Abstract
A person’s identity can be recognized based on his/her biometric data such as fingerprints, voice or gait. A person can also be recognized from his/her gait, which requires having sensors capable of detecting changes in speed and direction of movement. Such sensors are readily available on almost every smartphone model. We perform user identity verification using his/her walking activity data captured by smartphone sensors. To support identity verification, we have developed a mobile application for Android-based devices, which has achieved 97% accuracy of identity verification using data from acceleration, gravity and gyroscope sensors of a smartphone and a linear Support Vector Machine (SVM) classifier. The developed unobtrusive human walking analyser provides an additional active layer of protection, which may invoke a stronger authentication measure (mandatory locking) if a threat threshold is exceeded.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Crouse, D., Han, H., Chandra, D., Barbello, B., Jain, A.K.: Continuous authentication of mobile user: fusion of face image and inertial measurement unit data. In: International Conference on Biometrics, ICB 2015, pp. 135–142 (2015). https://doi.org/10.1109/ICB.2015.7139043
Keith, W.M., Jeffrey, M.V., George, F.H.: BYOD: security and privacy considerations. IT Prof. 14(5), 53–55 (2012)
Ohana, D.J., Phillips, L., Chen, L.: Preventing cell phone intrusion and theft using biometrics. In: IEEE CS Security and Privacy Workshops, SPW 2013, pp. 173–180 (2013). https://doi.org/10.1109/SPW.2013.19
Gunasinghe, H., Bertino, E.: PrivBioMTAuth: privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones. IEEE Trans. Inf. Forensics Secur. 13(4), 1042–1057 (2018). https://doi.org/10.1109/TIFS.2017.2777787
Hadid, A., Evans, N., Marcel, S., Fierrez, J.: Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process. Mag. 32, 20–30 (2015). https://doi.org/10.1109/MSP.2015.2437652
Sholokhov, A., Kinnunen, T., Vestman, V., Lee, K. A.: Voice biometrics security: extrapolating false alarm rate via hierarchical bayesian modeling of speaker verification scores. Comput. Speech Lang. 60 (2020). https://doi.org/10.1016/j.csl.2019.101024
Wang, K., Kumar, A.: Cross-spectral iris recognition using CNN and supervised discrete hashing. Pattern Recogn. 86, 85–98 (2019). https://doi.org/10.1016/j.patcog.2018.08.010
Olanrewaju, L., Oyebiyi, O., Misra, S., Maskeliunas, R., Damasevicius, R.: Secure ear biometrics using circular kernel principal component analysis, Chebyshev transform hashing and Bose–Chaudhuri–Hocquenghem error-correcting codes. Signal Image Video Process. (2020). https://doi.org/10.1007/s11760-019-01609-y
Damaševičius, R., Maskeliunas, R., Kazanavičius, E., Woźniak, M.: Combining cryptography with EEG biometrics. Comput. Intell. Neurosci. 2018 (2018). https://doi.org/10.1155/2018/1867548
Cola, G., Avvenuti, M., Musso, F., Vecchio, A.: Gait-based authentication using a wrist-worn device. In: ACM International Conference Proceeding Series, pp. 208–217 (2016). https://doi.org/10.1145/2994374.2994393
Marsico, M.D., Mecca, A.: Biometric walk recognizer. Multimed. Tools Appl. 76(4), 4713–4745 (2016). https://doi.org/10.1007/s11042-016-3654-1
Derawi, M., Bours, P.: Gait and activity recognition using commercial phones. Comput. Secur. 39(PART B), 137–144 (2013). https://doi.org/10.1016/j.cose.2013.07.004
Hoang, T., Choi, D.: Secure and privacy enhanced gait authentication on smart phone. Sci. World J. 2014 (2014). https://doi.org/10.1155/2014/438254. Article ID 438254, 8 p.
Watanabe, Y., Sara, S.: Toward an immunity-based gait recognition on smart phone: a study of feature selection and walking state classification. Procedia Comput. Sci. 96, 1790–1800 (2016). https://doi.org/10.1016/j.procs.2016.08.228
Nguyen, H., Nguyen, H.H., Hoang, T., Choi, D., Nguyen, T.D.: A generalized authentication scheme for mobile phones using gait signals. In: Obaidat, M.S., Lorenz, P. (eds.) ICETE 2015. CCIS, vol. 585, pp. 386–407. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-30222-5_18
Chetty, G., White, M., Akther, F.: Smart phone based data mining for human activity recognition. Procedia Comput. Sci. 46, 1181–1187 (2015). https://doi.org/10.1016/j.procs.2015.01.031
Ferrero, R., Gandino, F., Montrucchio, B., Rebaudengo, M., Velasco, A., Benkhelifa, I.: On gait recognition with smartphone accelerometer. In: 4th Mediterranean Conference on Embedded Computing, MECO 2015, pp. 368–373 (2015). https://doi.org/10.1109/MECO.2015.7181946
Fernandez-Lopez, P., Liu-Jimenez, J., Sanchez-Redondo, C., Sanchez-Reillo, R.: Gait recognition using smartphone. In: International Carnahan Conference on Security Technology, pp. 1–7 (2016). https://doi.org/10.1109/CCST.2016.7815698
Lai, Q., Chen, B., Xu, C.: Using weighted SVM for identifying user from gait with smart phone. In: 7th International Conference on Cloud Computing and Big Data, CCBD 2016, pp. 41–45 (2017). https://doi.org/10.1109/CCBD.2016.019
Yuan, W., Zhang, L.: Gait classification and identity authentication using CNN. In: Li, L., Hasegawa, K., Tanaka, S. (eds.) AsiaSim 2018. CCIS, vol. 946, pp. 119–128. Springer, Singapore (2018). https://doi.org/10.1007/978-981-13-2853-4_10
Anusha, R., Jaidhar, C.D.: Human gait recognition based on histogram of oriented gradients and Haralick texture descriptor. Multimed. Tools Appl. (2020). https://doi.org/10.1007/s11042-019-08469-1
He, Y., Zhang, J., Shan, H., Wang, L.: Multi-task GANs for view-specific feature learning in gait recognition. IEEE Trans. Inf. Forensics Secur. 14(1), 102–113 (2019). https://doi.org/10.1109/TIFS.2018.2844819
Zhang, Y., Huang, Y., Wang, L., Yu, S.: A comprehensive study on gait biometrics using a joint CNN-based method. Pattern Recogn. 93, 228–236 (2019). https://doi.org/10.1016/j.patcog.2019.04.023
Liu, C., Zhao, J., Wei, Z.: A review of gait behavior recognition methods based on wearable devices. In: Xie, Y., Zhang, A., Liu, H., Feng, L. (eds.) GSES 2018. CCIS, vol. 980, pp. 134–145. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-7025-0_14
Denman, S.: Why multi-layered security is still the best defence. Network Security, 5–7 (2012)
Primo, A., Phoha, V.V., Kumar, R., Serwadda, A.: Context-Aware active authentication using smartphone accelerometer measurements. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, pp. 98–105 (2014). https://doi.org/10.1109/CVPRW.2014.20
Damasevicius, R., Vasiljevas, M., Salkevicius, J., Wozniak, M.: Human activity recognition in AAL environments using random projections. Comput. Math. Methods Med. 2016, 1–17 (2016). https://doi.org/10.1155/2016/4073584
Damasevicius, R., Maskeliunas, R., Venckauskas, A., Wozniak, M.: Smartphone user identity verification using gait characteristics. Symmetry 8(10), 100 (2016). https://doi.org/10.3390/sym8100100
Cortes, C., Vapnik, V.: Support vector networks. Mach. Learn. 20, 273–297 (1995)
Raudonis, V., Maskeliūnas, R., Stankevičius, K., Damaševičius, R.: Gender, age, colour, position and stress: how they influence attention at workplace? In: Gervasi, O., et al. (eds.) ICCSA 2017. LNCS, vol. 10408, pp. 248–264. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-62404-4_19
Ulinskas, M., Damaševičius, R., Maskeliunas, R., Woźniak, M.: Recognition of human daytime fatigue using keystroke data. Procedia Comput. Sci. 130, 947–952 (2018). https://doi.org/10.1016/j.procs.2018.04.094
Al-Madani, B., Orujov, F., Maskeliūnas, R., Damaševičius, R., Venčkauskas, A.: Fuzzy logic type-2 based wireless indoor localization system for navigation of visually impaired people in buildings. Sensors 19(9) (2019). https://doi.org/10.3390/s19092114
Orujov, F., Maskeliūnas, R., Damaševičius, R., Wei, W., Li, Y.: Smartphone based intelligent indoor positioning using fuzzy logic. Future Gener. Comput. Syst. 89, 335–348 (2018). https://doi.org/10.1016/j.future.2018.06.030
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kašys, K., Dundulis, A., Vasiljevas, M., Maskeliūnas, R., Damaševičius, R. (2020). BodyLock: Human Identity Recogniser App from Walking Activity Data. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science(), vol 12250. Springer, Cham. https://doi.org/10.1007/978-3-030-58802-1_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-58802-1_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58801-4
Online ISBN: 978-3-030-58802-1
eBook Packages: Computer ScienceComputer Science (R0)