Combining body movement information and foot contact forces to recognize human identity by analyzing walking method

Number of pages: 66 File Format: word File Code: 30911
Year: 2014 University Degree: Master's degree Category: Electronic Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Combining body movement information and foot contact forces to recognize human identity by analyzing walking method

    Dissertation for M.Sc degree

    Trend: relationship between human, machine, computer

    Abstract

    Today, with the rapid changes in technology, the level of security of individuals and organizations has also decreased and this security is attacked by malicious individuals and It has been damaged. In the meantime, the increasing progress of biometric methods has made tremendous achievements in the fields of military, commercial and financial security. Biometrics refers to the technology of measuring and processing the characteristics of people's bodies for identification purposes. A person's gait is one of the physical characteristics of a person's body, which is used as a biometric in identity recognition systems today. All existing methods based on walking for identity recognition analyze the images taken of a person while walking. In this thesis, footprints are introduced as a new biometric method. This biometric is based on the fact that people's footprints differ in some ways when they walk. The distinguishing features of people in terms of footprints can be the size and angle of the foot while walking. 12 footprint features were selected to identify people from each other, and a three-layer perceptron neural network was trained to recognize people based on these features. It was shown that by using these 12 characteristics, people can be identified and distinguished from each other with complete accuracy.

    Man has needed to distinguish friend from enemy in order to survive, and identity recognition was and still is a vital thing for him, therefore, today, attempts have been made to mechanize identification or identity recognition systems. These developments are proof of the need of society and the world. A need in which progress reduces violations, increases security, speeds up daily affairs, and so on. has been In the past, fingerprint and facial recognition procedures were used to identify criminals, but now more sophisticated methods have been developed for this purpose. Human gait, which is a new biometric with the aim of identifying people while walking, is increasingly playing an important role in video surveillance applications. We use basic security equipment every day. We do, for example, we have a key to enter our house, we need a username and password to use a computer, and when we use a bank teller, we need both a card and a password. It is very annoying to misplace our key, forget our password and lose our debit card. But it is worse when someone uses them instead of us, just as if we used them ourselves. This is at a time when, with rapid changes in technology, the security factor of individuals and organizations has also decreased, and this security has been attacked by profiteers and vandals. Therefore, according to the rapid development of computer networks and communications, the need for reliable methods of verifying people's identity is felt more and more. The common methods that are used today to identify people's identity are based on two things, things that we own, such as house keys and credit cards, which if they are lost, others can use them under certain conditions, or Things that we know about, such as username and password, if they are simple, they can be easily obtained by guessing or testing, and if they are very complicated, it will be difficult to hand them over and we will be forced to go somewhere. Let's write them down. In this case, there is a possibility of them being lost or stolen. Now let's imagine that the body is converted into a key or password. Physiological characteristics of the body (such as face and fingerprints) and habits and behaviors (such as handwriting and voice) and the way of walking are so complicated that they increase the security factor and we certainly do not leave them or not. We forget. In fact, biometric systems use the human to confirm the identity.

    Many methods have been presented to recognize the identity of people from walking in video images, which can be classified into two general categories: statistical approaches and model-based approaches, the presented approaches include three general phases. Pre-processing, feature extraction, recognition.

    Biometrics is an important and automatic method of identifying people based on physiological or behavioral characteristics. Walking recognition in biometric technology has become an important and safe identification and personal verification solutions.

    Problem statement:

    In biometric science, body parts are considered to be used. It should be easier and less harmful than them.Each of the used methods have weak points and strengths that can be eliminated by combining them with other security methods. No one wants to find out that the balance is empty when checking their balance through online banking networks. guess and by understanding our number in the bank, they can easily enter our account using the bank's online network and empty our balance. Usually, the majority of people in a society experience such problems. Due to the significant growth rate of world trade and the importance of trade, it is not possible to use old manual or present systems for a long time, on the other hand, using these old methods causes waste of energy and Time has increased and less work is done in a long period of time. Therefore, in business, the need for electronic commerce is felt, and the very important issue that is being considered today is the issue of security. By using reliable methods, biometrics can be the answer to such problems to a large extent. Biometric science is not only used in electronic commerce, but also in many other cases. For example, in important and sensitive laboratories or the entrances of buildings that we are sensitive about entering and exiting, or we can use the locks on which the keypad is installed and pass to the people concerned by the name and password. Let's let them use it when they log in, but this method is also not very reliable, it won't be worth it if you lose the password. But when it is caused by the finger or the palm of the hand or the way of walking. If it is used for identification and permission to enter, these problems will not arise again.

    Many solutions have been proposed to solve these problems, such as identity recognition through fingerprints, identity recognition through eyes, identity recognition through Face, identity recognition through the iris, some of which we will explain in the next chapters. In this thesis, we will introduce a new method to identify the identity of people. Our idea is to use the method of identifying a person by walking, we want to identify his identity by using specific footprints while walking to solve the problems and issues that we discussed above to a large extent. The purpose of this research is to increase the security factor in many public places, government agencies and most places that need more and higher security. We control the entry and exit of people by using the term "footprints" of people, and we allow the entry and exit of people whose details are recorded in our database.

    Research hypotheses:

    The way different people walk is different.

    The forces that people apply to the ground while walking are different.

    The angle between the legs and the size of different parts of the soles are different. It is.

    The identity of a person can be recognized from the way of walking and the size and angle of different points of the soles of the feet.

    1-3-1- A brief overview of the history of biometrics:

    Scientific texts on the quantitative measurement of human behavior and habits and external characteristics. For identification purposes, it goes back to the 1870s and Alphonse Bertillon's measurement system. In America, the Bertillon system was used to measure the body, including measuring the diameter of the skull and the length of the arm and leg, to identify prisoners until the 1920s. Henry Folds, William Hershler, and Sir Francis. Galton proposed quantitative identification through fingerprints and face measurements in 1880s. The development of digital signal processing techniques in the 1960s quickly led to work in the field of human automatic recognition. Voice and fingerprint recognition systems were among the first in this field. The potential of using this technology for increased control in high security access, personal locks and financial transactions was recognized in the early 1960s. The 1970s were the years of development and expansion of the use of hand geometry systems and the beginning of large-scale testing and increasing interest in the use of these personal automatic identification technologies by the government. Signature verification systems were developed in the 80s and then face recognition systems and iris recognition systems were developed in the 90s.

    In recent years in Iran as well. Activities in the field of biometric technology are being formed in such a way that the first strategic meeting of biometric technology in the country was held in June 2018 by the Office of Technology Cooperation of the Presidency of the Republic and a group of related institutions. It was held.

  • Contents & References of Combining body movement information and foot contact forces to recognize human identity by analyzing walking method

    List:

    Table of Contents

    Chapter One: Research Overview

    Introduction

    Problem Statement

    Research Hypotheses

    1-3-1 Overview of Biometric History

    Chapter Two: Theoretical Foundations and Research Background

    Methods for identifying people from Information

    2-1-1- Identity recognition through fingerprint

    2-1-2- Identity recognition through eyes

    2-1-3- Identity recognition through face

    2-1-4- Identity recognition Identity through speech

    2-1-5- Identity recognition through signature

    Identifying people through walking

    2-2-1- Model-based method

    2-2-2- Appearance-based method

    Chapter three: Materials and methods

    1-3-Collection Data

    3-3-1- Schematic model

    3-1-2- How SPI sensor works

    3-2- Feature extraction

    3-2-1- Measurement of variables

    3-2-2- Number of variables

    3-2-3 Statistical population

    3-3- Classification

    3-3-1- Neural networks Artificial

    3-3-2-Perceptron learning algorithm

    3-3-3-Neural network design in MATLAB

    Chapter four

    Identity recognition with trained network

    Conclusion

    Future work

              Resources

    List of tables

    Page

    3-1 Obtained data A

    38

    3-2 Validation data

    39

    3-3 Obtained data B

    443-4 Evaluation data

    4-1 Network output per rows of table 3-2

    Source:

    [1] M. Bamberg, S. James. "Gait analysis using a shoe-integrated wireless sensor system." Information Technology in Biomedicine, IEEE Transactions on 12.4 (2008): 413-423. [2] Yu, Hui. "A walking monitoring shoe system for simultaneous plantar-force measurement and gait-phase detection." Advanced Intelligent Mechatronics (AIM), 2010 IEEE/ASME International Conference on. IEEE, 2010. [3Rong.Z, Vogler.C, and Metaxas.D. "Human gait recognition." Computer Vision and Pattern Recognition Workshop, 2004. CVPRW'04. Conference on. IEEE, 2004. [4] Liang.w. "Fusion of static and dynamic body biometrics for gait recognition." Circuits and Systems for Video Technology, IEEE Transactions on 14.2 (2004): 149-158. "Model-based human gait recognition using leg and arm movements." Engineering applications of artificial intelligence 23.8 (2010): 1237-1246. [6] Davrondzhon.g. "A survey of biometric gait recognition: Approaches, security and challenges." Annual Norwegian Computer Science Conference. 2007.

     

    [7] Chan-Su L, Elgammal.A, Gait Style and Gait Content: Bilinear Models for Gait Recognition Using Gait Re-sampling, 2010.

     

    [8] Behnaz Abdolahi and Nilofar Qaysari, Human identification based on the way of walking with the help of dynamic texture descriptor, intelligent systems in electrical engineering, fourth year, Issue Two, Summer 92

     

    [9] Moustakas. K, Tzovaras.D, and Stavropoulos.G. "Gait recognition using geometric features and soft biometrics." Signal Processing Letters, IEEE 17.4 (2010): 367-370. [10] Sudha, L. R., and Dr. Rao. Bhavani. "Biometric Authorization System using Gait Biometry." arXiv preprint arXiv:1108.6294 (2011).

     

    .

     

     

     

    [11] Weijun.T., "Gait analysis using wearable sensors." Sensors 12.2 (2012): 2255-2283.

    [12] Ali Amiri, Mahmoud Fathi, Rauf Taheri, Presenting a new approach to recognize the identity of people from walking based on the modified DTW algorithm and fuzzy sets 26 Bahman 1385

    [13] Hafner.V, and Bachmann.F. "Human-humanoid walking gait recognition." Humanoid Robots, 2008. Humanoids 2008. 8th IEEE-RAS International Conference on. IEEE, 2008.

     

     

    [14] Ju.H and Bhanu.B,” Individual Recognition Using Gait Energy Image,” PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 28, NO. 2, FEBRUARY

    [15] Ali Amiri, Mahmoud Fathi, Kamal Kayani, Nasim Homayouni, "identification of people from walking based on clustering algorithm based on genetic algorithms and modified DTW algorithm," 12th International Conference of the Iranian Computer Association, Shahid Beheshti University, Faculty of Electrical and Computer Engineering, Tehran, Iran, 1 to 3 Isfand 13

    [16] Liang.W., "Silhouette analysis-based gait recognition for human identification." Pattern Analysis and Machine Intelligence, IEEE Transactions on 25.12 (2003): 1505-1518.

    [17] Shervin Rahimzadeh Arashlo, Alireza Ahmadifard and Hossein Maravi, "Individual identification using time and frequency domain features from walking model," Fuzzy Systems Association of Ferdowsi University of Mashhad, August 29-31, 2007.

    [18] Gholamreza Chamankhah, Saeed Meshghini, "Providing an optimal method for recognizing the identity of people through walking biometrics," 9th Iran International Cipher Conference, September 2013.

    [19] Muzhir Sh. Al-Ani, Isra H. Al-Ani "Gait Recognition Based Improved Histogram", Journal of Emerging Trends in Computing and Information Sciences, VOL. 2, NO. 12, December 2011.

     

    [20] Félez.M, R, and Xiang.T., "Gait recognition by ranking." Computer Vision–ECCV 2012. Springer Berlin Heidelberg, 2012. 328-341.

    [21] Mahdia Karimi Lakhani, Hamid Behnam, "Identifying people from the way they walk using an algorithm", LLE Journal of Electrical Engineering of Tabriz University, Volume 43, Vol. 43, No. 1, 2012

     

    [22] Esmail Ebrahimi, Hassan Saeedi, "Investigation of leg pressure distribution during walking in adults," Rehabilitation research paper, 10th edition, issue 2, serial number 38, summer 88

    [23] Katiyar.R, K.P.Vinay, K.V. Arya, "A Study on Existing Gait Biometrics Approaches and Challenges," International Journal of Computer Science Issues, January 2013, Vol. 10, Issue 1, No 1.

    [ 24]A. Kale, A.N. Rajagopalan, N. Cuntoor1 and V Kr¨uger, "Gait-based Recognition of Humans Using Continuous HMMs," Proceedings of the Fifth IEEE International Conference on Automatic Face and Gesture Recognition (FGR.02), 2002.

     

    [25] Tie.C, K Ong Goh.M, Beng Jin Teoh.A "Gait Analysis and Recognition Using Multi-Views Gait Database." International Journal of Digital Information and Wireless Communications (IJDIWC) 1.2 (2011): 466-478.

    [26] Phillips, P. Jonathon,. "The gait identification challenge problem: data sets and baseline algorithm." Pattern Recognition, 2002. Proceedings. 16th International Conference on Vol. 1. IEEE, 2002.

Combining body movement information and foot contact forces to recognize human identity by analyzing walking method