skip to main content
10.1145/3325424.3329666acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Walk to Show Your Identity: Gait-based Seamless User Authentication Framework Using Deep Neural Network

Authors Info & Claims
Published:12 June 2019Publication History

ABSTRACT

With a rapid increase in the usage of wearable IoT devices such as a smartwatch, we can easily monitor various user activities which exhibit distinct patterns for each individual. Such activities as arm swings while walking orgait, can be used to distinctly identify different users. Therefore, this indirect interaction between the users and wearable IoT devices can be used as a biometric authentication technique to seamlessly authenticate and identify users. Thus, various gait-based authentication frameworks using sensor data collected through wearable or hand-held devices were proposed in the literature. However, many of them limitedly utilized the unique patterns by extracting features from the data sequences. Moreover, they require users to walk long period of time to collect large volume of sensor data in each authentication process, which hinders prompt user authentication. To address the limitations, we propose a gait-based seamless authentication framework using deep neural network (Deep Gait). Unlike many of the existing works, Deep Gait authenticates users without any feature extraction process, which can capture the overlooked features in the existing works. Moreover, Deep Gait requires less amount of sensor data (only one walk cycle) than the existing works (8 to 20 walk cycles) for user authentication, which enables seamless access control. Our experimental results evaluated on the commercial smartwatch show that Deep Gait achieves an Equal Error Rate (EER) of 1.8% which is lower than the existing works.

References

  1. Brain, G. Tensorflow, Nov 2015. Retrieved Jan 2, 2019 from https://github.com/tensorflow/tensorflow.Google ScholarGoogle Scholar
  2. Cola, G., Avvenuti, M., Musso, F., and Vecchio, A. Gait-based authentication using a wrist-worn device. In Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (New York, NY, USA, November 2016), MOBIQUITOUS 2016, ACM, pp. 208--217.Google ScholarGoogle Scholar
  3. Draper, S. Wearable device sales will grow 26 percent worldwide in 2019, says research company gartner, December 2018. Retrieved Feb 1, 2019 from https://www.wearable-technologies.com/2018/12/wearable-device-saleswill- grow-26-percent-worldwide-in-2019-says-research-company-gartner/.Google ScholarGoogle Scholar
  4. Gafurov, D., Snekkenes, E., and Bours, P. Spoof attacks on gait authentication system. IEEE Transactions on Information Forensics and Security 2, 3 (Sept 2007), 491--502. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Giorgi, G., Martinelli, F., Saracino, A., and Sheikhalishahi, M. Walking through the deep: Gait analysis for user authentication through deep learning: 33rd ifip tc 11 international conference, sec 2018, held at the 24th ifip world computer congress,wcc 2018, poznan, poland, september 18--20, 2018, proceedings. pp. 62--76.Google ScholarGoogle Scholar
  6. Glorot, X., and Bengio, Y. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics (13--15 May 2010), vol. 9 of Proceedings of Machine Learning Research, PMLR, pp. 249--256.Google ScholarGoogle Scholar
  7. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. H. The weka data mining software: An update. SIGKDD Explor. Newsl. 11, 1 (Nov. 2009), 10--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Johnston, A. H., and Weiss, G. M. Smartwatch-based biometric gait recognition. In 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (Sept 2015), pp. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  9. Kingma, D., and Ba, J. Adam: A method for stochastic optimization. International Conference on Learning Representations (12 2014).Google ScholarGoogle Scholar
  10. MacQueen, J. Some methods for classification and analysis of multivariate observations. In Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Statistics (1967), University of California Press, pp. 281--297.Google ScholarGoogle Scholar
  11. Mahfouz, A., Mahmoud, T. M., and Sharaf Eldin, A. Poster: A behavioral biometric authentication framework on smartphones. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (New York, NY, USA, April 2017), ASIA CCS '17, ACM, pp. 923--925. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Muaaz, M., and Mayrhofer, R. Smartphone-based gait recognition: From authentication to imitation. IEEE Transactions on Mobile Computing 16, 11 (Nov 2017), 3209--3221.Google ScholarGoogle ScholarCross RefCross Ref
  13. Nair, V., and Hinton, G. E. Rectified linear units improve restricted boltzmann machines. In Proceedings of the 27th International Conference on International Conference on Machine Learning (2010), ICML'10, pp. 807--814. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Rawlinson, K. Hp study reveals smartwatches vulnerable to attack, July 2015. http://www8.hp.com/us/en/hp-news/press-release.html?id=2037386.Google ScholarGoogle Scholar
  15. Savitzky, A., and Golay, M. J. E. Smoothing and differentiation of data by simplified least squares procedures. Analytical Chemistry 36, 8 (1964), 1627--1639.Google ScholarGoogle ScholarCross RefCross Ref
  16. Shahzad, M., Liu, A. X., and Samuel, A. Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it. In Proceedings of the 19th Annual International Conference on Mobile Computing & Networking (New York, NY, USA, 2013), MobiCom '13, ACM, pp. 39--50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., and Salakhutdinov, R. Dropout: A simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15, 1 (Jan. 2014), 1929--1958.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Terada, S., Enomoto, Y., Hanawa, D., and Oguchi, K. Performance of gait authentication using an acceleration sensor. In 2011 34th International Conference on Telecommunications and Signal Processing (TSP) (Aug 2011), pp. 34--36.Google ScholarGoogle ScholarCross RefCross Ref
  19. Zhang, Y., Pan, G., Jia, K., Lu, M., Wang, Y., and Wu, Z. Accelerometer-based gait recognition by sparse representation of signature points with clusters. IEEE Transactions on Cybernetics 45, 9 (Sep. 2015), 1864--1875.Google ScholarGoogle Scholar
  20. Zhao, Y., Qiu, Z., Yang, Y., Li, W., and Fan, M. An empirical study of touchbased authentication methods on smartwatches. In Proceedings of the 2017 ACM International Symposium on Wearable Computers (New York, NY, USA, 2017), ISWC '17, ACM, pp. 122--125. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Walk to Show Your Identity: Gait-based Seamless User Authentication Framework Using Deep Neural Network

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WearSys '19: The 5th ACM Workshop on Wearable Systems and Applications
        June 2019
        77 pages
        ISBN:9781450367752
        DOI:10.1145/3325424

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 June 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate28of36submissions,78%

        Upcoming Conference

        MOBISYS '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader