Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.6.1405

A Study on Estimation of Gait Acceleration Signal Using Gait Video Signal in Wearable Device  

Lee, Duhyeong (Graduate School for Information Security, Korea University)
Choi, Wonsuk (Graduate School for Information Security, Korea University)
Lee, Dong Hoon (Graduate School for Information Security, Korea University)
Abstract
Researches that apply the acceleration signal due to user's gait measured at the wearable device to the authentication technology are being introduced recently. The gait acceleration signal based authentication technologies introduced so far have assumed that an attacker can obtain a user's gait acceleration signal only by attaching accelerometer directly to user's body. And the practical attack method for gait acceleration signal based authentication technology is mimic attack and it uses a person whose physical condition is similar to the victim or identifies the gait characteristics through the video of the gait of the victim. However, mimic attack is not effective and attack success rate is also very low, so it is not considered a serious threat. In this paper, we propose Video Gait attack as a new attack method for gait acceleration signal based authentication technology. It is possible to know the position of the wearable device from the user's gait video signal and generate a signal that is very similar to the accelerometer's signal using dynamic equation. We compare the user's gait acceleration signal and the signal that is calculated from video of user's gait and dynamic equation with experiment data collected from eight subjects.
Keywords
Biometric Authentication; Gait signal; Spoofing Attack;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 G. Revadigar, C. Javali, H.J. Asghar, K.B. Rasmussen, and S. Jha, "Mobility independent secret key generation for wearable health-care devices," Proceedings of the 10th EAI International Conference on Body Area Networks, pp. 294-300, Sep. 2015.
2 C.L. Hsu, T.H. Chuang, and T.W. Lin, "End-to-end authenticated key exchange agreement for wearable devices in IoT environments." 2017 IEEE Great Lakes Biomedical Conference, pp. 1-1, Apr. 2017.
3 Y. Zeng, A. Pande, J. Zhu, and P. Mohapatra, "WearIA: Wearable device implicit authentication based on activity information", 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks, pp. 1-9, Jun. 2017.
4 S.Y. Chun, J.H. Kang, H. Kim, C. Lee, I. Oakley, and S.P. Kim, "ECG based user authentication for wearable devices using short time Fourier transform," 2016 39th International Conference on Telecommunications and Signal Processing, pp. 656-659, Jun. 2016.
5 R. Liu, C. Cornelius, R. Rawassizadeh, R. Peterson, and D. Kotz, "Poster: Vocal Resonance as a Passive Biometric," Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, pp. 160-160, Jun. 2017.
6 P. Meharia and D.P. Agrawal, "The human key: Identification and authentication in wearable devices using gait," Journal of Information Privacy and Security, vol. 11, no. 2, pp. 80-96, Apr. 2015.   DOI
7 S. Eberz, N. Paoletti, M. Roeschlin, M. Kwiatkowska, I. Martinovic, and A. Patane, "Broken hearted: How to attack ECG biometrics," Network and Distributed System Security Symposium 2017, Feb. 2017
8 S. Sprager, R. Trobec, and M.B. Juric, "Feasibility of biometric authentication using wearable ECG body sensor based on higher-order statistics," 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics, pp. 264-269, May. 2017.
9 M. Rostami, A. Juels, and F. Koushanfar, "Heart-to-heart (H2H): authentication for implanted medical devices," Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securitym, pp. 1099-1112, Nov. 2013.
10 F. Xu, Z. Qin, C.C. Tan, B. Wang, and Q. Li, "IMDGuard: Securing implantable medical devices with the external wearable guardian," IEEE INFOCOM 2011, pp. 1862-1870, Apr. 2011.
11 M. Rushanan, A.D. Rubin, D.F. Kune, and C.M. Swanson, "SoK: Security and privacy in implantable medical devices and body area networks," 2014 IEEE Symposium on Security and Privacy, pp. 524-539, May. 2014.
12 Quang Do, Ben Martini, and K.K.R. Choo, "Is the data on your wearable device secure? An Android Wear smartwatch case study," Software: Practice and Experience, vol. 47, no. 3, pp. 391-403, Mar. 2017.   DOI
13 Gafurov Davrondzhon, Einar Snekkenes, and Tor Erik Buvarp, "Robustness of biometric gait authentication against impersonation attack," OTM Workshops 2006, LNCS 4277, pp. 479-488, 2006.
14 Gartner, Forecast: Wearable Electronic Devices, Worldwide, 2017, Aug. 2017.
15 F.P. Wieringa, N. Broers, J.P. Kooman, F.M. Van Der Sande, and C. Van Hoof, "Wearable sensors: Can they benefit patients with chronic kidney disease?," Expert Review of Medical Devices, vol. 14, no. 7, pp. 505-519, Jun. 2017.   DOI
16 A. Bianchi and I. Oakley, "Wearable authentication: Trends and opportunities," it-Information Technology, vol. 58, no. 5, pp. 255-262, Oct. 2016.   DOI
17 Gafurov Davrondzhon, Einar Snekkenes, and Patrick Bours, "Spoof attacks on gait authentication system," IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 491-502, Sept. 2007.   DOI
18 Gafurov Davrondzhon, Kirsi Helkala, and Torkjel Sondrol, "Biometric Gait Authentication Using Accelerometer Sensor," JORNAL OF COMPUTERS, vol. 1, no. 7, pp. 51-59, Oct. 2006.
19 M. Poh, D.J. McDuff, and R.W. Picard, "Advancements in noncontact, multiparameter physiological measurements using a webcam," IEEE Transactions on Biomedical Engineering, vol. 58, no. 1, pp. 7-11, Jan. 2011.   DOI
20 L. Zhang, K. Xing, Z. Xu, J. Wang, S. Zhang, and J. Xu, "Human recognizer: an ECG based live biometric fingerprint," Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing 2016, pp. 21-27, Jul. 2016.
21 S. Kwon, H. Kim, and K.S. Park, "Validation of heart rate extraction using video imaging on a built-in camera system of a smartphone," 34th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 2174-2177, Aug. 2012,
22 H. Wu, M. Rubinstein, E. Shih, J. Guttag, F. Durand, and W. Freeman, "Eulerian video magnification for revealing subtle changes in the world," ACM Transaction on Graphics, vol. 31, no. 4, Jul. 2012.
23 A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietikainen, J. Bustard, and M. Nixon, "Can gait biometrics be spoofed?," 2012 21st International Conference on Pattern Recognition, pp. 3280-3283, Nov. 2012.
24 S.J. Kang, S.Y. Lee, H.I. Cho, and H. Park, "ECG Authentication System Design Based on Signal Analysis in Mobile and Wearable Devices," IEEE Signal Processing Letters, vol. 23, no. 6, pp. 805-808, Jun. 2016.   DOI
25 W. Xu, G. Lan, Q. Lin, S. Khalifa, N. Bergmann, M. Hassan, and W. Hu, "KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting," NDSS Symposium 2017, Feb. 2017.
26 W. Xu, C. Javali, G. Revadigar, C. Luo, N. Bergmann, and W. Hu, "Gait-Key: A Gait-Based Shared Secret Key Generation Protocol for Wearable Devices," ACM Transactions on Sensor Networks, vol. 13, no. 1, Jan. 2017.
27 W. Xu, Y. Shen, Y. Zhang, N. Bergmann, and W. Hu, "Gait-watch: A context-aware authentication system for smart watch based on gait recognition," 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation, pp. 59-70, Apr. 2017.
28 B.B. Mjaaland, P. Bours, and D. Gligoroski, "Walk the Walk: attacking gait biometrics by imitation," 13th international conference on Information security, pp. 361-380, Oct. 2010.
29 T.T. Ngo, Y. Makihara, H. Nagahara, Y. Mukaigawa, and Y. Yagi, "The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication," Pattern Recognition, vol. 47, no. 1, pp. 228-237, Jan. 2014.   DOI
30 R. Kumar, V.V. Phoha, and A. Jain, "Treadmill attack on gait-based authentication systems," 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, pp. 1-7, Sep. 2015.
31 M. Muaaz and R. Mayrhofer, "Smartphone-based Gait Recognition: From Authentication to Imitation," IEEE Transactions on Mobile Computing, vol. 16, no. 11, Nov. 2017.
32 T. Hoang, T.D. Nguyen, C. Luong, S. Do, and D. Choi, "Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer," Journal of Information Processing Systems, vol. 9, no. 2, pp. 333-348, Jun. 2013.   DOI
33 C.L. Vaughan, B.L. Davis, and C.O. Jeremy, Dynamics of Human Gait, Volume 2, Human Kinetics Publishers, 1992.
34 Minhang Bao, Analysis and design principles of MEMS devices, 1st Ed., Elsevier, Apr. 2005.
35 R.C. Hibbeler, Engineering Mechanics: Statics & Dynamics, 13th Ed., Pearson Education, Apr. 2001.
36 A.H. Johnston and G.M. Weiss, "Smartwatch-based biometric gait recognition," 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, pp. 1-6, Sep. 2015.
37 Z. Sitova, J. Sedenka, Q. Yang, G. Peng, G. Zhou, P. Gasti, and K.S. Balagani, "HMOG: New behavioral biometric features for continuous authentication of smartphone users," IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 877-892, May. 2016.   DOI
38 N. Al-Naffakh, N. Clarke, P. Haskell-Dowland, and F. Li, "A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches," International Journal for Information Security Research, vol. 6, no. 3. pp. 691-700, Sep. 2016.
39 G.M. Weiss, J.L. Timko, C.M. Gallagher, K. Yoneda, and A.J. Schreiber, "Smartwatch-based activity recognition: A machine learning approach," 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics, pp. 426-429, Feb. 2016.
40 https://www.fitbit.com/kr/home
41 D. Schurmann, A. Brusch, S. Sigg, and L. Wolf, "BANDANA-Body area network device-to-device authentication using natural gAit," 2017 IEEE International Conference on Pervasive Computing and Communications, pp. 190-196, Mar. 2017.