Advertisement

Arm Swing Identification Method with Template Update for Long Term Stability

  • Kenji Matsuo
  • Fuminori Okumura
  • Masayuki Hashimoto
  • Shigeyuki Sakazawa
  • Yoshinori Hatori
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4642)

Abstract

This paper proposes a novel method for biometric identification, based on arm swing motions with a template update in order to improve long term stability. In our previous work, we studied arm swing identification and proposed a basic method to realize a personal identification function on mobile terminals. The method compares the acceleration signals of arm swing motion as individual characteristics, with the tolerant similarity measurement between two arm swing motions via DP-matching, which enables users to unlock a mobile terminal simply by swinging it. However, the method has a problem with long term stability. In other words, the arm swing motions of identical individuals tend to fluctuate among every trial. Furthermore, the difference between the enrolled and trial motions increases over time. Therefore in this paper, we propose an update approach to the enrollment template for DP-matching to solve this problem. We employ an efficient adaptive update method using a minimum route determination algorithm in DP-matching. Identification experiments involving 12 persons over 6 weeks confirm the proposed method achieves a superior equal error rate of 4.0% than the conventional method, which has an equal error rate of 14.7%.

Keywords

behavior identification template update arm swing motion cellular phone security DP-matching 

References

  1. 1.
    Kato, T., Kawai, H.: A text-prompted speaker verification system implemented on a cellular phone and a mobile terminal. In: Proc. of ESCA ISCA, pp. 945–948 (2006)Google Scholar
  2. 2.
    Hangai, S., Yamanaka, S., Hamamoto, T.: On-line signature verification based on altitude and direction of pen movement. In: Proc. of IEEE ICME, vol. 1, pp. 489–492 (2000)Google Scholar
  3. 3.
    Patel, S.N., Pierce, J.S., Abowd, G.D.: A Gesture-based Authentication Scheme for Untrusted Public Terminal. In: Proc. of UIST, pp. 157–160 (2004)Google Scholar
  4. 4.
    Okumura, F., Kubota, A., Hatori, Y., Matsuo, K., Hashimoto, M., Koike, A.: A study on biometric identification based on arm sweep action with acceleration sensor. In: Proc. of IEEE ISPACS, pp. 219–222 (2006)Google Scholar
  5. 5.
    Uludag, U., Ross, A., Jain, A.K.: Biometric template selection and update: case study in fingerprints. Pattern Recognition 37(7), 1533–1542 (2004)CrossRefGoogle Scholar
  6. 6.
    Mansfield, A.J., Wayman, J.L.: Best practices in testing and reporting performance of biometric devices version 2.01. NPL Report CMSC 14/02 (August 2002)Google Scholar
  7. 7.
    Shahraray, B., Anderson, D.J.: Optimal estimation of contour properties by cross-validated regularization. IEEE Trans. on PAMI 11(6), 600–610 (1989)Google Scholar
  8. 8.
    Krzanowski, W.J.: Cross-validation in principal component analysis. Biometrics 43, 575–584 (1987)CrossRefMathSciNetGoogle Scholar
  9. 9.
    Jain, A.K., Bolle, R., Pankanti, S.: Biometrics: Personal identification in network society. Kluwer Academic Publishers, Dordrecht (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Kenji Matsuo
    • 1
  • Fuminori Okumura
    • 2
  • Masayuki Hashimoto
    • 1
  • Shigeyuki Sakazawa
    • 1
  • Yoshinori Hatori
    • 2
  1. 1.KDDI R&D Laboratories Inc., Ohara 2-1-15, Fujimino-shi, Saitama, 356-8502Japan
  2. 2.Tokyo Institute of Technology, Nagatsuta 4259, Midori-ku, Yokohama-shi, 226-8502Japan

Personalised recommendations