Skip to main content
Log in

Personalization and user verification in wearable systems using biometric walking patterns

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

In this article, a novel technique for user’s authentication and verification using gait as a biometric unobtrusive pattern is proposed. The method is based on a two stages pipeline. First, a general activity recognition classifier is personalized for an specific user using a small sample of her/his walking pattern. As a result, the system is much more selective with respect to the new walking pattern. A second stage verifies whether the user is an authorized one or not. This stage is defined as a one-class classification problem. In order to solve this problem, a four-layer architecture is built around the geometric concept of convex hull. This architecture allows to improve robustness to outliers, modeling non-convex shapes, and to take into account temporal coherence information. Two different scenarios are proposed as validation with two different wearable systems. First, a custom high-performance wearable system is built and used in a free environment. A second dataset is acquired from an Android-based commercial device in a ‘wild’ scenario with rough terrains, adversarial conditions, crowded places and obstacles. Results on both systems and datasets are very promising, reducing the verification error rates by an order of magnitude with respect to the state-of-the-art technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Bao L, Intille SS (2004) Activity recognition from user-annotated acceleration data. In: Pervasive. Springer, Berlin, pp 1–17

  2. Bennett KP, Bredensteiner EJ (2000) Duality and geometry in svm classifiers. In: Proceedings of the seventeenth international conference on machine learning, ICML ’00. Morgan Kaufmann Publishers Inc, San Francisco, pp 57–64

  3. Bianchi L, Angelini D, Lacquaniti F (1998) Individual characteristics of human walking mechanics. Pflügers Archiv Eur J Physiol 436:343–356

    Article  Google Scholar 

  4. Breiman L (1996) Bagging predictors. Mach Learn 24:123–140

    MathSciNet  MATH  Google Scholar 

  5. Derawi MO, Nickel C, Bours P, Busch C (2010) Unobtrusive user-authentication on mobile phones using biometric gait recognition

  6. Dietterich TG, Bakiri G (1991) Error-correcting output codes: a general method for improving multiclass inductive learning programs. In: Proceedings of AAAI-91, AAAI Press, Anaheim, pp 572–577

  7. Freund Y, Schapire RE (1999) A short introduction to boosting

  8. Gafurov D, Snekkenes E, Buvarp T (2006) Robustness of biometric gait authentication against impersonation attack. In: Meersman R, Tari Z, Herrero P (eds) On the move to meaningful internet systems 2006: OTM 2006 workshops, lecture notes in computer science, vol 4277. Springer, Berlin/Heidelberg, pp 479–488

  9. Lester J, Choudhury T, Borriello G (2006) A practical approach to recognizing physical activities. In: Proceedings of pervasive, pp 1–16

  10. Mannini A, Sabatini AM (2010) Machine learning methods for classifying human physical activity from on-body accelerometers. Sensors 10(2):1154–1175

    Article  Google Scholar 

  11. Mäntyjärvi J, Lindholm M, Vildjiounaite E, marja Mäkelä S, Ailisto H (2005) Identifying users of portable devices from gait pattern with accelerometers. In: IEEE international conference on acoustics, speech, and signal processing

  12. Preparata FP, Shamos MI (1985) Computational geometry: an introduction. Springer, New York

    Google Scholar 

  13. Ravi N, Nikhil D, Mysore P, Littman ML (2005) Activity recognition from accelerometer data. In: Proceedings of the seventeenth conference on innovative applications of artificial intelligence (IAAI). AAAI Press, California, pp 1541–1546

  14. Sprott JC (2003) Chaos and time-series analysis. Oxford University Press, Oxford

    MATH  Google Scholar 

  15. Tax DMJ, Juszczak P (2002) Kernel whitening for one-class classification

  16. Terrier P, Schutz Y (2003) Variability of gait patterns during unconstrained walking assessed by satellite positioning (GPS). Eur J Appl Physiol 90(5–6):554–561

    Article  Google Scholar 

  17. Vildjiounaite E, Makela SM, Lindholm M, Kyllonen V, Ailisto H (2007) Increasing security of mobile devices by decreasing user effort in verification. IEEE Comput Soc 80

Download references

Acknowledgments

This work is partially supported by a research grant from projects TIN2009-14404-C02, La Marato de TV3 082131 and CONSOLIDER (CSD2007-00018).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pierluigi Casale.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Casale, P., Pujol, O. & Radeva, P. Personalization and user verification in wearable systems using biometric walking patterns. Pers Ubiquit Comput 16, 563–580 (2012). https://doi.org/10.1007/s00779-011-0415-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-011-0415-z

Keywords

Navigation