Hand Gesture Authentication Using Depth Camera

  • Jinghao ZhaoEmail author
  • Jiro Tanaka
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 887)


Nowadays humans are concerned more about their privacy because traditional text password becomes weaker to defend from various attacks. Meanwhile, somatosensory become popular, which makes gesture authentication become possible. This research tries to use humans dynamic hand gesture to make an authentication system, which should have low limitation and be natural. In this paper, we describe a depth camera based dynamic hand gesture authentication method, and generate a template updating mechanism for the system. In the case of simple gesture, the average accuracy is 91.38%, and in the case of complicated gesture, the average accuracy is 95.21%, with 1.65% false acceptance rate. We have also evaluated the system with template updated mechanism.


Gesture authentication Three-dimensional hand gesture Depth camera 


  1. 1.
    Melicher, W., Kurilova, D., Segreti, S.M., Kalvani, P., Shay, R., Ur, B., Bauer, L., Christin, N., Cranor, L.F., Mazurek, M.L.: Usability and security of text passwords on mobile devices. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 527–539. ACM (2016)Google Scholar
  2. 2.
    Aviv, A.J., Gibson, K.L., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. Woot 10, 1–7 (2010)Google Scholar
  3. 3.
    Lashkari, A.H., Farmand, S., Zakaria, D., Bin, O., Saleh, D., et al.: Shoulder surfing attack in graphical password authentication. arXiv preprint arXiv:0912.0951 (2009)
  4. 4.
    Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)CrossRefGoogle Scholar
  5. 5.
    Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer Science & Business Media (2009)Google Scholar
  6. 6.
    Kratz, S., Aumi, M.T.I.: Airauth: a biometric authentication system using in-air hand gestures. In: CHI 2014 Extended Abstracts on Human Factors in Computing Systems, pp. 499–502. ACM (2014)Google Scholar
  7. 7.
    Chahar, A., Yadav, S., Nigam, I., Singh, R., Vatsa, M.: A leap password based verification system. In: 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (2015)Google Scholar
  8. 8.
    Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)CrossRefGoogle Scholar
  9. 9.
    Aumi, M.T.I., Kratz, S.: Airauth: evaluating in-air hand gestures for authentication. In: Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices & Services, pp. 309–318. ACM (2014)Google Scholar
  10. 10.
    Yang, Y., Clark, G.D., Lindqvist, J., Oulasvirta, A.: Free-form gesture authentication in the wild. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 3722–3735. ACM (2016)Google Scholar
  11. 11.
    Faragher, R.: Understanding the basis of the Kalman filter via a simple and intuitive derivation [lecture notes]. IEEE Signal Process. Mag. 29(5), 128–132 (2012)CrossRefGoogle Scholar
  12. 12.
    Welch, G., Bishop, G.: An introduction to the Kalman filter (1995)Google Scholar
  13. 13.
    Mannini, A., Sabatini, A.M.: Machine learning methods for classifying human physical activity from on-body accelerometers. Sensors 10(2), 1154–1175 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Graduate school of IPSWaseda UniversityKitakyushuJapan

Personalised recommendations