Security and Privacy Enhanced Gait Authentication with Random Representation Learning and Digital Lockers

08/05/2021
by   Lam Tran, et al.
0

Gait data captured by inertial sensors have demonstrated promising results on user authentication. However, most existing approaches stored the enrolled gait pattern insecurely for matching with the validating pattern, thus, posed critical security and privacy issues. In this study, we present a gait cryptosystem that generates from gait data the random key for user authentication, meanwhile, secures the gait pattern. First, we propose a revocable and random binary string extraction method using a deep neural network followed by feature-wise binarization. A novel loss function for network optimization is also designed, to tackle not only the intrauser stability but also the inter-user randomness. Second, we propose a new biometric key generation scheme, namely Irreversible Error Correct and Obfuscate (IECO), improved from the Error Correct and Obfuscate (ECO) scheme, to securely generate from the binary string the random and irreversible key. The model was evaluated with two benchmark datasets as OU-ISIR and whuGAIT. We showed that our model could generate the key of 139 bits from 5-second data sequence with zero False Acceptance Rate (FAR) and False Rejection Rate (FRR) smaller than 5.441 that our model was secure against existing attacks on biometric template protection, and fulfilled irreversibility and unlinkability.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/29/2013

A Novel Scheme for Generating Secure Face Templates Using BDA

In identity management system, frequently used biometric recognition sys...
research
08/27/2021

EarGate: Gait-based User Identification with In-ear Microphones

Human gait is a widely used biometric trait for user identification and ...
research
05/18/2022

Accuracy Enhancement for Ear Acoustic Authentication Using Between-class Features

In existing biometric authentication methods, the user must perform an a...
research
10/02/2022

iCTGAN–An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems

A recent study showed that commonly (vanilla) studied implementations of...
research
09/21/2023

Dictionary Attack on IMU-based Gait Authentication

We present a novel adversarial model for authentication systems that use...
research
12/17/2020

Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication

In this work, we examine the impact of Treadmill Assisted Gait Spoofing ...
research
01/12/2010

A New Method to Extract Dorsal Hand Vein Pattern using Quadratic Inference Function

Among all biometric, dorsal hand vein pattern is attracting the attentio...

Please sign up or login with your details

Forgot password? Click here to reset