Professional Documents
Culture Documents
1 Introductions
2 System architecture
2
Introductions
Security for identification, authorization or authentication:
Knowledge: password
Token: ID card
Biometric: fingerprint, iris, gait
Advantages of biometric:
No need to remember as password or reserve something as ID card
Authentication using gait:
Advantages:
Gait data can be collected implicitly.
Its difficult to mimic gait data.
Challenges and risks when using gait for:
Less discriminative
Much noise
3
Introductions (cont)
Current sensor-based gait recognition approaches:
Pattern recognition and machine learning
Gait template or extracted features are stored in unconcealed
form.
Critical vulnerability: device is stolen or malware infected,
attacker can obtain gait template Attacker can utilize
compromised template to access other sensitive devices.
Impossible to use hash for protecting gait template:
Hash do not tolerance any error bit.
4
Introductions (cont)
Main contribution of the paper:
Apply security and privacy for gait authentication on mobile
phone.
Determine appropriate parameters to construct an effective gait-
based biometric cryptosystem.
Analyze security strength of proposed system.
5
Contents
1 Introductions
2 System architecture
6
System architecture
Gait Feature
signal Extraction
Storage
Hash
Helper data Secured h(m)
function
Extract
Binariza-
Reliable Matching Decision
tion
bit
Overall architecture 7
System architecture (cont)
Gait biometrics acquisition:
Gait signals based on Wearable Sensor Technology (WST)
Mobile used: Google Netxus One
Signal: built-in three sensor: gravity, acceleration and motion
Signal: combined of gravity acceleration, ground reaction force,
and inertial acceleration
Acquired data:
8
System architecture (cont)
Gait biometrics acquisition:
Gait signals based on Wearable Sensor Technology (WST)
Mobile used: Google Netxus One
Signal: built-in three sensor: gravity, acceleration and motion
Signal: combined of gravity acceleration, ground reaction force,
and inertial acceleration
Acquired data:
9
System architecture (cont)
Gait signal preprocessing and gait cycle extraction:
Raw signals: contents much noise multi-level wavelet
decomposition (Db6) is applied to eliminate noise.
Gait cycles extraction: cycle-based segmentation algorithm.
Real-valued gait template extraction:
Gait cycles are normalized to ns samples:
10
System architecture (cont)
Real-valued gait template extraction (cont):
Let nt = mns , so:
11
System architecture (cont)
Real-valued gait template extraction (cont):
An interpolation method is adopted to resample T to an
appropriate size for binding with a cryptographic key.
Let y be the timestamp, so the acceleration samples with
timestamp are as:
12
System architecture (cont)
Real-valued gait template extraction (cont):
An interpolation method is adopted to resample T to an
appropriate size for binding with a cryptographic key.
Let y be the timestamp, so the acceleration samples with
timestamp are as:
13
System architecture (cont)
Real-valued gait template extraction (cont):
Assume that size of gate template T is n x 3 after interpolation.
T is represent in vector (1 x 3n) by concatenating three
dimensions X, Y, Z as:
14
System architecture (cont)
Gait template binarization:
Denote: the number of users is N, the number of real-valued gait
template of each user is M
Denote:
15
System architecture (cont)
Gait template binarization (cont):
The mean over intra-class variability of user u as:
16
System architecture (cont)
Reliable bit extraction:
The reliable bit is extracted by determine the index of reliable
bits in (u).
The reliability of a bit i(u) in (u) is calculated by Gaussian Error
function as:
17
System architecture (cont)
Reliable bit extraction:
Denote the index vector of components is:
The first nc (nc < nr) components of i(u) will be used to extract the
final binary template (u)
18
System architecture (cont)
Key binding scheme:
A key m of length k is generated randomly.
m is encoded by BCH(nc, k, t) to the code word c of length nc
The hash code h(m) of m is stored and used for authentication
user
After having i, u and h(m), all other data and gait template will
be discarded.
19
Thank you very much!