Skip to main content

BodyLock: Human Identity Recogniser App from Walking Activity Data

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2020 (ICCSA 2020)

Abstract

A person’s identity can be recognized based on his/her biometric data such as fingerprints, voice or gait. A person can also be recognized from his/her gait, which requires having sensors capable of detecting changes in speed and direction of movement. Such sensors are readily available on almost every smartphone model. We perform user identity verification using his/her walking activity data captured by smartphone sensors. To support identity verification, we have developed a mobile application for Android-based devices, which has achieved 97% accuracy of identity verification using data from acceleration, gravity and gyroscope sensors of a smartphone and a linear Support Vector Machine (SVM) classifier. The developed unobtrusive human walking analyser provides an additional active layer of protection, which may invoke a stronger authentication measure (mandatory locking) if a threat threshold is exceeded.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Crouse, D., Han, H., Chandra, D., Barbello, B., Jain, A.K.: Continuous authentication of mobile user: fusion of face image and inertial measurement unit data. In: International Conference on Biometrics, ICB 2015, pp. 135–142 (2015). https://doi.org/10.1109/ICB.2015.7139043

  2. Keith, W.M., Jeffrey, M.V., George, F.H.: BYOD: security and privacy considerations. IT Prof. 14(5), 53–55 (2012)

    Article  Google Scholar 

  3. Ohana, D.J., Phillips, L., Chen, L.: Preventing cell phone intrusion and theft using biometrics. In: IEEE CS Security and Privacy Workshops, SPW 2013, pp. 173–180 (2013). https://doi.org/10.1109/SPW.2013.19

  4. Gunasinghe, H., Bertino, E.: PrivBioMTAuth: privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones. IEEE Trans. Inf. Forensics Secur. 13(4), 1042–1057 (2018). https://doi.org/10.1109/TIFS.2017.2777787

    Article  Google Scholar 

  5. Hadid, A., Evans, N., Marcel, S., Fierrez, J.: Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process. Mag. 32, 20–30 (2015). https://doi.org/10.1109/MSP.2015.2437652

    Article  Google Scholar 

  6. Sholokhov, A., Kinnunen, T., Vestman, V., Lee, K. A.: Voice biometrics security: extrapolating false alarm rate via hierarchical bayesian modeling of speaker verification scores. Comput. Speech Lang. 60 (2020). https://doi.org/10.1016/j.csl.2019.101024

  7. Wang, K., Kumar, A.: Cross-spectral iris recognition using CNN and supervised discrete hashing. Pattern Recogn. 86, 85–98 (2019). https://doi.org/10.1016/j.patcog.2018.08.010

    Article  Google Scholar 

  8. Olanrewaju, L., Oyebiyi, O., Misra, S., Maskeliunas, R., Damasevicius, R.: Secure ear biometrics using circular kernel principal component analysis, Chebyshev transform hashing and Bose–Chaudhuri–Hocquenghem error-correcting codes. Signal Image Video Process. (2020). https://doi.org/10.1007/s11760-019-01609-y

  9. Damaševičius, R., Maskeliunas, R., Kazanavičius, E., Woźniak, M.: Combining cryptography with EEG biometrics. Comput. Intell. Neurosci. 2018 (2018). https://doi.org/10.1155/2018/1867548

  10. Cola, G., Avvenuti, M., Musso, F., Vecchio, A.: Gait-based authentication using a wrist-worn device. In: ACM International Conference Proceeding Series, pp. 208–217 (2016). https://doi.org/10.1145/2994374.2994393

  11. Marsico, M.D., Mecca, A.: Biometric walk recognizer. Multimed. Tools Appl. 76(4), 4713–4745 (2016). https://doi.org/10.1007/s11042-016-3654-1

    Article  Google Scholar 

  12. Derawi, M., Bours, P.: Gait and activity recognition using commercial phones. Comput. Secur. 39(PART B), 137–144 (2013). https://doi.org/10.1016/j.cose.2013.07.004

  13. Hoang, T., Choi, D.: Secure and privacy enhanced gait authentication on smart phone. Sci. World J. 2014 (2014). https://doi.org/10.1155/2014/438254. Article ID 438254, 8 p.

  14. Watanabe, Y., Sara, S.: Toward an immunity-based gait recognition on smart phone: a study of feature selection and walking state classification. Procedia Comput. Sci. 96, 1790–1800 (2016). https://doi.org/10.1016/j.procs.2016.08.228

    Article  Google Scholar 

  15. Nguyen, H., Nguyen, H.H., Hoang, T., Choi, D., Nguyen, T.D.: A generalized authentication scheme for mobile phones using gait signals. In: Obaidat, M.S., Lorenz, P. (eds.) ICETE 2015. CCIS, vol. 585, pp. 386–407. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-30222-5_18

    Chapter  Google Scholar 

  16. Chetty, G., White, M., Akther, F.: Smart phone based data mining for human activity recognition. Procedia Comput. Sci. 46, 1181–1187 (2015). https://doi.org/10.1016/j.procs.2015.01.031

    Article  Google Scholar 

  17. Ferrero, R., Gandino, F., Montrucchio, B., Rebaudengo, M., Velasco, A., Benkhelifa, I.: On gait recognition with smartphone accelerometer. In: 4th Mediterranean Conference on Embedded Computing, MECO 2015, pp. 368–373 (2015). https://doi.org/10.1109/MECO.2015.7181946

  18. Fernandez-Lopez, P., Liu-Jimenez, J., Sanchez-Redondo, C., Sanchez-Reillo, R.: Gait recognition using smartphone. In: International Carnahan Conference on Security Technology, pp. 1–7 (2016). https://doi.org/10.1109/CCST.2016.7815698

  19. Lai, Q., Chen, B., Xu, C.: Using weighted SVM for identifying user from gait with smart phone. In: 7th International Conference on Cloud Computing and Big Data, CCBD 2016, pp. 41–45 (2017). https://doi.org/10.1109/CCBD.2016.019

  20. Yuan, W., Zhang, L.: Gait classification and identity authentication using CNN. In: Li, L., Hasegawa, K., Tanaka, S. (eds.) AsiaSim 2018. CCIS, vol. 946, pp. 119–128. Springer, Singapore (2018). https://doi.org/10.1007/978-981-13-2853-4_10

    Chapter  Google Scholar 

  21. Anusha, R., Jaidhar, C.D.: Human gait recognition based on histogram of oriented gradients and Haralick texture descriptor. Multimed. Tools Appl. (2020). https://doi.org/10.1007/s11042-019-08469-1

  22. He, Y., Zhang, J., Shan, H., Wang, L.: Multi-task GANs for view-specific feature learning in gait recognition. IEEE Trans. Inf. Forensics Secur. 14(1), 102–113 (2019). https://doi.org/10.1109/TIFS.2018.2844819

    Article  Google Scholar 

  23. Zhang, Y., Huang, Y., Wang, L., Yu, S.: A comprehensive study on gait biometrics using a joint CNN-based method. Pattern Recogn. 93, 228–236 (2019). https://doi.org/10.1016/j.patcog.2019.04.023

    Article  Google Scholar 

  24. Liu, C., Zhao, J., Wei, Z.: A review of gait behavior recognition methods based on wearable devices. In: Xie, Y., Zhang, A., Liu, H., Feng, L. (eds.) GSES 2018. CCIS, vol. 980, pp. 134–145. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-7025-0_14

    Chapter  Google Scholar 

  25. Denman, S.: Why multi-layered security is still the best defence. Network Security, 5–7 (2012)

    Google Scholar 

  26. Primo, A., Phoha, V.V., Kumar, R., Serwadda, A.: Context-Aware active authentication using smartphone accelerometer measurements. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, pp. 98–105 (2014). https://doi.org/10.1109/CVPRW.2014.20

  27. Damasevicius, R., Vasiljevas, M., Salkevicius, J., Wozniak, M.: Human activity recognition in AAL environments using random projections. Comput. Math. Methods Med. 2016, 1–17 (2016). https://doi.org/10.1155/2016/4073584

    Article  MathSciNet  MATH  Google Scholar 

  28. Damasevicius, R., Maskeliunas, R., Venckauskas, A., Wozniak, M.: Smartphone user identity verification using gait characteristics. Symmetry 8(10), 100 (2016). https://doi.org/10.3390/sym8100100

    Article  Google Scholar 

  29. Cortes, C., Vapnik, V.: Support vector networks. Mach. Learn. 20, 273–297 (1995)

    MATH  Google Scholar 

  30. Raudonis, V., Maskeliūnas, R., Stankevičius, K., Damaševičius, R.: Gender, age, colour, position and stress: how they influence attention at workplace? In: Gervasi, O., et al. (eds.) ICCSA 2017. LNCS, vol. 10408, pp. 248–264. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-62404-4_19

    Chapter  Google Scholar 

  31. Ulinskas, M., Damaševičius, R., Maskeliunas, R., Woźniak, M.: Recognition of human daytime fatigue using keystroke data. Procedia Comput. Sci. 130, 947–952 (2018). https://doi.org/10.1016/j.procs.2018.04.094

    Article  Google Scholar 

  32. Al-Madani, B., Orujov, F., Maskeliūnas, R., Damaševičius, R., Venčkauskas, A.: Fuzzy logic type-2 based wireless indoor localization system for navigation of visually impaired people in buildings. Sensors 19(9) (2019). https://doi.org/10.3390/s19092114

  33. Orujov, F., Maskeliūnas, R., Damaševičius, R., Wei, W., Li, Y.: Smartphone based intelligent indoor positioning using fuzzy logic. Future Gener. Comput. Syst. 89, 335–348 (2018). https://doi.org/10.1016/j.future.2018.06.030

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robertas Damaševičius .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kašys, K., Dundulis, A., Vasiljevas, M., Maskeliūnas, R., Damaševičius, R. (2020). BodyLock: Human Identity Recogniser App from Walking Activity Data. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science(), vol 12250. Springer, Cham. https://doi.org/10.1007/978-3-030-58802-1_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58802-1_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58801-4

  • Online ISBN: 978-3-030-58802-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics