Abstract
An authentication system using a chair with sensors attached is described. Pressure distribution (hipprint) measured by network-connected sensors on the chair is used for identifying the person sitting on the chair. Hipprint information is not sufficient for maintaining a high level of security but is sufficient for providing personalized services such as automatic log-in at home or in a small office. In experiments, we obtained correct identification rates of 99.6% for five people and 93.2% for ten people. A false rejection rate of 9.2% and a false acceptance rate of 1.9% were achieved using another group of 20 people. The results also showed that changes in hipprints can be used to estimate what the person sitting on the chair is doing, for example, using a mouse or leaning back.
Similar content being viewed by others
Notes
Japanese young girls are very polite, especially in the first meeting. So, they sat neatly, all alike.
References
Coen MH (1998) Design principles for intelligent environments. In: Proceedings of 1998 national conference on artificial intelligence (AAAI-98), pp 547–554
Hosokawa T, Kudo M, Nonaka H, Toyama J (2008) Soft authentication using an infrared ceiling sensor network. Pattern Anal Applic. doi:10.1007/s10044-008-0119-9
Mota S, Picard RW (2003) Automated posture analysis for detecting learner’s interest level. In: Proceedings of workshop on computer vision and pattern recognition for human–computer interaction (CVPR HCI), pp 1–6
Tan HZ, Slivovsky LA, Pentland A (2001) A sensing chair using pressure distribution sensors. IEEE/ASME Trans Mechatron 6:261–268
Murase M, Kijima R, Ojika T (1998) A development of walk-navi with sensing shoes. In: Proceedings of 14th symposium on human interface, pp 131–136
Iwashita K, Toyama A, Hashimoto N, Hasegawa S, Sato M (2004) Development of locomotion interface based on step-in-place movement. IEICE Trans Fundam Electron Commun Comput Sci J87-A-1:87–95 (In Japanese)
Chang C-C, Lin C-J (2001) LIBSVM: a library for support vector machines. Software available at http://www.csie.ntu.edu.tw/∼cjlin/libsvm
Fan R-E, Chen P-H, Lin C-J (2005) Working set selection using second order information for training support vector machines. J Mach Learn Res 6:1889–1918
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yamada, M., Kamiya, K., Kudo, M. et al. Soft authentication and behavior analysis using a chair with sensors attached: hipprint authentication. Pattern Anal Applic 12, 251–260 (2009). https://doi.org/10.1007/s10044-008-0124-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10044-008-0124-z