ABSTRACT
Context-awareness using camera images is a promising technique for enabling ubiquitous computing and networking; however, it is still an open issue to identify mobile users, i.e., identifying an actual user with a mobile device from people in an area. This paper discusses a mobile user identification method mapping users in the camera images to mobile devices connected to an access point. The proposed scheme focuses on acceleration of a hand-held mobile device and that of a mobile user's hand, which synchronously vary when the mobile user utilizes the device. The scheme obtains the user's hand motion from cameras by motion capture, converts that data into acceleration of the user's hand, calculates the correlations between the value of the acceleration of the user's hands and devices, and solves a matching problem. Experimental results show that the proposed scheme identifies mobile users with 100% accuracy when users walk at 1 m/s or when users walk at 0.5 m/s and stop to use their mobile devices. The proposed scheme also identifies with greater than 94% accuracy even when the numbers of users and mobile devices are different.
- Mykhaylo Andriluka, Roth Stefan, and Schiele Bernt . 2010. Monocular 3d pose estimation and tracking by detection Proc. IEEE CVPR. San Francisco, CA, USA, 623--630.Google Scholar
- L Ballan, M Bertini, AD Binbo, and W Nunziati . 2007. Soccer players identification based on visual local features Proc. IEEE ACM. Reno, NV, USA, 258--265. Google ScholarDigital Library
- S Dang, J Ju, L Baker, A Gholamzadeh, and Y Li . 2014. Hybrid forecasting model of power demand based on three-stage synthesis and stochastically self-adapting mechanism. In ENERGYCON. 467--472.Google Scholar
- Dubois Didier and Henri Prade . 1992. Gradual inference rules in approximate reasoning. Information Science, Vol. 61, 1--2 (April . 1992), 103--122. Google ScholarDigital Library
- T Hamatani, Y Sakaguchi, A Uchiyama, and T Higashino . 2016. Player identification by motion features in sport videos using wearable sensors Proc. IEEE ICarnegie Mellon University. Kaiserslautern, Kaiserslautern, Germany, 1--6.Google Scholar
- Deokwoo Jung, Thiago Teixeira, and Andreas Savvides . 2010. Towards cooperative localization of wearable sensors using accelerometers and cameras Proc. IEEE INFOCOM. San Diego, CA, USA, 1--9. Google ScholarDigital Library
- Kinect . "https://developer.microsoft.com/ja-jp/windows/kinect". Kinect. (. "https://developer.microsoft.com/ja-jp/windows/kinect").Google Scholar
- Y Oguma, R Arai, T Nishio, K Yamamoto, and M Morikura . 2015. Proactive base station selection based on human blockage prediction using RGB-D cameras for mmWave communications. In IEEE Globecom. San Diego, CA, USA, 1--6.Google Scholar
- H Okamoto, T Nishio, M Morikura, and K Yamamoto . 2018. Recurrent neural network-based received signal strength estimation using depth images for mmWave communications. In Proc. IEEE CCNC. IEEE, Las Vegas, Nevada, USA, 1--2.Google ScholarCross Ref
- Raspberry Pi . "https://www.raspberrypi.org.". Raspberry Pi. (. "https://www.raspberrypi.org.").Google Scholar
- Michalis Vrigkas, Christophoros Nikou, and Ioannis A Kakadiaris . 2015. A review of human activity recognition methods. Frontiers in Robotics and AI Vol. 2 (Nov. . 2015), 28.Google Scholar
- C. R. Wren, A. Azarbayejani, T. Darrell, and A. P. Pentland . 1997. Pfinder: Real-time tracking of the human body. IEEE Transactions on pattern analysis and machine intelligence, Vol. 19, 7 (July . 1997), 780--785. Google ScholarDigital Library
Index Terms
- Mobile User Identification by Camera-Based Motion Capture and Mobile Device Acceleration Sensors
Recommendations
Management of security policies for mobile devices
InfoSecCD '07: Proceedings of the 4th annual conference on Information security curriculum developmentThis paper discusses management of security policies for mobile devices. The increasing use of mobile devices in the workplace is covered, as well as new software applications that allow employees to use their mobile devices to increase their ...
Mobile device security
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum developmentBecause of their small size, memory capability, and the case with which information can be downloaded and removed from a facility, mobile devices pose a risk to organizations when used and transported outside physical boundaries. Mobile devices, ...
Enhancing the human-computer interaction on camera-equipped mobile phones
ACOS'07: Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6Mobile phones interactions are mostly done via the buttons, thumbwheels or touchscreens. Thus, in this paper we present an approach for enhancing Human-Computer Interaction (HCI) on camera-equipped mobile phones. By using this approach a user is able to ...
Comments