ABSTRACT
In this paper, we propose a new approach capable of performing continuous identification of users in home and office environments based on hand and arm motion patterns obtained from a wrist-worn inertial measurement unit (IMU). Different from state-of-the-art methods, our approach is not constrained to particular types of movements, gestures, or activities, thus allowing users to perform freely and unconstrained their daily routines while the identification takes place. We evaluate our approach by conducting an in the lab study and two in-situ studies, one in home environment and one in office environment. Our studies involved a total of 29 different participants and the data collected corresponds to approximately 256 hours. The results obtained in the studies indicate that our approach is able to perform continuous user identification with an accuracy of 0.88 for office environments and 0.71 for the average size of a household.
- Heba Abdelnasser, Moustafa Youssef, and Khaled A Harras. 2015. Wigest: A ubiquitous wifi-based gesture recognition system. In Computer Communications (INFOCOM), 2015 IEEE Conference on. IEEE, 1472--1480.Google ScholarCross Ref
- Christopher Ackad, Andrew Clayphan, Roberto Martinez Maldonado, and Judy Kay. 2012. Seamless and continuous user identification for interactive table-tops using personal device handshaking and body tracking. In CHI'12 Extended Abstracts on Human Factors in Computing Systems. ACM, 1775--1780. Google ScholarDigital Library
- Alaa Alhamoud, Arun Asokan Nair, Christian Gottron, Doreen Böhnstedt, and Ralf Steinmetz. 2014. Presence detection, identification and tracking in smart homes utilizing bluetooth enabled smartphones. In Local Computer Networks Workshops (LCN Workshops), 2014 IEEE 39th Conference on. IEEE, 784--789.Google ScholarCross Ref
- Stacy J Morris Bamberg, Ari Y Benbasat, Donna Moxley Scarborough, David E Krebs, and Joseph A Paradiso. 2008. Gait analysis using a shoe-integrated wireless sensor system. IEEE transactions on information technology in biomedicine 12, 4 (2008), 413--423. Google ScholarDigital Library
- Mary Ellen Berglund, Julia Duvall, and Lucy E Dunne. 2016. A survey of the historical scope and current trends of wearable technology applications. In Proceedings of the 2016 ACM International Symposium on Wearable Computers. ACM, 40--43. Google ScholarDigital Library
- Cheng Bo, Lan Zhang, Taeho Jung, Junze Han, Xiang-Yang Li, and Yu Wang. 2014. Continuous user identification via touch and movement behavioral biometrics. In Performance Computing and Communications Conference (IPCCC), 2014 IEEE International. IEEE, 1--8.Google ScholarCross Ref
- Alan Bränzel, Christian Holz, Daniel Hoffmann, Dominik Schmidt, Marius Knaust, Patrick Lühne, René Meusel, Stephan Richter, and Patrick Baudisch. 2013. GravitySpace: tracking users and their poses in a smart room using a pressure-sensing floor. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 725--734. Google ScholarDigital Library
- Anthony Brown, Richard Mortier, and Tom Rodden. 2014. An exploration of user recognition on domestic networks using NetFlow records. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 903--910. Google ScholarDigital Library
- Guglielmo Cola, Marco Avvenuti, Fabio Musso, and Alessio Vecchio. 2016. Gait-based authentication using a wrist-worn device. In Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, 208--217. Google ScholarDigital Library
- Abir Das, Rameswar Panda, and Amit K Roy-Chowdhury. 2017. Continuous adaptation of multi-camera person identification models through sparse non-redundant representative selection. Computer Vision and Image Understanding 156 (2017), 66--78.Google ScholarCross Ref
- Matteo Ferrara, Annalisa Franco, and Dario Maio. 2014. On the use of the Kinect sensor for human identification in smart environments. Journal of Ambient Intelligence and Smart Environments 6, 4 (2014), 435--446.Google ScholarCross Ref
- Jordan Frank, Shie Mannor, and Doina Precup. 2010. Activity and gait recognition with time-delay embeddings.. In AAAI. Google ScholarDigital Library
- Davrondzhon Gafurov, Patrick Bours, and Einar Snekkenes. 2011. User authentication based on foot motion. Signal, Image and Video Processing 5, 4 (2011), 457.Google ScholarCross Ref
- Daniel Garnier-Moiroux, Fernando Silveira, and Anmol Sheth. 2013. Towards user identification in the home from appliance usage patterns. In Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. ACM, 861--868. Google ScholarDigital Library
- William Rowan Hamilton. 1844. On quaternions; or on a new system of imaginaries in algebra. Philosophical Magazine Series 3 25, 163 (1844), 10--13.Google Scholar
- Eiji Hayashi, Manuel Maas, and Jason I Hong. 2014. Wave to me: user identification using body lengths and natural gestures. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3453--3462. Google ScholarDigital Library
- Martin Reese Hestbek, Claudia Nickel, and Christoph Busch. 2012. Biometric gait recognition for mobile devices using wavelet transform and support vector machines. In Systems, Signals and Image Processing (IWSSIP), 2012 19th International Conference on. IEEE, 205--210.Google Scholar
- Christian Holz and Marius Knaust. 2015. Biometric touch sensing: Seamlessly augmenting each touch with continuous authentication. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. ACM, 303--312. Google ScholarDigital Library
- Alexandros Iosifidis, Anastasios Tefas, and Ioannis Pitas. 2012. Activity-based person identification using fuzzy representation and discriminant learning. IEEE Transactions on Information Forensics and Security 7, 2 (2012), 530--542. Google ScholarDigital Library
- Akane Ishida, Kazuya Murao, Tsutomu Terada, and Masahiko Tsukamoto. 2017. A user identification method based on features of opening/closing a refrigerator door. In Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on. IEEE, 533--538.Google ScholarCross Ref
- Felix Juefei-Xu, Chandrasekhar Bhagavatula, Aaron Jaech, Unni Prasad, and Marios Savvides. 2012. Gait-id on the move: Pace independent human identification using cell phone accelerometer dynamics. In Biometrics: Theory, Applications and Systems (BTAS), 2012 IEEE Fifth International Conference on. IEEE, 8--15.Google ScholarCross Ref
- Ludmila I Kuncheva. 2004. Combining pattern classifiers: methods and algorithms. John Wiley & Sons. Google ScholarDigital Library
- Jennifer R Kwapisz, Gary M Weiss, and Samuel A Moore. 2010. Cell phone-based biometric identification. In 2010 Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS). IEEE, 1--7.Google ScholarCross Ref
- Sugang Li, Ashwin Ashok, Yanyong Zhang, Chenren Xu, Janne Lindqvist, and Macro Gruteser. 2016. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns. In IEEE International Conference on Pervasive Computing and Communications (PerCom),. IEEE, 1--9.Google ScholarCross Ref
- Daniel J Liebling and Sören Preibusch. 2014. Privacy considerations for a pervasive eye tracking world. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 1169--1177. Google ScholarDigital Library
- Takuya Maekawa, Akira Masuda, and Yasuo Namioka. 2016. Identification from ceiling: unconstrained person identification for tabletops using multiview learning. In Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia. ACM, 273--284. Google ScholarDigital Library
- Apostolos Malatras, Dimitris Geneiatakis, and Ioannis Vakalis. 2017. On the efficiency of user identification: a system-based approach. International Journal of Information Security 16, 6 (2017), 653--671. Google ScholarDigital Library
- Sebastien Marcel and José del R Millán. 2007. Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE transactions on pattern analysis and machine intelligence 29, 4 (2007). Google ScholarDigital Library
- Eric Martinson, W Lawson, and J Greg Trafton. 2010. Person identification through perceptual fusion. In 10th IEEE-RAS International Conference on Humanoid Robots (Humanoids), 2010. IEEE, 358--364.Google ScholarCross Ref
- Darko S Matovski, Mark S Nixon, Sasan Mahmoodi, and John N Carter. 2012. The effect of time on gait recognition performance. IEEE transactions on information forensics and security 7, 2 (2012), 543--552. Google ScholarDigital Library
- Soumik Mondal and Patrick Bours. 2016. Combining keystroke and mouse dynamics for continuous user authentication and identification. In Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), 2016. IEEE, 1--8.Google ScholarCross Ref
- Natalia Neverova, Christian Wolf, Griffin Lacey, Lex Fridman, Deepak Chandra, Brandon Barbello, and Graham Taylor. 2016. Learning human identity from motion patterns. IEEE Access 4 (2016), 1810--1820.Google ScholarCross Ref
- Organisation for Economic Co-operation and Development (OECD). 2016. Five family facts. (2016). https://www.oecd.org/els/family/47710686.pdfGoogle Scholar
- Henning Pohl, Markus Krause, and Michael Rohs. 2015. One-button recognizer: exploiting button pressing behavior for user differentiation. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 403--407. Google ScholarDigital Library
- Juhi Ranjan. 2015. Object user recognition in multi-person homes. In Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. ACM, 477--482. Google ScholarDigital Library
- Olivier Rioul and Pierre Duhamel. 1992. Fast algorithms for discrete and continuous wavelet transforms. IEEE transactions on information theory 38, 2 (1992), 569--586. Google ScholarDigital Library
- Joseph Roth, Xiaoming Liu, and Dimitris Metaxas. 2014. On continuous user authentication via typing behavior. IEEE Transactions on Image Processing 23, 10 (2014), 4611--4624.Google ScholarCross Ref
- Yiran Shen, Hongkai Wen, Chengwen Luo, Weitao Xu, Tao Zhang, Wen Hu, and Daniela Rus. 2018. GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait. IEEE Transactions on Dependable and Secure Computing (2018).Google Scholar
- Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 5. Google ScholarDigital Library
- Shimmer sensing. 2016. Shimmer3 wireless sensor platform. http://www.shimmersensing.com/images/uploads/docs/Shimmer3_Spec_Sheet_V1.6.pdf. (2016). {Online; last-accessed October 2018}.Google Scholar
- David MJ Tax and Robert PW Duin. 2002. Using two-class classifiers for multi-class classification. In Proceedings of the 16th International Conference on Pattern Recognition, 2002., Vol. 2. IEEE, 124--127.Google Scholar
- United Nations (UN). 2017. Household Size and Composition Around the World 2017. (2017). http://www.un.org/en/development/desa/population/publications/pdf/ageing/household_size_and_composition_around_the_world_2017_data_booklet.pdfGoogle Scholar
- Wei Wang, Alex X Liu, and Muhammad Shahzad. 2016. Gait recognition using wifi signals. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 363--373. Google ScholarDigital Library
- Gary M Weiss and Haym Hirsh. 1998. Learning to predict rare events in event sequences. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining. AAAI Press, 359--363. Google ScholarDigital Library
- Weitao Xu, Yiran Shen, Yongtuo Zhang, Neil Bergmann, and Wen Hu. 2017. Gait-watch: A context-aware authentication system for smart watch based on gait recognition. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation. ACM, 59--70. Google ScholarDigital Library
- Roman V Yampolskiy. 2007. Motor-skill based biometrics. In 6th Annual Security Conference, Las Vegas, NV.Google Scholar
- Zheng Yang, Chenshu Wu, Zimu Zhou, Xinglin Zhang, Xu Wang, and Yunhao Liu. 2015. Mobility increases localizability: A survey on wireless indoor localization using inertial sensors. ACM Computing Surveys (Csur) 47, 3 (2015), 54. Google ScholarDigital Library
- U Zabit, OD Bernal, and T Bosch. 2011. A self-mixing displacement sensor compensating parasitic vibration with a MEMs accelerometer. In Sensors, 2011. IEEE, 1386--1389.Google Scholar
Index Terms
- Continuous Identification in Smart Environments Using Wrist-Worn Inertial Sensors
Recommendations
Fall Detection Using Kinematic Features from a Wrist-Worn Inertial Sensor
2019 IEEE International Symposium on Medical Measurements and Applications (MeMeA)The threats and injuries caused by falling are significant and pose risks to life among the elderly population. Detecting falls and providing prompt care helps in reducing the risks associated with falling. Technology solutions are being employed for the ...
Activity Recognition using Head Worn Inertial Sensors
iWOAR '18: Proceedings of the 5th International Workshop on Sensor-based Activity Recognition and InteractionHuman activity recognition using inertial sensors is an increasingly used feature in smartphones or smartwatches, providing information on sports and physical activities of each individual. But while the position a smartphone is worn in varies between ...
Identification of activities of daily living in tremorous patients using inertial sensors
Highlights- Tremor and voluntary movement of the upper limb are separated from IMUs signals.
Abstract BACKGROUNDMuch attention has been given to the use of inertial sensors for remote monitoring of individuals suffering from neurological pathologies. However, the focus has been mostly on the detection of symptoms like ...
Comments