Nothing Special   »   [go: up one dir, main page]

Skip to main content

Robustness of Biometric Gait Authentication Against Impersonation Attack

  • Conference paper
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (OTM 2006)

Abstract

This paper presents a gait authentication based on time-normalized gait cycles. Unlike most of the previous works in gait recognition, using machine vision techniques, in our approach gait patterns are obtained from a physical sensor attached to the hip. Acceleration in 3 directions: up-down, forward-backward and sideways of the hip movement, which is obtained by the sensor, is used for authentication. Furthermore, we also present a study on the security strength of gait biometric against imitating or mimicking attacks, which has not been addressed in biometric gait recognition so far.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Hayfron-Acquah, J.B., Nixon, M.S., Carter, J.N.: Automatic gait recognition by symmetry analysis. In: Audio- and Video-Based Biometric Person Authentication, pp. 272–277 (2001)

    Google Scholar 

  2. Shutler, J., Nixon, M.: Zernike velocity moments for description and recognition of moving shapes. In: British Machine Vision Conference, pp. 11/1–11/4 (2001) Session 8: Modelling Behaviour

    Google Scholar 

  3. Cunado, D., Nixon, M., Carter, J.: Automatic extraction and description of human gait models for recognition purposes. In: Computer Vision and Image Understanding, pp. 1–41 (2003)

    Google Scholar 

  4. Wang, L., Hu, W., Tan, T.: A new attempt to gait-based human identification. In: International Conference on Pattern Recognition, pp. 115–118 (2002)

    Google Scholar 

  5. BenAbdelkader, C., Cutler, R., Davis, L.: Stride and cadence as a biometric in automatic person identification and verification. In: Fifth IEEE International Conference on Automatic Face and Gesture Recognition, May 2002, pp. 357–362 (2002)

    Google Scholar 

  6. BenAbdelkader, C., Cutler, R., Nanda, H., Davis, L.: Eigengait: Motion-based recognition of people using image self-similarity. In: Audio-and Video-Based Biometric Person Authentication (2001)

    Google Scholar 

  7. Johnson, A.Y., Bobick, A.F.: A multi-view method for gait recognition using static body parameters. In: Third International Conference on Audio- and Video-Based Biometric Person Authentication, June 2001, pp. 301–311 (2001)

    Google Scholar 

  8. Sarkar, S., Phillips, P.J., Liu, Z., Vega, I.R., Grother, P., Bowyer, K.W.: The humanid gait challenge problem: Data sets, performance, and analysis. IEEE Trans. Pattern Anal. Mach. Intell. 27(2), 162–177 (2005)

    Article  Google Scholar 

  9. Lam, T.H.W., Lee, R.S.T.: A new representation for human gait recognition: Motion silhouettes image (msi). In: ICB, pp. 612–618 (2006)

    Google Scholar 

  10. Wang, Y., Yu, S., Wang, Y., Tan, T.: Gait recognition based on fusion of multi-view gait sequences. In: ICB, pp. 605–611 (2006)

    Google Scholar 

  11. Walraven, J.A.: Introduction to applications and industries for microelectromechanical systems (MEMS). In: International Test Conference, pp. 674–680 (2003)

    Google Scholar 

  12. Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Third International Conference on Audio- and Video-Based Biometric Person Authentication, June 2001, pp. 223–228 (2001)

    Google Scholar 

  13. Martin, A., Doddington, G., Kamm, T., Ordowski, M., Przybocki, M.: The DET curve in assessment of detection task performance. In: Eurospeech 1997, pp. 1895–1898 (1997)

    Google Scholar 

  14. Bolle, R.M., Pankanti, S., Ratha, N.K.: Evaluation techniques for biometrics-based authentication systems (FRR). In: 15th International Conference on Pattern Recognition, September 2000, pp. 831–837 (2000)

    Google Scholar 

  15. Ailisto, H.J., Lindholm, M., Mantyjarvi, J., Vildjiounaite, E., Makela, S.-M.: Identifying people from gait pattern with accelerometers. In: Proceedings of SPIE. Biometric Technology for Human Identification II, vol. 5779, pp. 7–14 (March 2005)

    Google Scholar 

  16. Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela, S.-M., Ailisto, H.J.: Identifying users of portable devices from gait pattern with accelerometers. In: 2005 IEEE International Conference on Acoustics, Speech, and Signal Processing (March 2005)

    Google Scholar 

  17. Bobick, A.F., Johnson, A.Y.: Gait recognition using static, activity-specific parameters. In: Proceedings of the 2001 IEEE Computer Computer Vision and Pattern Recognition, vol. 1, pp. I-423–I-430 (2001)

    Google Scholar 

  18. Gafurov, D., Helkala, K., Sondrol, T.: Gait recognition using acceleration from MEMS. In: 1st IEEE International Conference on Availability, Reliability and Security (ARES), Vienna, Austria (April 2006)

    Google Scholar 

  19. Lindberg, J., Blomberg, M.: Vulnerability in speaker verification - a study of technical impostor techniques. In: Eurospeech, pp. 1211–1214 (1999)

    Google Scholar 

  20. Lau, Y.W., Wagner, M., Tran, D.: Vulnerability of speaker verification to voice mimicking. In: International Symposium on Intelligent Multimedia, Video and Speech Processing, pp. 145–148 (October 2004)

    Google Scholar 

  21. Guo, J.K., Doermann, D., Rosenfield, A.: Off-line skilled forgery detection using stroke and sub-stroke properties. In: 15th International Conference on Pattern Recognition, September 2000, pp. 355–358 (2000)

    Google Scholar 

  22. Cha, S.-H., Tappert, C.C.: Automatic detection of handwriting forgery. In: Eighth International Workshop on Frontiers in Handwriting Recognition, pp. 264–267 (August 2002)

    Google Scholar 

  23. Vaughan, C., Davis, B., O’Cononor, J.: Dynamics of human gait. Kiboho Publishers (1999)

    Google Scholar 

  24. Huang, P.: Promoting Wearable Computing: A Survey and Future Agenda. In: Proc. of International Conference on Information Society in The 21st Century: Emerging Technologies and New Challenges (November 2000)

    Google Scholar 

  25. Starner, T.E.: Attention, memory, and wearable interfaces. IEEE Pervasive Computing 1(4), 88–91 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gafurov, D., Snekkenes, E., Buvarp, T.E. (2006). Robustness of Biometric Gait Authentication Against Impersonation Attack. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_71

Download citation

  • DOI: https://doi.org/10.1007/11915034_71

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics