Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2556288.2557043acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Wave to me: user identification using body lengths and natural gestures

Published: 26 April 2014 Publication History

Abstract

We introduce a body-based identification system that leverages individual differences in body segment lengths and hand waving gesture patterns. The system identifies users based on a two-second hand waving gesture captured by a Microsoft Kinect. To evaluate our system, we collected 8640 gesture measurements from 75 participants through two lab studies and a field study. In the first lab study, we evaluated the feasibility of our concept and basic properties of features to narrow down the design space. In the second lab study, our system achieved a 1% equal error rate in user identification among seven registered users after two weeks following initial registration. We also found that our system was robust even when lower body segments could not be measured because of occlusions. In the field study, our system achieved 0.5 to 1.6% equal error rates, demonstrating that the system also works well in ecologically valid situations. Lastly, throughout the studies, our participants were positive about the system.

Supplementary Material

MP4 File (p3453-sidebyside.mp4)

References

[1]
BioLab University of Bologna. Finger Print Verification Competition. Retrieved Sep. 13, 2013. https://biolab.csr. unibo.it/fvcongoing/UI/Form/IJCB2011.aspx
[2]
Douglas Gantenbein. Helping Kinect Recognize Faces. Retrieved Sep. 13, 2013. http://research.microsoft.com/ en-us/news/features/kinectfacereco-103111.aspx
[3]
Microsoft. Kinect for Windows SDK. Retrieved Sep. 13, 2013. http://msdn.microsoft.com/enus/library/ hh855347
[4]
Corlett N.E., and Clark S.T. 1995. The Ergonomics of Wrokspaces and Machines: A Design Manual. CRC Press. 1995.
[5]
Gafurov, D. A Survey of Biometric Gait Recognition: Approaches, Security and Challenges, NIK-2007 Conference. 2007.
[6]
Guillaume,H., and Sébastien M. A novel statistical generative model dedicated to face recognition. Image and Vision Computing. vol. 28, Issue 1, 2010, 101--110.
[7]
Jain, A., Nandakumar, K., and Ross, A. Score normalization in multimodal biometric systems, Pattern Recognition, vol. 38, Issue 12, 2005, 2270--2285.
[8]
Jain, A., Bolle, M.R., and Pankanti, S. Biometrics: Personal Identification in Networked Society. Springer. 2005.
[9]
Jiayang, L., Lin, Z., Jehan, W., and Venu V. User evaluation of lightweight user authentication with a single tri-axis accelerometer. In Proc. of MobileHCI. 2009.
[10]
Kam L., Konrad, J., Ishwar, P., Towards Gesture-Based User Authentication, Advanced Video and Signal-Based Surveillance, 2012, 282--287.
[11]
Leyvand, T., Meekhof, C., Wei, Y., Sun, J. and Guo, B. Kinect identity: Technology and experience. IEEE Computer Society. Computer Magaznine, April, 2011, 94--96.
[12]
Cranor L. F. and Garfinkel S. Security and Usability Designing Secure System That People Can Use. O'Reilly Media. 2005.
[13]
Mäntyjärvi, J., Lindholm, M., Vildjiounaite, E., Makela, S.M., and Ailisto, H. Identifying users of portable devices from gait pattern with accelerometers. In Proc. of ICASSP. vol. 2, 2005, 973--976.
[14]
Maltoni, D., Maio, D., Jain, K.A., and Prabhakar, S. 2005. Handbook of Fingerprint Recognition. Springer.
[15]
Maurer, M. E., Waxenberger, R., and Hausen, D. BroAuth: evaluating different levels of visual feedback for 3D gesture-based authentication. In Proc. of the International Working Conference on Advanced Visual Interfaces. 2012, 737--740.
[16]
Mayrhofer, R. and Gellersen, H. Shake well before use: two implementations for implicit context authentication. IEEE Transactions on Mobile Computing, vol.8, no.6, 2009, 792--806.
[17]
Napa, S.B., Kowsar, A., Katherine, I., and Nasir, M. Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In Proc. of SIGCHI. 2012, 977--986.
[18]
Patel, S.N., Pierce, J.S., and Abowd, G.D. A gesturebased authentication scheme for untrusted public terminals. In Proc. of UIST, 2004, 157--160.
[19]
Peacock, A., Ke, X., and Wilkerson, M. Typing patterns: A key to user identification. IEEE Security & Privacy, vol. 2, Issue 5, 2004, 40--47.
[20]
Pheasant, S., and Haslegrave, M.C. Bodyspace: Authropometry, Ergonomics and the Design of Work. CRC Press. 2005.
[21]
Schmidt, D., Chong, M.K., and Gellersen, H. HandsDown: hand-contour-based user identification for interactive surfaces. In Proc. of NordiCHI, 2010, 432--441.
[22]
Snelick, R., Uludag, U., Mink, A., Indovina, M., and Jain, A. Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.27, no.3, 2005, 450--455.
[23]
Tian, J., Qu, C., Xu, W., and Wang, S. KinWrite: Handwriting-Based Authentication Using Kinect. In Proc. of Annual Network & Distributed System Security Symposium, 2013.
[24]
Wan, V., and Renals, S. Speaker verification using sequence discriminant support vector machines. IEEE Transactions on Speech and Audio Processing. vol.13, no.2, 2005, 203--210 - 10 -

Cited By

View all
  • (2023)In the quest to protect users from side-channel attacksProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620530(5235-5252)Online publication date: 9-Aug-2023
  • (2023)How Unique do we Move? Understanding the Human Body and Context Factors for User IdentificationProceedings of Mensch und Computer 202310.1145/3603555.3603574(127-137)Online publication date: 3-Sep-2023
  • (2022)Activity-Free User Identification Using Wearables Based on Vision TechniquesSensors10.3390/s2219736822:19(7368)Online publication date: 28-Sep-2022
  • Show More Cited By

Index Terms

  1. Wave to me: user identification using body lengths and natural gestures

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    April 2014
    4206 pages
    ISBN:9781450324731
    DOI:10.1145/2556288
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 April 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. gesture
    2. natural user interface
    3. user identification

    Qualifiers

    • Research-article

    Conference

    CHI '14
    Sponsor:
    CHI '14: CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2014
    Ontario, Toronto, Canada

    Acceptance Rates

    CHI '14 Paper Acceptance Rate 465 of 2,043 submissions, 23%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI '25
    CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 28 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)In the quest to protect users from side-channel attacksProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620530(5235-5252)Online publication date: 9-Aug-2023
    • (2023)How Unique do we Move? Understanding the Human Body and Context Factors for User IdentificationProceedings of Mensch und Computer 202310.1145/3603555.3603574(127-137)Online publication date: 3-Sep-2023
    • (2022)Activity-Free User Identification Using Wearables Based on Vision TechniquesSensors10.3390/s2219736822:19(7368)Online publication date: 28-Sep-2022
    • (2020)Externalizing Mental Images by Harnessing Size-Describing GesturesProceedings of the 2020 International Conference on Advanced Visual Interfaces10.1145/3399715.3399920(1-9)Online publication date: 28-Sep-2020
    • (2020)Exploring the Hand and Finger-Issued Behaviors Toward Natural AuthenticationIEEE Access10.1109/ACCESS.2020.29818288(55815-55825)Online publication date: 2020
    • (2019)A method to recognize entering and leaving person based on door opening and closing movement using angular velocity sensorAdjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers10.1145/3341162.3343798(57-60)Online publication date: 9-Sep-2019
    • (2019)Just gaze and waveProceedings of the 11th ACM Symposium on Eye Tracking Research & Applications10.1145/3314111.3319837(1-10)Online publication date: 25-Jun-2019
    • (2019)Experimental Analysis of Barehand Mid-air Mode-Switching Techniques in Virtual RealityProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300426(1-14)Online publication date: 2-May-2019
    • (2019)Empirical Research in Mid-Air Interaction: A Systematic ReviewInternational Journal of Human–Computer Interaction10.1080/10447318.2019.157235235:18(1747-1768)Online publication date: 5-Feb-2019
    • (2018)Person Identification Using Pose-Based Hough Forests from Skeletal Action SequenceIEICE Transactions on Information and Systems10.1587/transinf.2017EDP7215E101.D:3(767-777)Online publication date: 2018
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media