Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

RF-Identity: Non-Intrusive Person Identification Based on Commodity RFID Devices

Published: 30 March 2021 Publication History

Abstract

Person identification plays a critical role in a large range of applications. Recently, RF based person identification becomes a hot research topic due to the contact-free nature of RF sensing that is particularly appealing in current COVID-19 pandemic. However, existing systems still have multiple limitations: i) heavily rely on the gait patterns of users for identification; ii) require a large amount of data to train the model and also extensive retraining for new users and iii) require a large frequency bandwidth which is not available on most commodity RF devices for static person identification. This paper proposes RF-Identity, an RFID-based identification system to address the above limitations and the contribution is threefold. First, by integrating walking pattern features with unique body shape features (e.g., height), RF-Identity achieves a high accuracy in person identification. Second, RF-Identity develops a data augmentation scheme to expand the size of the training data set, thus reducing the human effort in data collection. Third, RF-Identity utilizes the tag diversity in spatial domain to identify static users without a need of large frequency bandwidth. Extensive experiments show an identification accuracy of 94.2% and 95.9% for 50 dynamic and static users, respectively.

References

[1]
[n. d.]. What Is The Standard Size Of Doors And Windows In Residential Buildings? https://www.acivilengineer.com/standard-size-of-doors-and-windows/.
[2]
Fadel Adib, Chen-Yu Hsu, Hongzi Mao, Dina Katabi, and Frédo Durand. 2015. Capturing the human figure through a wall. ACM Transactions on Graphics (TOG) 34, 6 (2015), 219.
[3]
Xi Chen, Hang Li, Chenyi Zhou, Xue Liu, Di Wu, and Gregory Dudek. 2020. FiDo: Ubiquitous Fine-Grained WiFi-based Localization for Unlabelled Users via Domain Adaptation. In Proceedings of The Web Conference 2020. 23--33.
[4]
Jan K Chorowski, Dzmitry Bahdanau, Dmitriy Serdyuk, Kyunghyun Cho, and Yoshua Bengio. 2015. Attention-based models for speech recognition. In Advances in neural information processing systems. 577--585.
[5]
Wang Chuyu, Liu Jian, Chen Yingying, Xie Lei, Liu Hongbo, and Lu Sanglu. 2018. RF-Kinect: A Wearable RFID-based Approach Towards 3D Body Movement Tracking. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 1 (June 2018).
[6]
Laurens Van Der Maaten and Geoffrey E Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research 9 (2008), 2579--2605.
[7]
Chao Feng, Jie Xiong, Liqiong Chang, Ju Wang, Xiaojiang Chen, Dingyi Fang, and Zhanyong Tang. 2019. WiMi: Target Material Identification with Commodity Wi-Fi Devices. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 700--710.
[8]
Huan Feng, Kassem Fawaz, and Kang G Shin. 2017. Continuous Authentication for Voice Assistants. (2017), 343--355.
[9]
Tianbo Gu, Zheng Fang, Zhicheng Yang, Pengfei Hu, and Prasant Mohapatra. 2019. mmSense: Multi-Person Detection and Identification via mmWave Sensing. In Proceedings of the 3rd ACM Workshop on Millimeter-wave Networks and Sensing Systems. 45--50.
[10]
Ke Han, Zizheng Wang, and Zilong Chen. 2018. Fingerprint Image Enhancement Method based on Adaptive Median Filter. In 2018 24th Asia-Pacific Conference on Communications (APCC).
[11]
Anna Huang, Dong Wang, Run Zhao, and Qian Zhang. 2019. Au-Id: Automatic User Identification and Authentication through the Motions Captured from Sequential Human Activities Using RFID. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 2 (2019), 48.
[12]
Chenyu Huang, Huangxun Chen, Lin Yang, and Qian Zhang. 2018. Breathlive: Liveness detection for heart sound authentication with deep breathing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 1 (2018), 12.
[13]
Shekh Md Mahmudul Islam, Olga Borić-Lubecke, Yao Zheng, and Victor M Lubecke. 2020. Radar-Based Non-Contact Continuous Identity Authentication. Remote Sensing 12, 14 (2020), 2279.
[14]
Wang Ju, Xiong Jie, Hongbo Jiang, Xiaojiang Chen, and Dingyi Fang. 2017. D-Watch: Embracing "Bad" Multipaths for Device-Free Localization With COTS RFID Devices. IEEE/ACM Transactions on Networking PP, 99 (2017), 1--14.
[15]
Avinash Kalyanaraman, Dezhi Hong, Elahe Soltanaghaei, and Kamin Whitehouse. 2017. Forma track: tracking people based on body shape. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 61.
[16]
Belal Korany, Chitra R Karanam, Hong Cai, and Yasamin Mostofi. 2019. XModal-ID: Using WiFi for Through-Wall Person Identification from Candidate Video Footage. In The 25th Annual International Conference on Mobile Computing and Networking. ACM, 36.
[17]
Hanchuan Li, Can Ye, and Alanson P Sample. 2015. IDSense: A human object interaction detection system based on passive UHF RFID. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 2555--2564.
[18]
Hanchuan Li, Peijin Zhang, Samer Al Moubayed, Shwetak N Patel, and Alanson P Sample. 2016. Id-match: A hybrid computer vision and rfid system for recognizing individuals in groups. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 4933--4944.
[19]
Yan Li, Zilong Wang, Yingjiu Li, Robert Deng, Binbin Chen, Weizhi Meng, and Hui Li. 2019. A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (Asia CCS '19). ACM, New York, NY, USA, 241--246.
[20]
Chi Lin, Jiaye Hu, Yu Sun, Fenglong Ma, Lei Wang, and Guowei Wu. 2018. WiAU: An Accurate Device-Free Authentication System with ResNet. In 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, 1--9.
[21]
Emanuela Marasco and Arun Ross. 2015. A Survey on Antispoofing Schemes for Fingerprint Recognition Systems. Comput. Surveys 47, 2 (2015), 28.
[22]
Shijia Pan, Tong Yu, Mostafa Mirshekari, Jonathon Fagert, Amelie Bonde, Ole J Mengshoel, Hae Young Noh, and Pei Zhang. 2017. Footprintid: Indoor pedestrian identification through ambient structural vibration sensing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 89.
[23]
Neal Patwari and Piyush Agrawal. 2008. Effects of Correlated Shadowing: Connectivity, Localization, and RF Tomography. In International Conference on Information Processing in Sensor Networks.
[24]
Swadhin Pradhan, Eugene Chai, Karthikeyan Sundaresan, Lili Qiu, Mohammad Khojastepour, and Sampath Rangarajan. 2017. RIO: A Pervasive RFID-based Touch Gesture Interface. (2017), 261--274.
[25]
Ruijie Quan, Xuanyi Dong, Yu Wu, Linchao Zhu, and Yi Yang. 2019. Auto-ReID: Searching for a Part-aware ConvNet for Person Re-Identification. arXiv preprint arXiv:1903.09776 (2019).
[26]
Bernhard Scholkopf, John Platt, John Shawetaylor, Alexander J Smola, and Robert C Williamson. 2001. Estimating the Support of a High-Dimensional Distribution. Neural Computation 13, 7 (2001), 1443--1471.
[27]
Ann-Kathrin Seifert, Moeness Amin, and Abdelhak M Zoubir. 2019. Toward unobtrusive in-home gait analysis based on radar micro-doppler signatures. IEEE Transactions on Biomedical Engineering (2019).
[28]
Muhammad Shahzad and Shaohu Zhang. 2018. Augmenting user identification with WiFi based gesture recognition. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 3 (2018), 1--27.
[29]
Longfei Shangguan, Zimu Zhou, and Kyle Jamieson. 2017. Enabling gesture-based interactions with objects. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 239--251.
[30]
Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 5.
[31]
Johan AK Suykens and Joos Vandewalle. 1999. Least squares support vector machine classifiers. Neural processing letters 9, 3 (1999), 293--300.
[32]
A. Tefas, C. Kotropoulos, and I. Pitas. [n. d.]. Using support vector machines to enhance the performance of elastic graph matching for frontal face authentication. Pattern Analysis Machine Intelligence IEEE Transactions on 23, 7 ([n. d.]), 0--746.
[33]
Simen Thys, Wiebe Van Ranst, and Toon Goedeme. 2019. Fooling automated surveillance cameras: adversarial patches to attack person detection. arXiv: Computer Vision and Pattern Recognition (2019).
[34]
Fok Hing Chi Tivive, Abdesselam Bouzerdoum, and Moeness G Amin. 2010. A human gait classification method based on radar Doppler spectrograms. EURASIP Journal on Advances in Signal Processing 2010 (2010), 10.
[35]
Chuyu Wang, Lei Xie, Wei Wang, Yingying Chen, Yanling Bu, and Sanglu Lu. 2018. Rf-ecg: Heart rate variability assessment based on cots rfid tag array. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 2 (2018), 1--26.
[36]
Fei Wang, Jinsong Han, Feng Lin, and Kui Ren. 2019. WiPIN: Operation-free passive person identification using Wi-Fi signals. In 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 1--6.
[37]
Jue Wang, Deepak Vasisht, and Dina Katabi. 2014. RF-IDraw: Virtual touch screen in the air using RF signals. In Acm Conference on Sigcomm.
[38]
Ju Wang, Jie Xiong, Xiaojiang Chen, Hongbo Jiang, Rajesh Krishna Balan, and Dingyi Fang. 2017. TagScan: Simultaneous target imaging and material identification with commodity RFID devices. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. ACM, 288--300.
[39]
Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, and Dingyi Fang. [n. d.]. D-Watch: Embracing Bad multipaths for device-free localization with COTS RFID devices. IEEE/ACM Transactions on Networking (TON) 25, 6 ([n. d.]), 3559--3572.
[40]
Wei Wang, Alex X. Liu, and Muhammad Shahzad. 2016. Gait Recognition Using Wifi Signals. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '16). New York, NY, USA, 363--373.
[41]
Yuan Wang, Yunhong Wang, and Tieniu Tan. 2004. Combining fingerprint and voiceprint biometrics for identity verification: an experimental comparison. In International Conference on Biometric Authentication. Springer, 663--670.
[42]
Yanwen Wang and Yuanqing Zheng. 2018. Modeling RFID Signal Reflection for Contact-free Activity Recognition. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 4 (Dec. 2018).
[43]
Yimin Wei and Michael Ng. 2004. Weighted Tikhonov filter matrices for ill-posed problems. Applied Mathematics Computation 149, 2 (2004), 411--422.
[44]
Joey Wilson and Neal Patwari. 2010. Radio Tomographic Imaging with Wireless Networks. IEEE Transactions on Mobile Computing 9, 5 (2010), 621--632.
[45]
Binbin Xie, Jie Xiong, Xiaojiang Chen, Eugene Chai, Liyao Li, Zhanyong Tang, and Dingyi Fang. 2019. Tagtag: material sensing with commodity RFID. In Proceedings of the 17th Conference on Embedded Networked Sensor Systems. ACM, 338--350.
[46]
Binbin Xie, Jie Xiong, Xiaojiang Chen, and Dingyi Fang. 2020. Exploring Commodity RFID for Contactless Sub-millimeter Vibration Sensing. In the 18th Conference.
[47]
Yaxiong Xie, Jie Xiong, Mo Li, and Kyle Jamieson. 2019. mD-Track: Leveraging multi-dimensionality for passive indoor Wi-Fi tracking. In The 25th Annual International Conference on Mobile Computing and Networking. 1--16.
[48]
Tong Xin, Bin Guo, Zhu Wang, Pei Wang, Jacqueline Chi Kei Lam, Victor Li, and Zhiwen Yu. 2018. Freesense: a robust approach for indoor human detection using wi-fi signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 3 (2018), 1--23.
[49]
Huatao Xu, Dong Wang, Run Zhao, and Qian Zhang. 2019. FaHo: deep learning enhanced holographic localization for RFID tags. In Proceedings of the 17th Conference on Embedded Networked Sensor Systems. ACM, 351--363.
[50]
Zhu Yong, Tieniu Tan, and Yunhong Wang. 2000. Biometric Personal Identification Based on Iris Patterns. Zidonghua Xuebao/Acta Automatica Sinica 2, 1 (2000), 2801--2804.
[51]
Yinggang Yu, Dong Wang, Run Zhao, and Qian Zhang. 2019. RFID based real-time recognition of ongoing gesture with adversarial learning. In Proceedings of the 17th Conference on Embedded Networked Sensor Systems. ACM, 298--310.
[52]
Yunze Zeng, Parth H. Pathak, and Prasant Mohapatra. 2016. WiWho: Wifi-based Person Identification in Smart Spaces. In Proceedings of the 15th International Conference on Information Processing in Sensor Networks (IPSN '16). Article 4, 12 pages.
[53]
Jie Zhang, Zhanyong Tang, Meng Li, Dingyi Fang, Petteri Nurmi, and Zheng Wang. 2018. CrossSense: towards cross-site and large-scale WiFi sensing. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. ACM, 305--320.
[54]
Jin Zhang, Bo Wei, Wen Hu, and Salil S Kanhere. 2016. Wifi-id: Human identification using wifi signal. In 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, 75--82.
[55]
Tengxiang Zhang, Nicholas Becker, Yuntao Wang, Yuan Zhou, and Yuanchun Shi. 2017. BitID: Easily add battery-free wireless sensors to everyday objects. In 2017 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, 1--8.
[56]
Cui Zhao, Zhenjiang Li, Ting Liu, Han Ding, Jinsong Han, Wei Xi, and Ruowei Gui. 2019. RF-Mehndi: A Fingertip Profiled RF Identifier. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 1513--1521.
[57]
Mingmin Zhao, Tianhong Li, Mohammad Abu Alsheikh, Yonglong Tian, Hang Zhao, Antonio Torralba, and Dina Katabi. 2018. Through wall human pose estimation using radio signals. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 7356--7365.
[58]
Mingmin Zhao, Yonglong Tian, Hang Zhao, Mohammad Abu Alsheikh, Tianhong Li, Rumen Hristov, Zachary Kabelac, Dina Katabi, and Antonio Torralba. 2018. RF-based 3D skeletons. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication. 267--281.
[59]
Zhedong Zheng, Xiaodong Yang, Zhiding Yu, Liang Zheng, Yi Yang, and Jan Kautz. 2019. Joint discriminative and generative learning for person re-identification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2138--2147.
[60]
Zhen Zhu, Tengteng Huang, Baoguang Shi, Miao Yu, Bofei Wang, and Xiang Bai. 2019. Progressive Pose Attention Transfer for Person Image Generation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2347--2356.
[61]
Yongpan Zou, Xiao Jiang, Jinsong Han, Kaishun Wu, Li Yun, and Lionel M. Ni. 2017. GRfid: A Device-Free RFID-Based Gesture Recognition System. IEEE Transactions on Mobile Computing 16, 2 (2017), 381--393.

Cited By

View all
  • (2024)RFSpy: Eavesdropping on Online Conversations with Out-of-Vocabulary Words by Sensing Metal Coil Vibration of Headsets Leveraging RFIDProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661887(169-182)Online publication date: 3-Jun-2024
  • (2024)Tagnoo: Enabling Smart Room-Scale Environments with RFID-Augmented PlywoodProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642356(1-18)Online publication date: 11-May-2024
  • (2024)Sensing Human Gait for Environment-Independent User Authentication Using Commodity RFID DevicesIEEE Transactions on Mobile Computing10.1109/TMC.2023.331875323:5(6304-6317)Online publication date: May-2024
  • Show More Cited By

Index Terms

  1. RF-Identity: Non-Intrusive Person Identification Based on Commodity RFID Devices

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 5, Issue 1
    March 2021
    1272 pages
    EISSN:2474-9567
    DOI:10.1145/3459088
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 March 2021
    Published in IMWUT Volume 5, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Deep learning
    2. Person identification
    3. RFID tag
    4. body feature

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • National Natural Science Foundation of China
    • NSFC A3 Foresight Program
    • the Shaanxi International Science and Technology Cooperation Program under grant agreement
    • the ShaanXi Science and Technology Innovation Team Support Project

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)118
    • Downloads (Last 6 weeks)12
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)RFSpy: Eavesdropping on Online Conversations with Out-of-Vocabulary Words by Sensing Metal Coil Vibration of Headsets Leveraging RFIDProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661887(169-182)Online publication date: 3-Jun-2024
    • (2024)Tagnoo: Enabling Smart Room-Scale Environments with RFID-Augmented PlywoodProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642356(1-18)Online publication date: 11-May-2024
    • (2024)Sensing Human Gait for Environment-Independent User Authentication Using Commodity RFID DevicesIEEE Transactions on Mobile Computing10.1109/TMC.2023.331875323:5(6304-6317)Online publication date: May-2024
    • (2024)Anti-Spoofing Facial Authentication Based on COTS RFIDIEEE Transactions on Mobile Computing10.1109/TMC.2023.328970823:5(4228-4245)Online publication date: May-2024
    • (2024)UHF RFID Wristbands: A Long-Range, Durable, Flexible, and Low-Cost Tag Antenna DesignIEEE Journal of Radio Frequency Identification10.1109/JRFID.2024.33657968(125-133)Online publication date: 2024
    • (2024)A Wireless Self-Service System for Library Using Commodity RFID DevicesIEEE Internet of Things Journal10.1109/JIOT.2023.330146211:3(4998-5010)Online publication date: 1-Feb-2024
    • (2024)OpenAuth: Human Body-Based User Authentication Using mmWave Signals in Open-World Scenarios2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS60910.2024.00125(1330-1341)Online publication date: 23-Jul-2024
    • (2024)Feature decoupling and regeneration towards wifi-based human activity recognitionPattern Recognition10.1016/j.patcog.2024.110480153(110480)Online publication date: Sep-2024
    • (2024)TransTM: A device-free method based on time-streaming multiscale transformer for human activity recognitionDefence Technology10.1016/j.dt.2023.02.02132(619-628)Online publication date: Feb-2024
    • (2023)RF-MicProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35962597:2(1-25)Online publication date: 12-Jun-2023
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media