research for many years due to its potential application as a novel biometric system to identify individuals. It is possible to utilize various techniques, not only to obtain requested movement data, but also to analyse movement data. This paper uses functional data analysis on data obtained from 12 volunteers and uses 20 markers from the 3D motion capture system VICON MX T020. The functional data analysis was chosen as a suitable tool to obtain more information about an individual's movement because it uses a technique for real-time data, which corresponds to continuous time process. The results show that all markers, under any walking speed and condition, identify a significantly high percentage of individual pairs. Further, our results discriminate between markers, where some markers are highly dependent on walking speed and condition, and also on the influence of body part asymmetry. In addition, regular movement patterns in almost all participants’ data shows a potential to identify individuals based on gait recognition with a 1:1 matching result. © 2017 Elsevier LtdIGA grant at Tomas Bata University in Zlin [IGA/FAI/2013/001]; European Regional Development Fund under the project CEBIA-Tech [CZ.1.05/2.1.00/03.0089]; Grant Agency of the Czech Republic [GA15-06991S]; Scientific Grant Agency of the Ministry of Education of the Slovak Republic; Slovak Academy of Sciences [VEGA 2/0011/16]; Slovak Research and Development Agency [APVV-15-0295

    Adaptive algorithms in accelerometer biometrics

    Get PDF
    Nowadays, many services are available from mobile devices, like smartphones. A growing number of people are using these devices to access bank accounts, social networks and to store personal information. However, common authentication mechanisms already present in these devices may not provide enough security. Recently, a new authentication method, named accelerometer biometrics, has been proposed. This method allows the identification of users using accelerometer data. Accelerometers, usually present in modern smartphones, are devices that measure acceleration forces. In accelerometer biometrics, a model is induced for the user of the smartphone. However, as a behavioral biometric technology, user models may became outdated over time. This paper investigates the use of adaptation mechanisms to update biometric user models induced by accelerometer data along the time. The paper also proposes and evaluates a new adaptation mechanism with promising experimental results.Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP

    Wearable device-based gait recognition using angle embedded gait dynamic images and a convolutional neural network

    Get PDF
    The widespread installation of inertial sensors in smartphones and other wearable devices provides a valuable opportunity to identify people by analyzing their gait patterns, for either cooperative or non-cooperative circumstances. However, it is still a challenging task to reliably extract discriminative features for gait recognition with noisy and complex data sequences collected from casually worn wearable devices like smartphones. To cope with this problem, we propose a novel image-based gait recognition approach using the Convolutional Neural Network (CNN) without the need to manually extract discriminative features. The CNN’s input image, which is encoded straightforwardly from the inertial sensor data sequences, is called Angle Embedded Gait Dynamic Image (AE-GDI). AE-GDI is a new two-dimensional representation of gait dynamics, which is invariant to rotation and translation. The performance of the proposed approach in gait authentication and gait labeling is evaluated using two datasets: (1) the McGill University dataset, which is collected under realistic conditions; and (2) the Osaka University dataset with the largest number of subjects. Experimental results show that the proposed approach achieves competitive recognition accuracy over existing approaches and provides an effective parametric solution for identification among a large number of subjects by gait patterns

    Wearable device-based gait recognition using angle embedded gait dynamic images and a convolutional neural network

    Get PDF
    The widespread installation of inertial sensors in smartphones and other wearable devices provides a valuable opportunity to identify people by analyzing their gait patterns, for either cooperative or non-cooperative circumstances. However, it is still a challenging task to reliably extract discriminative features for gait recognition with noisy and complex data sequences collected from casually worn wearable devices like smartphones. To cope with this problem, we propose a novel image-based gait recognition approach using the Convolutional Neural Network (CNN) without the need to manually extract discriminative features. The CNN’s input image, which is encoded straightforwardly from the inertial sensor data sequences, is called Angle Embedded Gait Dynamic Image (AE-GDI). AE-GDI is a new two-dimensional representation of gait dynamics, which is invariant to rotation and translation. The performance of the proposed approach in gait authentication and gait labeling is evaluated using two datasets: (1) the McGill University dataset, which is collected under realistic conditions; and (2) the Osaka University dataset with the largest number of subjects. Experimental results show that the proposed approach achieves competitive recognition accuracy over existing approaches and provides an effective parametric solution for identification among a large number of subjects by gait patterns

    De-identification for privacy protection in multimedia content : A survey

    Get PDF
    This document is the Accepted Manuscript version of the following article: Slobodan Ribaric, Aladdin Ariyaeeinia, and Nikola Pavesic, ‘De-identification for privacy protection in multimedia content: A survey’, Signal Processing: Image Communication, Vol. 47, pp. 131-151, September 2016, doi: https://doi.org/10.1016/j.image.2016.05.020. This manuscript version is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License CC BY NC-ND 4.0 (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way.Privacy is one of the most important social and political issues in our information society, characterized by a growing range of enabling and supporting technologies and services. Amongst these are communications, multimedia, biometrics, big data, cloud computing, data mining, internet, social networks, and audio-video surveillance. Each of these can potentially provide the means for privacy intrusion. De-identification is one of the main approaches to privacy protection in multimedia contents (text, still images, audio and video sequences and their combinations). It is a process for concealing or removing personal identifiers, or replacing them by surrogate personal identifiers in personal information in order to prevent the disclosure and use of data for purposes unrelated to the purpose for which the information was originally obtained. Based on the proposed taxonomy inspired by the Safe Harbour approach, the personal identifiers, i.e., the personal identifiable information, are classified as non-biometric, physiological and behavioural biometric, and soft biometric identifiers. In order to protect the privacy of an individual, all of the above identifiers will have to be de-identified in multimedia content. This paper presents a review of the concepts of privacy and the linkage among privacy, privacy protection, and the methods and technologies designed specifically for privacy protection in multimedia contents. The study provides an overview of de-identification approaches for non-biometric identifiers (text, hairstyle, dressing style, license plates), as well as for the physiological (face, fingerprint, iris, ear), behavioural (voice, gait, gesture) and soft-biometric (body silhouette, gender, age, race, tattoo) identifiers in multimedia documents.Peer reviewe

    Activity-Based User Authentication Using Smartwatches

    Get PDF
    Smartwatches, which contain an accelerometer and gyroscope, have recently been used to implement gait and gesture- based biometrics; however, the prior studies have long-established drawbacks. For example, data for both training and evaluation was captured from single sessions (which is not realistic and can lead to overly optimistic performance results), and in cases when the multi-day scenario was considered, the evaluation was often either done improperly or the results are very poor (i.e., greater than 20% of EER). Moreover, limited activities were considered (i.e., gait or gestures), and data captured within a controlled environment which tends to be far less realistic for real world applications. Therefore, this study remedies these past problems by training and evaluating the smartwatch-based biometric system on data from different days, using large dataset that involved the participation of 60 users, and considering different activities (i.e., normal walking (NW), fast walking (FW), typing on a PC keyboard (TypePC), playing mobile game (GameM), and texting on mobile (TypeM)). Unlike the prior art that focussed on simply laboratory controlled data, a more realistic dataset, which was captured within un-constrained environment, is used to evaluate the performance of the proposed system. Two principal experiments were carried out focusing upon constrained and un-constrained environments. The first experiment included a comprehensive analysis of the aforementioned activities and tested under two different scenarios (i.e., same and cross day). By using all the extracted features (i.e., 88 features) and the same day evaluation, EERs of the acceleration readings were 0.15%, 0.31%, 1.43%, 1.52%, and 1.33% for the NW, FW, TypeM, TypePC, and GameM respectively. The EERs were increased to 0.93%, 3.90%, 5.69%, 6.02%, and 5.61% when the cross-day data was utilized. For comparison, a more selective set of features was used and significantly maximize the system performance under the cross day scenario, at best EERs of 0.29%, 1.31%, 2.66%, 3.83%, and 2.3% for the aforementioned activities respectively. A realistic methodology was used in the second experiment by using data collected within unconstrained environment. A light activity detection approach was developed to divide the raw signals into gait (i.e., NW and FW) and stationary activities. Competitive results were reported with EERs of 0.60%, 0% and 3.37% for the NW, FW, and stationary activities respectively. The findings suggest that the nature of the signals captured are sufficiently discriminative to be useful in performing transparent and continuous user authentication.University of Kuf
    corecore