[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3325424.3329666acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Walk to Show Your Identity: Gait-based Seamless User Authentication Framework Using Deep Neural Network

Published: 12 June 2019 Publication History

Abstract

With a rapid increase in the usage of wearable IoT devices such as a smartwatch, we can easily monitor various user activities which exhibit distinct patterns for each individual. Such activities as arm swings while walking orgait, can be used to distinctly identify different users. Therefore, this indirect interaction between the users and wearable IoT devices can be used as a biometric authentication technique to seamlessly authenticate and identify users. Thus, various gait-based authentication frameworks using sensor data collected through wearable or hand-held devices were proposed in the literature. However, many of them limitedly utilized the unique patterns by extracting features from the data sequences. Moreover, they require users to walk long period of time to collect large volume of sensor data in each authentication process, which hinders prompt user authentication. To address the limitations, we propose a gait-based seamless authentication framework using deep neural network (Deep Gait). Unlike many of the existing works, Deep Gait authenticates users without any feature extraction process, which can capture the overlooked features in the existing works. Moreover, Deep Gait requires less amount of sensor data (only one walk cycle) than the existing works (8 to 20 walk cycles) for user authentication, which enables seamless access control. Our experimental results evaluated on the commercial smartwatch show that Deep Gait achieves an Equal Error Rate (EER) of 1.8% which is lower than the existing works.

References

[1]
Brain, G. Tensorflow, Nov 2015. Retrieved Jan 2, 2019 from https://github.com/tensorflow/tensorflow.
[2]
Cola, G., Avvenuti, M., Musso, F., and Vecchio, A. Gait-based authentication using a wrist-worn device. In Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (New York, NY, USA, November 2016), MOBIQUITOUS 2016, ACM, pp. 208--217.
[3]
Draper, S. Wearable device sales will grow 26 percent worldwide in 2019, says research company gartner, December 2018. Retrieved Feb 1, 2019 from https://www.wearable-technologies.com/2018/12/wearable-device-saleswill- grow-26-percent-worldwide-in-2019-says-research-company-gartner/.
[4]
Gafurov, D., Snekkenes, E., and Bours, P. Spoof attacks on gait authentication system. IEEE Transactions on Information Forensics and Security 2, 3 (Sept 2007), 491--502.
[5]
Giorgi, G., Martinelli, F., Saracino, A., and Sheikhalishahi, M. Walking through the deep: Gait analysis for user authentication through deep learning: 33rd ifip tc 11 international conference, sec 2018, held at the 24th ifip world computer congress,wcc 2018, poznan, poland, september 18--20, 2018, proceedings. pp. 62--76.
[6]
Glorot, X., and Bengio, Y. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics (13--15 May 2010), vol. 9 of Proceedings of Machine Learning Research, PMLR, pp. 249--256.
[7]
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. H. The weka data mining software: An update. SIGKDD Explor. Newsl. 11, 1 (Nov. 2009), 10--18.
[8]
Johnston, A. H., and Weiss, G. M. Smartwatch-based biometric gait recognition. In 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (Sept 2015), pp. 1--6.
[9]
Kingma, D., and Ba, J. Adam: A method for stochastic optimization. International Conference on Learning Representations (12 2014).
[10]
MacQueen, J. Some methods for classification and analysis of multivariate observations. In Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Statistics (1967), University of California Press, pp. 281--297.
[11]
Mahfouz, A., Mahmoud, T. M., and Sharaf Eldin, A. Poster: A behavioral biometric authentication framework on smartphones. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (New York, NY, USA, April 2017), ASIA CCS '17, ACM, pp. 923--925.
[12]
Muaaz, M., and Mayrhofer, R. Smartphone-based gait recognition: From authentication to imitation. IEEE Transactions on Mobile Computing 16, 11 (Nov 2017), 3209--3221.
[13]
Nair, V., and Hinton, G. E. Rectified linear units improve restricted boltzmann machines. In Proceedings of the 27th International Conference on International Conference on Machine Learning (2010), ICML'10, pp. 807--814.
[14]
Rawlinson, K. Hp study reveals smartwatches vulnerable to attack, July 2015. http://www8.hp.com/us/en/hp-news/press-release.html?id=2037386.
[15]
Savitzky, A., and Golay, M. J. E. Smoothing and differentiation of data by simplified least squares procedures. Analytical Chemistry 36, 8 (1964), 1627--1639.
[16]
Shahzad, M., Liu, A. X., and Samuel, A. Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it. In Proceedings of the 19th Annual International Conference on Mobile Computing & Networking (New York, NY, USA, 2013), MobiCom '13, ACM, pp. 39--50.
[17]
Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., and Salakhutdinov, R. Dropout: A simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15, 1 (Jan. 2014), 1929--1958.
[18]
Terada, S., Enomoto, Y., Hanawa, D., and Oguchi, K. Performance of gait authentication using an acceleration sensor. In 2011 34th International Conference on Telecommunications and Signal Processing (TSP) (Aug 2011), pp. 34--36.
[19]
Zhang, Y., Pan, G., Jia, K., Lu, M., Wang, Y., and Wu, Z. Accelerometer-based gait recognition by sparse representation of signature points with clusters. IEEE Transactions on Cybernetics 45, 9 (Sep. 2015), 1864--1875.
[20]
Zhao, Y., Qiu, Z., Yang, Y., Li, W., and Fan, M. An empirical study of touchbased authentication methods on smartwatches. In Proceedings of the 2017 ACM International Symposium on Wearable Computers (New York, NY, USA, 2017), ISWC '17, ACM, pp. 122--125.

Cited By

View all
  • (2024)Reducing Reservoir Dimensionality with Phase Space Construction for Simplified Hardware ImplementationArtificial Neural Networks and Machine Learning – ICANN 202410.1007/978-3-031-72359-9_12(156-167)Online publication date: 18-Sep-2024
  • (2023)MINSU: Precision Quantity Counter with DNN-based Volume Estimation2023 14th International Conference on Information and Communication Technology Convergence (ICTC)10.1109/ICTC58733.2023.10392667(1-6)Online publication date: 11-Oct-2023
  • (2021)Gait Analysis Using Video for Disabled People in Marginalized CommunitiesIntelligent Human Computer Interaction10.1007/978-3-030-68452-5_14(145-153)Online publication date: 6-Feb-2021

Index Terms

  1. Walk to Show Your Identity: Gait-based Seamless User Authentication Framework Using Deep Neural Network

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WearSys '19: The 5th ACM Workshop on Wearable Systems and Applications
      June 2019
      77 pages
      ISBN:9781450367752
      DOI:10.1145/3325424
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 June 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. neural networks
      2. user authentication
      3. wearable computing

      Qualifiers

      • Research-article

      Funding Sources

      • Ministry of Science and ICT, Korea

      Conference

      MobiSys '19
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 28 of 36 submissions, 78%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)5
      Reflects downloads up to 13 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Reducing Reservoir Dimensionality with Phase Space Construction for Simplified Hardware ImplementationArtificial Neural Networks and Machine Learning – ICANN 202410.1007/978-3-031-72359-9_12(156-167)Online publication date: 18-Sep-2024
      • (2023)MINSU: Precision Quantity Counter with DNN-based Volume Estimation2023 14th International Conference on Information and Communication Technology Convergence (ICTC)10.1109/ICTC58733.2023.10392667(1-6)Online publication date: 11-Oct-2023
      • (2021)Gait Analysis Using Video for Disabled People in Marginalized CommunitiesIntelligent Human Computer Interaction10.1007/978-3-030-68452-5_14(145-153)Online publication date: 6-Feb-2021
      • (2020)Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence PerspectiveIEEE Internet of Things Journal10.1109/JIOT.2020.30040777:9(9128-9143)Online publication date: Sep-2020

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media