Gait analysis: Is it easy to learn to walk like someone else?

In this master’s thesis, we will look at whether it is easy or difficult to learn to walk like someone else in such a way that one will be accepted by an authentication system, based on gait. In the last couple of years, there have been some studies about whether gait can be used in order to authenticate a person. If it turns out to be very easy to learn to walk like another person, then gait authentication should probably not be used as the only authentication technique. We investigate the ease of gait mimicking by means of a 3-axis sensor worn by the user. A prototype is created, which reads this acceleration data, and plots it as 3 graphs in a coordinate system, shown on a big screen. The aim is to see whether the user manages to learn to walk in such a way that his graphs match 3 template graphs, which are also plotted in the same coordinate system. Every attempt lasts 5 seconds, and a score between 0 and 100 will be given in the end of each, based on how similar the impersonator’s graphs are to the original graphs. We use Pearson’s correlation to calculate this. The experiment has 13 participants, and we have created 5 different templates which each participant will attempt to imitate 15 times. The results from our data analysis are showing that it actually seems rather easy to learn to walk like another person, and hence to be accepted by a gait authentication system.

[1]  Sung-Hyuk Cha,et al.  Establishing the Uniqueness of the Human Voice for Security Applications , 2004 .

[2]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[3]  Jaihie Kim,et al.  Iris Feature Extraction Using Independent Component Analysis , 2003, AVBPA.

[4]  Einar Snekkenes,et al.  Robustness of Biometric Gait Authentication Against Impersonation Attack , 2006, OTM Workshops.

[5]  Joseph A. Paradiso,et al.  A Compact Wearable Sensor Package for Clinical Gait Monitoring , 2003 .

[6]  P. Lachenbruch Statistical Power Analysis for the Behavioral Sciences (2nd ed.) , 1989 .

[7]  John H. L. Hansen,et al.  An experimental study of speaker verification sensitivity to computer voice-altered imposters , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[8]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[9]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[10]  Sharath Pankanti,et al.  Structure in errors: a case study in fingerprint verification , 2002, Object recognition supported by user interaction for service robots.

[11]  Pascal Fua,et al.  Animated Heads from Ordinary Images: A Least-Squares Approach , 1999, Comput. Vis. Image Underst..

[12]  Chiara Braghin Biometric Authentication , 2000 .

[13]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[14]  Mark S. Nixon,et al.  Performance analysis on new biometric gait motion model , 2002, Proceedings Fifth IEEE Southwest Symposium on Image Analysis and Interpretation.

[15]  Mark S. Nixon,et al.  A floor sensor system for gait recognition , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[16]  Julian Fiérrez,et al.  Multimodal biometric authentication using quality signals in mobile communications , 2003, 12th International Conference on Image Analysis and Processing, 2003.Proceedings..

[17]  Hong Chang,et al.  SVC2004: First International Signature Verification Competition , 2004, ICBA.

[18]  Lindsay I. Smith,et al.  A tutorial on Principal Components Analysis , 2002 .

[19]  Alfred C. Weaver,et al.  Biometric authentication , 2006, Computer.

[20]  Pascal Fua,et al.  3D tracking for gait characterization and recognition , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..

[21]  Tor Erik Buvarp Hip movement based authentication: how will imitation affect the results? , 2006 .

[22]  F. Wilcoxon Individual Comparisons by Ranking Methods , 1945 .

[23]  Anastasios Tefas,et al.  Frontal face authentication using morphological elastic graph matching , 2000, IEEE Trans. Image Process..

[24]  Tieniu Tan,et al.  An iris image synthesis method based on PCA and super-resolution , 2004, ICPR 2004.

[25]  Torkjel Søndrol Using the human gait for authentication , 2005 .

[26]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[27]  William T. Freeman,et al.  Example-Based Super-Resolution , 2002, IEEE Computer Graphics and Applications.

[28]  Hikaru Inooka,et al.  Classification of human moving patterns using air pressure and acceleration , 1998, IECON '98. Proceedings of the 24th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.98CH36200).

[29]  Jason Brand,et al.  Visual Speech: A Physiological or Behavioural Biometric? , 2001, AVBPA.

[30]  Xinjian Chen,et al.  A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems , 2005, ISI.

[31]  Kirsi Helkala,et al.  Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..

[32]  Gregory D. Abowd,et al.  The smart floor: a mechanism for natural user identification and tracking , 2000, CHI Extended Abstracts.

[33]  Heikki Ailisto,et al.  Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[34]  Douglas G. Altman,et al.  Practical statistics for medical research , 1990 .

[35]  Goswami,et al.  A new gait parameterization technique by means of cyclogram moments: Application to human slope walking. , 1998, Gait & posture.

[36]  S. Elliott,et al.  Implementation of hand geometry at Purdue University's Recreational Center: an analysis of user perspectives and system performance , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.

[37]  A. B. Drought,et al.  WALKING PATTERNS OF NORMAL MEN. , 1964, The Journal of bone and joint surgery. American volume.

[38]  Kenichi Yamazaki,et al.  Gait analyzer based on a cell phone with a single three-axis accelerometer , 2006, Mobile HCI.

[39]  Hua Li,et al.  3D gait recognition using multiple cameras , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[40]  Thomas Vetter,et al.  A morphable model for the synthesis of 3D faces , 1999, SIGGRAPH.

[41]  Jean-Yves Ramel,et al.  Fusion of methods for keystroke dynamic authentication , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[42]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.