150 research outputs found
Seamless Interactions Between Humans and Mobility Systems
As mobility systems, including vehicles and roadside infrastructure, enter a period of rapid and profound change, it is important to enhance interactions between people and mobility systems. Seamless human—mobility system interactions can promote widespread deployment of engaging applications, which are crucial for driving safety and efficiency.
The ever-increasing penetration rate of ubiquitous computing devices, such as smartphones and wearable devices, can facilitate realization of this goal. Although researchers and developers have attempted to adapt ubiquitous sensors for mobility applications (e.g., navigation apps), these solutions often suffer from limited usability and can be risk-prone. The root causes of these limitations include the low sensing modality and limited computational power available in ubiquitous computing devices.
We address these challenges by developing and demonstrating that novel sensing techniques and machine learning can be applied to extract essential, safety-critical information from drivers natural driving behavior, even actions as subtle as steering maneuvers (e.g., left-/righthand turns and lane changes). We first show how ubiquitous sensors can be used to detect steering maneuvers regardless of disturbances to sensing devices. Next, by focusing on turning maneuvers, we characterize drivers driving patterns using a quantifiable metric. Then, we demonstrate how microscopic analyses of crowdsourced ubiquitous sensory data can be used to infer critical macroscopic contextual information, such as risks present at road intersections. Finally, we use ubiquitous sensors to profile a driver’s behavioral patterns on a large scale; such sensors are found to be essential to the analysis and improvement of drivers driving behavior.PHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/163127/1/chendy_1.pd
Biometric walk recognizer. Research and results on wearable sensor-based gait recognition
Gait is a biometric trait that can allow user authentication, though being classified as a "soft" one due to a certain lack in permanence, and to sensibility to specific conditions. The earliest research relies on computer vision-based approaches, especially applied in video surveillance. More recently, the spread of wearable sensors, especially those embedded in mobile devices, which are able to capture the dynamics of the walking pattern through simpler 1D signals, has spurred a different research line. This capture modality can avoid some problems related to computer vision-based techniques, but suffers from specific limitations. Related research is still in a less advanced phase with respect to other biometric traits. However, the promising results achieved so far, the increasing accuracy of sensors, the ubiquitous presence of mobile devices, and the low cost of related techniques, make this biometrics attractive and suggest to continue the investigations in this field. The first Chapters of this thesis deal with an introduction to biometrics, and more specifically to gait trait. A comprehensive review of technologies, approaches and strategies exploited by gait recognition proposals in the state-of-the-art is also provided. After such introduction, the contributions of this work are presented in details. Summarizing, it improves preceding result achieved during my Master Degree in Computer Science course of Biometrics and extended in my following Master Degree Thesis. The research deals with different strategies, including preprocessing and recognition techniques, applied to the gait biometrics, in order to allow both an automatic recognition and an improvement of the system accuracy
Mobile Behavior Based Authentication
To make smartphone authentication more convenient and encourage usage of more secure methods, we designed a system, LOBS, that would authenticate users by recognizing their behavior patterns. LOBS constructed behavioral signatures by examining visible WiFi networks, GPS location, accelerometer data, battery usage, and when the screen was turned off and on. It used a neural network trained on the user’s historical data to analyze the latest data and determine a trust score, measuring how likely that data was to be from the same person, and authenticating the user if it was high enough. We evaluated LOBS with a study that used data gathered from six people over a week. The results we obtained were too low for LOBS to be commercially marketable, but much higher than random chance
UFPR-Periocular: A Periocular Dataset Collected by Mobile Devices in Unconstrained Scenarios
Recently, ocular biometrics in unconstrained environments using images
obtained at visible wavelength have gained the researchers' attention,
especially with images captured by mobile devices. Periocular recognition has
been demonstrated to be an alternative when the iris trait is not available due
to occlusions or low image resolution. However, the periocular trait does not
have the high uniqueness presented in the iris trait. Thus, the use of datasets
containing many subjects is essential to assess biometric systems' capacity to
extract discriminating information from the periocular region. Also, to address
the within-class variability caused by lighting and attributes in the
periocular region, it is of paramount importance to use datasets with images of
the same subject captured in distinct sessions. As the datasets available in
the literature do not present all these factors, in this work, we present a new
periocular dataset containing samples from 1,122 subjects, acquired in 3
sessions by 196 different mobile devices. The images were captured under
unconstrained environments with just a single instruction to the participants:
to place their eyes on a region of interest. We also performed an extensive
benchmark with several Convolutional Neural Network (CNN) architectures and
models that have been employed in state-of-the-art approaches based on
Multi-class Classification, Multitask Learning, Pairwise Filters Network, and
Siamese Network. The results achieved in the closed- and open-world protocol,
considering the identification and verification tasks, show that this area
still needs research and development
Deep Learning based Fingerprint Presentation Attack Detection: A Comprehensive Survey
The vulnerabilities of fingerprint authentication systems have raised
security concerns when adapting them to highly secure access-control
applications. Therefore, Fingerprint Presentation Attack Detection (FPAD)
methods are essential for ensuring reliable fingerprint authentication. Owing
to the lack of generation capacity of traditional handcrafted based approaches,
deep learning-based FPAD has become mainstream and has achieved remarkable
performance in the past decade. Existing reviews have focused more on
hand-cratfed rather than deep learning-based methods, which are outdated. To
stimulate future research, we will concentrate only on recent
deep-learning-based FPAD methods. In this paper, we first briefly introduce the
most common Presentation Attack Instruments (PAIs) and publicly available
fingerprint Presentation Attack (PA) datasets. We then describe the existing
deep-learning FPAD by categorizing them into contact, contactless, and
smartphone-based approaches. Finally, we conclude the paper by discussing the
open challenges at the current stage and emphasizing the potential future
perspective.Comment: 29 pages, submitted to ACM computing survey journa
- …