skip to main content
10.1145/3286978.3287001acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobiquitousConference Proceedingsconference-collections
research-article

Continuous Identification in Smart Environments Using Wrist-Worn Inertial Sensors

Published:05 November 2018Publication History

ABSTRACT

In this paper, we propose a new approach capable of performing continuous identification of users in home and office environments based on hand and arm motion patterns obtained from a wrist-worn inertial measurement unit (IMU). Different from state-of-the-art methods, our approach is not constrained to particular types of movements, gestures, or activities, thus allowing users to perform freely and unconstrained their daily routines while the identification takes place. We evaluate our approach by conducting an in the lab study and two in-situ studies, one in home environment and one in office environment. Our studies involved a total of 29 different participants and the data collected corresponds to approximately 256 hours. The results obtained in the studies indicate that our approach is able to perform continuous user identification with an accuracy of 0.88 for office environments and 0.71 for the average size of a household.

References

  1. Heba Abdelnasser, Moustafa Youssef, and Khaled A Harras. 2015. Wigest: A ubiquitous wifi-based gesture recognition system. In Computer Communications (INFOCOM), 2015 IEEE Conference on. IEEE, 1472--1480.Google ScholarGoogle ScholarCross RefCross Ref
  2. Christopher Ackad, Andrew Clayphan, Roberto Martinez Maldonado, and Judy Kay. 2012. Seamless and continuous user identification for interactive table-tops using personal device handshaking and body tracking. In CHI'12 Extended Abstracts on Human Factors in Computing Systems. ACM, 1775--1780. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alaa Alhamoud, Arun Asokan Nair, Christian Gottron, Doreen Böhnstedt, and Ralf Steinmetz. 2014. Presence detection, identification and tracking in smart homes utilizing bluetooth enabled smartphones. In Local Computer Networks Workshops (LCN Workshops), 2014 IEEE 39th Conference on. IEEE, 784--789.Google ScholarGoogle ScholarCross RefCross Ref
  4. Stacy J Morris Bamberg, Ari Y Benbasat, Donna Moxley Scarborough, David E Krebs, and Joseph A Paradiso. 2008. Gait analysis using a shoe-integrated wireless sensor system. IEEE transactions on information technology in biomedicine 12, 4 (2008), 413--423. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Mary Ellen Berglund, Julia Duvall, and Lucy E Dunne. 2016. A survey of the historical scope and current trends of wearable technology applications. In Proceedings of the 2016 ACM International Symposium on Wearable Computers. ACM, 40--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cheng Bo, Lan Zhang, Taeho Jung, Junze Han, Xiang-Yang Li, and Yu Wang. 2014. Continuous user identification via touch and movement behavioral biometrics. In Performance Computing and Communications Conference (IPCCC), 2014 IEEE International. IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  7. Alan Bränzel, Christian Holz, Daniel Hoffmann, Dominik Schmidt, Marius Knaust, Patrick Lühne, René Meusel, Stephan Richter, and Patrick Baudisch. 2013. GravitySpace: tracking users and their poses in a smart room using a pressure-sensing floor. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 725--734. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Anthony Brown, Richard Mortier, and Tom Rodden. 2014. An exploration of user recognition on domestic networks using NetFlow records. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 903--910. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Guglielmo Cola, Marco Avvenuti, Fabio Musso, and Alessio Vecchio. 2016. Gait-based authentication using a wrist-worn device. In Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, 208--217. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Abir Das, Rameswar Panda, and Amit K Roy-Chowdhury. 2017. Continuous adaptation of multi-camera person identification models through sparse non-redundant representative selection. Computer Vision and Image Understanding 156 (2017), 66--78.Google ScholarGoogle ScholarCross RefCross Ref
  11. Matteo Ferrara, Annalisa Franco, and Dario Maio. 2014. On the use of the Kinect sensor for human identification in smart environments. Journal of Ambient Intelligence and Smart Environments 6, 4 (2014), 435--446.Google ScholarGoogle ScholarCross RefCross Ref
  12. Jordan Frank, Shie Mannor, and Doina Precup. 2010. Activity and gait recognition with time-delay embeddings.. In AAAI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Davrondzhon Gafurov, Patrick Bours, and Einar Snekkenes. 2011. User authentication based on foot motion. Signal, Image and Video Processing 5, 4 (2011), 457.Google ScholarGoogle ScholarCross RefCross Ref
  14. Daniel Garnier-Moiroux, Fernando Silveira, and Anmol Sheth. 2013. Towards user identification in the home from appliance usage patterns. In Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. ACM, 861--868. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. William Rowan Hamilton. 1844. On quaternions; or on a new system of imaginaries in algebra. Philosophical Magazine Series 3 25, 163 (1844), 10--13.Google ScholarGoogle Scholar
  16. Eiji Hayashi, Manuel Maas, and Jason I Hong. 2014. Wave to me: user identification using body lengths and natural gestures. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3453--3462. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Martin Reese Hestbek, Claudia Nickel, and Christoph Busch. 2012. Biometric gait recognition for mobile devices using wavelet transform and support vector machines. In Systems, Signals and Image Processing (IWSSIP), 2012 19th International Conference on. IEEE, 205--210.Google ScholarGoogle Scholar
  18. Christian Holz and Marius Knaust. 2015. Biometric touch sensing: Seamlessly augmenting each touch with continuous authentication. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. ACM, 303--312. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Alexandros Iosifidis, Anastasios Tefas, and Ioannis Pitas. 2012. Activity-based person identification using fuzzy representation and discriminant learning. IEEE Transactions on Information Forensics and Security 7, 2 (2012), 530--542. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Akane Ishida, Kazuya Murao, Tsutomu Terada, and Masahiko Tsukamoto. 2017. A user identification method based on features of opening/closing a refrigerator door. In Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on. IEEE, 533--538.Google ScholarGoogle ScholarCross RefCross Ref
  21. Felix Juefei-Xu, Chandrasekhar Bhagavatula, Aaron Jaech, Unni Prasad, and Marios Savvides. 2012. Gait-id on the move: Pace independent human identification using cell phone accelerometer dynamics. In Biometrics: Theory, Applications and Systems (BTAS), 2012 IEEE Fifth International Conference on. IEEE, 8--15.Google ScholarGoogle ScholarCross RefCross Ref
  22. Ludmila I Kuncheva. 2004. Combining pattern classifiers: methods and algorithms. John Wiley & Sons. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Jennifer R Kwapisz, Gary M Weiss, and Samuel A Moore. 2010. Cell phone-based biometric identification. In 2010 Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS). IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  24. Sugang Li, Ashwin Ashok, Yanyong Zhang, Chenren Xu, Janne Lindqvist, and Macro Gruteser. 2016. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns. In IEEE International Conference on Pervasive Computing and Communications (PerCom),. IEEE, 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  25. Daniel J Liebling and Sören Preibusch. 2014. Privacy considerations for a pervasive eye tracking world. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 1169--1177. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Takuya Maekawa, Akira Masuda, and Yasuo Namioka. 2016. Identification from ceiling: unconstrained person identification for tabletops using multiview learning. In Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia. ACM, 273--284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Apostolos Malatras, Dimitris Geneiatakis, and Ioannis Vakalis. 2017. On the efficiency of user identification: a system-based approach. International Journal of Information Security 16, 6 (2017), 653--671. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Sebastien Marcel and José del R Millán. 2007. Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE transactions on pattern analysis and machine intelligence 29, 4 (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Eric Martinson, W Lawson, and J Greg Trafton. 2010. Person identification through perceptual fusion. In 10th IEEE-RAS International Conference on Humanoid Robots (Humanoids), 2010. IEEE, 358--364.Google ScholarGoogle ScholarCross RefCross Ref
  30. Darko S Matovski, Mark S Nixon, Sasan Mahmoodi, and John N Carter. 2012. The effect of time on gait recognition performance. IEEE transactions on information forensics and security 7, 2 (2012), 543--552. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Soumik Mondal and Patrick Bours. 2016. Combining keystroke and mouse dynamics for continuous user authentication and identification. In Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), 2016. IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  32. Natalia Neverova, Christian Wolf, Griffin Lacey, Lex Fridman, Deepak Chandra, Brandon Barbello, and Graham Taylor. 2016. Learning human identity from motion patterns. IEEE Access 4 (2016), 1810--1820.Google ScholarGoogle ScholarCross RefCross Ref
  33. Organisation for Economic Co-operation and Development (OECD). 2016. Five family facts. (2016). https://www.oecd.org/els/family/47710686.pdfGoogle ScholarGoogle Scholar
  34. Henning Pohl, Markus Krause, and Michael Rohs. 2015. One-button recognizer: exploiting button pressing behavior for user differentiation. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 403--407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Juhi Ranjan. 2015. Object user recognition in multi-person homes. In Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. ACM, 477--482. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Olivier Rioul and Pierre Duhamel. 1992. Fast algorithms for discrete and continuous wavelet transforms. IEEE transactions on information theory 38, 2 (1992), 569--586. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Joseph Roth, Xiaoming Liu, and Dimitris Metaxas. 2014. On continuous user authentication via typing behavior. IEEE Transactions on Image Processing 23, 10 (2014), 4611--4624.Google ScholarGoogle ScholarCross RefCross Ref
  38. Yiran Shen, Hongkai Wen, Chengwen Luo, Weitao Xu, Tao Zhang, Wen Hu, and Daniela Rus. 2018. GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait. IEEE Transactions on Dependable and Secure Computing (2018).Google ScholarGoogle Scholar
  39. Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Shimmer sensing. 2016. Shimmer3 wireless sensor platform. http://www.shimmersensing.com/images/uploads/docs/Shimmer3_Spec_Sheet_V1.6.pdf. (2016). {Online; last-accessed October 2018}.Google ScholarGoogle Scholar
  41. David MJ Tax and Robert PW Duin. 2002. Using two-class classifiers for multi-class classification. In Proceedings of the 16th International Conference on Pattern Recognition, 2002., Vol. 2. IEEE, 124--127.Google ScholarGoogle Scholar
  42. United Nations (UN). 2017. Household Size and Composition Around the World 2017. (2017). http://www.un.org/en/development/desa/population/publications/pdf/ageing/household_size_and_composition_around_the_world_2017_data_booklet.pdfGoogle ScholarGoogle Scholar
  43. Wei Wang, Alex X Liu, and Muhammad Shahzad. 2016. Gait recognition using wifi signals. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 363--373. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Gary M Weiss and Haym Hirsh. 1998. Learning to predict rare events in event sequences. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining. AAAI Press, 359--363. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Weitao Xu, Yiran Shen, Yongtuo Zhang, Neil Bergmann, and Wen Hu. 2017. Gait-watch: A context-aware authentication system for smart watch based on gait recognition. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation. ACM, 59--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Roman V Yampolskiy. 2007. Motor-skill based biometrics. In 6th Annual Security Conference, Las Vegas, NV.Google ScholarGoogle Scholar
  47. Zheng Yang, Chenshu Wu, Zimu Zhou, Xinglin Zhang, Xu Wang, and Yunhao Liu. 2015. Mobility increases localizability: A survey on wireless indoor localization using inertial sensors. ACM Computing Surveys (Csur) 47, 3 (2015), 54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. U Zabit, OD Bernal, and T Bosch. 2011. A self-mixing displacement sensor compensating parasitic vibration with a MEMs accelerometer. In Sensors, 2011. IEEE, 1386--1389.Google ScholarGoogle Scholar

Index Terms

  1. Continuous Identification in Smart Environments Using Wrist-Worn Inertial Sensors

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        MobiQuitous '18: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
        November 2018
        490 pages
        ISBN:9781450360937
        DOI:10.1145/3286978

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 November 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate26of87submissions,30%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader