0% found this document useful (0 votes)
64 views9 pages

Unobstrusive User Authentication by Mobile Phone Based Gait Biometric

This document discusses using gait biometrics for unobtrusive user authentication on mobile phones. It reviews literature on gait recognition as a biometric characteristic and its various applications. Gait biometrics can be used for authentication, confidentiality, non-repudiation, and integrity on mobile devices. The document concludes that gait systems show potential for security on mobile devices but have issues to address.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views9 pages

Unobstrusive User Authentication by Mobile Phone Based Gait Biometric

This document discusses using gait biometrics for unobtrusive user authentication on mobile phones. It reviews literature on gait recognition as a biometric characteristic and its various applications. Gait biometrics can be used for authentication, confidentiality, non-repudiation, and integrity on mobile devices. The document concludes that gait systems show potential for security on mobile devices but have issues to address.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

UNOBSTRUSIVE USER

AUTHENTICATION BY MOBILE
PHONE BASED GAIT BIOMETRIC
PRESENTED BY

AYEIRE DEBORAH O.
FPA/CS/15/3-0028
INTRODUCTION

Definition of Mobile Phone

Securing mobile devices

Biometric Characteristic
BACKGROUND

Importance of Mobile devices

Security in mobile phone

Various biometric for security


LITERATURE REVIEW
Gait Recognition

Various methods used in biometric gait

Application of biometric

 Commercial Application

 Government Application

 Forensic Application
CONTINUATION ON REVIEW OF
LITERATURE
Biometric Characteristic

Figure1. 1: – Gait recognition in action (Mark, 2002)


CONTINUATION ON REVIEW OF
LITERATURE
• Gait (Biometric) Security

• Objective of the security

 Authentication: provide identity to gain access.

 Confidentiality: restricting data access by encrypting the data

 Non-repudiation: tracking of actions in a specific image objects

 Integrity: ensuring only authorized personnel and access information


CONTINUATION ON REVIEW OF
LITERATURE
 IMPORTANT FACTORS IN EVALUATION OF GAIT ANALYSIS
SYSTEMS

 Identify the oscillating signals

 Determine how the oscillating signals establish frequency entrainment

 Determine how the oscillating signals translate into features that can be
used for recognition.
CONCLUSION

 Emphasis on mobile devices

 Security issue based on gait system


REFERENCES
Busch, C, 2010. Unobtrusive User Authentication on Mobile Phones using Biometric Gait
Recognition. Norway, The Sixth International Conference on Intelligent Information
Hiding and Multimedia Signal Processing, Darmstadt.
G afurov, D, 2008. Performance and Security Analysis of Gait-based User Authentication,
Oslo: Ph.D. dissertation, Faculty of Mathematics
G eng, X et al., 2010. Context aware fusion: A case study on fusion of gait and face for
human identification in video. Pattern Recognition, 43(10), pp. 3660-3673.
Nixon, etal., 1999; Han & Bhanu, (2006). Individual recognition using gait energy image.
IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(2), p. 316–322.
Jenkins, J & Ellis, C, 2007. Using ground reaction forces from gait analysis: Body mass as a
weak biometric. Pervasive, p. 251–267.
Asher, et al., (2011). Algorithms for gait based human identification from a monocular
video sequence, MD, USA: Ph.D. dissertation, College Park.
Lee, L & Grimson, E, 2002. Gait analysis for recognition and classification. Cambridge, MA,
IEEE, p. 155–161.

You might also like