SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Team memeber :
Mingyang Zheng
Zhe He
Weijia Xu
Ziyun Wang
Identity Verification System Based on
Gait Recognition
Source of InspirationI
IntroductionII
Project FeaturesIV
Scheme of RealizationIII
PerspectiveV
OutLine
DemoVI
1.Situation
 Exam Cheating
2.Put forward
I. Source of Inspiration
GaitRecognition
1 2
34
advantages
Free
from
Forging
Active
recognition
Efficient
and
Reliable
Never
Forget
I. Source of Inspiration
II. Introduction
(i) Framework(i) Framework
Plantar pressure information
acquisition module
MCU
Wireless
Communication
Module
PC
Database MatchingDatabase Matching
certified usercertified user
Uncertified userUncertified user
accessaccess
rejectionrejection
Scheme
Pressure Collecting Module
MCU Processing Module
Wireless Communication Module
(ii) Hardware(ii) Hardware
1
2
3
1
3 2
II. Introduction
Plantar
Pressure
Distribution
Information
samplingsampling
II. Introduction
Feature Abstraction Module
Training Module
Authentication module
GUI Module
(iii) Software(iii) Software
4
3
2
1
1
24
3
II. Introduction
Scheme
Sample
supplement
check
retain
Voltage
receiving
Record Dimension
Reduction
Original Data -> Feature Vector
II. Introduction
Identity Verification
Testing
Training
Verifying
II. Introduction
1. Hardware Platform
2. Software Platform
III. Scheme of Realization
III. Scheme of Realization
(i)(i) HardwareHardware PlatformPlatform
1. Pressure Collecting Module
3. Wireless Communication Module
2. MCU Processing Module
III. Scheme of Realization
(i)(i) HardwareHardware PlatformPlatform
ii Pressure Collecting Interface
Data Recording Interface
Identity Verification Interface
2. Software Platform
III. Scheme of Realization
Pressure Collecting Interface
Data Recording Interface
Identity Verification Interface
III. Scheme of Realization
2. Software Platform
Pressure Collecting Interface
Data Recording Interface
Identity Verification Interface
III. Scheme of Realization
2. Software Platform
1. Biological characteristics certification
3. High Security
2. Active Identification Technology
IV. Project Features
imitate
Very
difficult to
imitate!
The recognition feature is hidden in the user’s behavior
IV. Project Features
1. Biological characteristics certification
Pressure Sensor
The identity feature extraction process is unilaterally completed
by the hardware system
IV. Project Features
2. Active Identification Technology
Controversy: Touch ID
Fingerprint Unlocking Copy the fingerprint
with fingerprint film
Once leaked,
decrypted
forever!
Even if gait is
leaked
can not copy!
No need to worry about key information disclosure, can not be
copied
IV. Project Features
3. High Security
识别嫌疑人识别嫌疑人 BiologicalBiological
keykey
InformationInformation
encryptionencryption
AccessAccess
controlcontrol
systemssystems
BiometricsBiometrics
智能家居智能家居ConfidentialityConfidentiality
DepartmentDepartment
DetectionDetection
IdentifyIdentify
suspectssuspects
Smart HomeSmart Home
V. Perspective
1. Set up database;
2. Give access to certified user
3. Reject uncertified user
VI. Demo

Weitere ähnliche Inhalte

Was ist angesagt?

Tarun Makwana's Resume
Tarun Makwana's ResumeTarun Makwana's Resume
Tarun Makwana's Resume
Tarun Makwana
 
SPOORTHI_P_Curriculum vitae (1)
SPOORTHI_P_Curriculum vitae (1)SPOORTHI_P_Curriculum vitae (1)
SPOORTHI_P_Curriculum vitae (1)
spoorthy shetty
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
Appaji K
 

Was ist angesagt? (17)

Improving Quality of Service via Intel RDT
Improving Quality of Service via Intel RDTImproving Quality of Service via Intel RDT
Improving Quality of Service via Intel RDT
 
Running Kubernetes on OpenStack
Running Kubernetes on OpenStackRunning Kubernetes on OpenStack
Running Kubernetes on OpenStack
 
Tarun Makwana's Resume
Tarun Makwana's ResumeTarun Makwana's Resume
Tarun Makwana's Resume
 
Ni week 2018 DMC presentation IoT
Ni week 2018 DMC presentation IoTNi week 2018 DMC presentation IoT
Ni week 2018 DMC presentation IoT
 
Ankit Vakil (1)
Ankit Vakil (1)Ankit Vakil (1)
Ankit Vakil (1)
 
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
 
Girish_BharadwajK_RESUME
Girish_BharadwajK_RESUMEGirish_BharadwajK_RESUME
Girish_BharadwajK_RESUME
 
Intel® Select Solutions for the Network
Intel® Select Solutions for the NetworkIntel® Select Solutions for the Network
Intel® Select Solutions for the Network
 
Pavan(ES)
Pavan(ES)Pavan(ES)
Pavan(ES)
 
Closed Loop Network Automation for Optimal Resource Allocation via Reinforcem...
Closed Loop Network Automation for Optimal Resource Allocation via Reinforcem...Closed Loop Network Automation for Optimal Resource Allocation via Reinforcem...
Closed Loop Network Automation for Optimal Resource Allocation via Reinforcem...
 
Ankit Vakil (2)
Ankit Vakil (2)Ankit Vakil (2)
Ankit Vakil (2)
 
SPOORTHI_P_Curriculum vitae (1)
SPOORTHI_P_Curriculum vitae (1)SPOORTHI_P_Curriculum vitae (1)
SPOORTHI_P_Curriculum vitae (1)
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
 
Closed Loop Platform Automation - Tong Zhong & Emma Collins
Closed Loop Platform Automation - Tong Zhong & Emma CollinsClosed Loop Platform Automation - Tong Zhong & Emma Collins
Closed Loop Platform Automation - Tong Zhong & Emma Collins
 
Presentaion final
Presentaion finalPresentaion final
Presentaion final
 
Advanced MQTT and Kura - EclipseCON 2014
Advanced MQTT and Kura - EclipseCON 2014Advanced MQTT and Kura - EclipseCON 2014
Advanced MQTT and Kura - EclipseCON 2014
 

Andere mochten auch

Mohamad amsanudin,11140583,5 v man,psp materi 8
Mohamad amsanudin,11140583,5 v man,psp materi 8Mohamad amsanudin,11140583,5 v man,psp materi 8
Mohamad amsanudin,11140583,5 v man,psp materi 8
mohamad amsanudin
 
B WARLING NEW RESUME
B WARLING NEW RESUMEB WARLING NEW RESUME
B WARLING NEW RESUME
Brent warling
 
MSc PAQC_dissertation_Cristina Aller
MSc PAQC_dissertation_Cristina AllerMSc PAQC_dissertation_Cristina Aller
MSc PAQC_dissertation_Cristina Aller
Cristina Aller Garcia
 
2015-16 Sample Shale Energy Presentations and Immersion Programs
2015-16 Sample Shale Energy Presentations and Immersion Programs2015-16 Sample Shale Energy Presentations and Immersion Programs
2015-16 Sample Shale Energy Presentations and Immersion Programs
Tom Murphy
 
Mohamad amsanudin,11140583,5v materi 1
Mohamad amsanudin,11140583,5v materi 1Mohamad amsanudin,11140583,5v materi 1
Mohamad amsanudin,11140583,5v materi 1
mohamad amsanudin
 

Andere mochten auch (18)

Interview Dr Patrick BOUET
Interview Dr Patrick BOUETInterview Dr Patrick BOUET
Interview Dr Patrick BOUET
 
Mental Health Presentation
Mental Health PresentationMental Health Presentation
Mental Health Presentation
 
Mohamad amsanudin,11140583,5 v man,psp materi 8
Mohamad amsanudin,11140583,5 v man,psp materi 8Mohamad amsanudin,11140583,5 v man,psp materi 8
Mohamad amsanudin,11140583,5 v man,psp materi 8
 
B WARLING NEW RESUME
B WARLING NEW RESUMEB WARLING NEW RESUME
B WARLING NEW RESUME
 
Cynthia L
Cynthia LCynthia L
Cynthia L
 
Pub cours succession collaboratrices
Pub cours succession collaboratricesPub cours succession collaboratrices
Pub cours succession collaboratrices
 
Agc wp-astonishing facts about filter elements part 1
Agc wp-astonishing facts about filter elements part 1Agc wp-astonishing facts about filter elements part 1
Agc wp-astonishing facts about filter elements part 1
 
MSc PAQC_dissertation_Cristina Aller
MSc PAQC_dissertation_Cristina AllerMSc PAQC_dissertation_Cristina Aller
MSc PAQC_dissertation_Cristina Aller
 
2015-16 Sample Shale Energy Presentations and Immersion Programs
2015-16 Sample Shale Energy Presentations and Immersion Programs2015-16 Sample Shale Energy Presentations and Immersion Programs
2015-16 Sample Shale Energy Presentations and Immersion Programs
 
Profiel
ProfielProfiel
Profiel
 
Secondary 1 CCA Briefing 2017 LEAPS 2.0 slides
Secondary 1 CCA Briefing 2017 LEAPS 2.0 slides Secondary 1 CCA Briefing 2017 LEAPS 2.0 slides
Secondary 1 CCA Briefing 2017 LEAPS 2.0 slides
 
Pertumbuhan ekonomi materi 4
Pertumbuhan ekonomi materi 4Pertumbuhan ekonomi materi 4
Pertumbuhan ekonomi materi 4
 
Agc wp-coalescer separator filter system
Agc wp-coalescer separator filter systemAgc wp-coalescer separator filter system
Agc wp-coalescer separator filter system
 
Mohamad amsanudin,11140583,5v materi 1
Mohamad amsanudin,11140583,5v materi 1Mohamad amsanudin,11140583,5v materi 1
Mohamad amsanudin,11140583,5v materi 1
 
สงครามโลกครั้งที่1
สงครามโลกครั้งที่1 สงครามโลกครั้งที่1
สงครามโลกครั้งที่1
 
Paella de marisc
Paella de mariscPaella de marisc
Paella de marisc
 
Presentación, curso1
Presentación, curso1Presentación, curso1
Presentación, curso1
 
Tema 3 estructura_sintáctica_del_texto
Tema 3 estructura_sintáctica_del_textoTema 3 estructura_sintáctica_del_texto
Tema 3 estructura_sintáctica_del_texto
 

Ähnlich wie Identity Verification System Based on Gait Recognition

Ähnlich wie Identity Verification System Based on Gait Recognition (20)

Project Report on Intrusion Detection System
Project Report on Intrusion Detection SystemProject Report on Intrusion Detection System
Project Report on Intrusion Detection System
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
 
SECURITY ANALYSIS OF MOBILE AUTHENTICATION USING QR-CODES
SECURITY ANALYSIS OF MOBILE AUTHENTICATION USING QR-CODES SECURITY ANALYSIS OF MOBILE AUTHENTICATION USING QR-CODES
SECURITY ANALYSIS OF MOBILE AUTHENTICATION USING QR-CODES
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
 
best pharma journals
best pharma journals best pharma journals
best pharma journals
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured Communication
 
Blind authentication
Blind authenticationBlind authentication
Blind authentication
 
Sdl deployment in ics
Sdl deployment in icsSdl deployment in ics
Sdl deployment in ics
 
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-PointGraphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized Activity
 
Careful Packing
Careful PackingCareful Packing
Careful Packing
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
 
Web applications security conference slides
Web applications security  conference slidesWeb applications security  conference slides
Web applications security conference slides
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Security
 

Identity Verification System Based on Gait Recognition

Hinweis der Redaktion

  1. 灵感来源:人类善于进行步态识别,在一定距离之外能够根据人的步态辨别出熟悉的人。 而同时现有的身份识别技术安全性受到挑战。
  2. 这种情况下。我们提出了基于步态识别的身份认证系统这一构想。。”相比指纹,不易复制,同时作为长期行为习惯,不易模仿,安全性高;作为一种特殊的生物秘钥,随身“携带”,不易遗忘;主动识别,无需接触;短时间采集大量数据进行处理,效率高,稳定性好。
  3. 我们的系统整体结构如下:通过图像识别和足底压力分布特征识别构建一个身份认证系统。该系统首先构建用户的足底压力和步态图像数据库;使用时测试者穿戴上压力采样鞋套走过图像采集区域,系统将采集的信息与数据库中数据对比并判断来者身份,从而控制来者是否有权限进入特定区域。
  4. 我们的项目分为硬件和软件两个模块,其中硬件模块包括:。
  5. 两个数据源:图像数据源与足底压力辅助数据源提高识别率,加强安全性
  6. 下面为软件模块,软件模块包括:
  7. 两个数据源:图像数据源与足底压力辅助数据源提高识别率,加强安全性
  8. 步态生物特征极难模仿:一方面通过下肢大范围的采样避免了局部特点的伪造,另一方面通过足底关键点的精细采样更加提高了伪造身份信息的困难度。相比于一般身份认证及普通生物特征识别,安全性得到提高。
  9. 人只需要自然行走,不需刻意接近机器,系统便可以主动对数据进行采集,完成认证过程。
  10. 无需担心秘钥泄露