PERSON IDENTIFICATION AND IMPOSTER DETECTION USING FOOTFALL GENERATED SEISMIC SIGNALS
20210182603 · 2021-06-17
Inventors
Cpc classification
G06N7/01
PHYSICS
G06F18/214
PHYSICS
G06F18/2321
PHYSICS
G06F18/213
PHYSICS
International classification
Abstract
A smart device, biometric authentication system and a corresponding method thereof for person identification and imposter detection has been disclosed. The method comprises detection and extraction of seismic signals generated from corresponding footfalls, by means of unsupervised learning based detection and extraction module (USLEEM) and detection and identification of imposter and/or registered users respectively by means of an identification module.
Claims
1. A method for person identification and imposter detection, said method comprising steps of: detection and extraction of seismic signals generated from corresponding footfalls, by means of unsupervised learning based detection and extraction module (USLEEM); and detection and identification of imposter and/or registered users respectively by means of an identification module.
2. The method as claimed in claim 1, wherein the said step of detection and extraction of seismic signals generated from corresponding footfalls comprising at least one training phase including: splitting, each of said seismic signals, into N equal segments; extracting, feature vectors (FE-I) corresponding to time domain and frequency domain features from each of said segment of the N segments; clustering each of the said feature vectors into a clustered event so as to form at least one trained model of USLEEM; storing of the said trained model.
3. The method as claimed in claim 1, wherein said step of detection and extraction of seismic signals generated from corresponding footfalls further comprising at least one live phase including: splitting, each of said seismic signals, into N equal segments; extracting, feature vectors (FE-I) corresponding to time domain and frequency domain features from each of said segment of the N segments; and detecting footfalls from the extracted featured vectors (FE-I) thereafter feeding it to the trained model.
4. The method as claimed in claim 3, wherein the step of detection and identification of imposter and/or registered users respectively by means of an identification module, said method steps including: detection of at least one imposter, by means of One—Class machine learning model when feature vectors (FE-II) obtained from the extracted footfalls as claimed in claim 3 are fed to the One-Class model; and identification of registered users, from feature vectors (FE-II) obtained from the extracted footfalls by means of multi-class machine learning model.
5. The method as claimed in claim 1, wherein Gaussian Mixture Model, GMM, clustering facilitates clustering each of the said feature vectors into a clustered event.
6. The method as claimed in claim 5, wherein each cluster is parameterized by a set of p, p, and I and the method further comprises classifying said clustered event into a footfall event and noise by
7. The method as claimed in claim 5, wherein during the live phase, each of the N segments of the footfall generated seismic signals are classified by,
8. A smart device for person identification and imposter detection configured to perform the method steps as claimed in claim 1, said smart device comprising: at least one sensing module configured to detect a plurality of seismic signals generated from corresponding footfall of a person to generate a seismic event; an analog-to-digital converter module configured to convert detected analog seismic signals into digital signals, an event extraction module configured to: split a seismic signal, of the plurality of said seismic signals, into N equal segments, and extract, vectors corresponding to time domain and frequency domain features from each said segment of the N segments; cluster each of the said vectors into a clustered event; store said trained model; and an identification module configured to identify either an imposter or a registered person.
9. A biometric authentication system for person identification and imposter detection, said system comprising: an array of smart devices as claimed in claim 8 distributed over a pre-determined zone; and a central controller operatively communicable to said smart devices adapted to perform the method steps as claimed in comprising the steps of detection and extraction of seismic signals generated from corresponding footfalls, by means of unsupervised learning based detection and extraction module (USLEEM); and detection and identification of imposter and/or registered users respectively by means of an identification module.
Description
BRIEF DESCRIPTION OF ACCOMPANYING DRAWINGS
[0023] The above and other aspects, features and advantages of the embodiments of the present disclosure will be more apparent in the following description taken in conjunction with the accompanying drawings, in which:
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035] Persons skilled in the art will appreciate that elements in the figures are illustrated for simplicity and clarity and may have not been drawn to scale. For example, the dimensions of some of the elements in the figure may be exaggerated relative to other elements to help to improve understanding of various exemplary embodiments of the present disclosure. Throughout the drawings, it should be noted that like reference numbers are used to depict the same or similar elements, features, and structures.
DETAILED DESCRIPTION
[0036] The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of various embodiments of the present disclosure as defined by the claims and their equivalents. It includes various specific details to assist in that understanding but these are to be regarded as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the various embodiments described herein can be made without departing from the scope and spirit of the present disclosure. In addition, descriptions of well-known functions and constructions may be omitted for clarity and conciseness.
[0037] The terms and words used in the following description and claims are not limited to the bibliographical meanings, but, are merely used by the inventor to enable a clear and consistent understanding of the present disclosure. Accordingly, it should be apparent to those skilled in the art that the following description of various embodiments of the present disclosure is provided for illustration purpose only and not for the purpose of limiting the present disclosure as defined by the appended claims and their equivalents.
[0038] It is to be understood that the singular forms “a,” “an,” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to “a component surface” includes reference to one or more of such surfaces.
[0039] All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments belong. Further, the meaning of terms or words used in the specification and the claims should not be limited to the literal or commonly employed sense, but should be construed in accordance with the spirit of the disclosure to most properly describe the present disclosure.
[0040] The terminology used herein is for the purpose of describing particular various embodiments only and is not intended to be limiting of various embodiments. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising” used herein specify the presence of stated features, integers, steps, operations, members, components, and/or groups thereof, but do not preclude the presence or addition of one or more other features, integers, steps, operations, members, components, and/or groups thereof. Also, Expressions such as “at least one of,” when preceding a list of elements, modify the entire list of elements and do not modify the individual elements of the list.
[0041] The present disclosure will now be described more fully with reference to the accompanying drawings, in which various embodiments of the present disclosure are shown. The present disclosure may, however, be embodied in many different forms and should not be construed as being limited to the various embodiments set forth herein, rather, these various embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the present disclosure. Furthermore, a detailed description of other parts will not be provided not to make the present disclosure unclear. Like reference numerals in the drawings refer to like elements throughout.
[0042] The subject invention lies in a system for person identification and imposter detection by analyzing footfall generated seismic signals.
[0043] According to an embodiment of the present invention,
[0044] According to an embodiment of the present invention, all the raw data acquisition, event extraction, person identification and imposter detection/classification happens in the smart device, SD. Final result related to person identification and impostor detection from all the SDs is stored to the database situated in Central controller.
[0045] A footfall is a short-lived event embedded on the noise of a seismic signal. If the entire signal is segmented in smaller chunks, most of the chunks will be void of footfall events. So, processing each chunk of the signal for human identification or imposter detection will lead to wastage of power and resource. So, it is very important to have a robust event detection and extraction technique.
[0046] According to another embodiment of the present invention,
[0047] A seismic signal (containing human footsteps) is split in N equal segments of length 220 ms. Time and frequency domain related features, referring to Table I, are extracted from each segment. The complete feature vector is represented by f.sup.w.sup.
TABLE-US-00001 TABLE I Feature Extracted from the i.sup.th segment Segment's Features Statistical Features Spectral Features (Energy bins) f.sub.1.sup.w.sup.
[0048] According to an exemplary implementation of the present invention, in the training phase, Gaussian Mixture Model, GMM is used to cluster the samples into two classes, footfall event and noise (absence of an event). Gaussian Mixture Model (GMM) is a clustering method that models the distribution of the data samples as a weighted Gaussian sum. The distribution of a feature vector f.sup.w.sup.
Σ.sub.k=1.sup.Kϕ.sub.k.Math.N(f.sup.w.sup.
[0049] where K is the number of clusters (2 in this scenario) and N is the number of training sample. Parameters ϕ.sub.k, μ.sub.k and Σ.sub.k are the prior probability (weight), mean, and covariance matrix of the k.sup.th clusters. The parameter ϕ.sub.k satisfies 0≤ϕ.sub.k≤1 and Σ.sub.k=1.sup.Kϕ.sub.k.Math.N(f.sup.wi|μ.sub.k,Σ.sub.k) is the multivariate Gaussian distribution of the i.sup.th feature. The log-likelihood of the training samples are given by
ln p(F|Θ)=Σ.sub.i=1.sup.N{Σ.sub.k=1.sup.2ϕ.sub.k.Math.N(f.sup.wi|μ.sub.kΣ.sub.k)} (2)
[0050] Where F=[f.sup.w.sup.
[0051] The two sets of clusters (C.sub.1 and C.sub.2) produced by GMM are unlabeled. Each cluster is parameterized by a set of ϕ, μ and Σ. The following equation is used to assign labels to the clusters.
where |Σ.sub.C.sub.
[0052] Referring to
f.sub.test.sup.w.sup.
[0053] As seen in
[0054] In an exemplary implementation, the length of the Gaussian windows is considered to be 375 ms and the value of sigma is set to 4. These values are obtained by studying various footfall signals and rectangular window has been used for event extraction.
[0055]
[0056] One of the exemplary implementations of present invention discloses a comparative performance analysis among USLEEM and the existing techniques UREDT and Adap-Th in terms of Person identification and imposter Detection. The same can be found in Tables II, III and IV below.
TABLE-US-00002 TABLE II Extracted features from a single footfall event Time Hilbert mean Frequency 0 to Domain std Transform std Energy Bins 250 Hz. skewness skewness (2 Hz.) kurtosis kurtosis event length
[0057] In an exemplary implementation, a dataset consisting labelled footsteps from 8 different individuals (four males and four female) is used to analyse the performance of the technique for person identification and imposter detection. The seismic signals generated by footfalls were recorded, as different volunteers walked around a geophone. Footfall generated seismic signals were recorded with a 16 bit analog to digital converter (ADC), as each volunteer walked around a geophone for five minutes. The sampling frequency of the ADC was 8 kHz. Dataset of an individual was recorded at a time. The entire experiment was repeated 12 times over a month. So, each individual class has almost 1 hour of seismic signal. The sensitivity and gain of the geophone used in this study are 2.88 V/mm/sec and 100. Each individual class has almost 1 hour of seismic signal in the dataset. It was collected over a span of 1 month. The event extraction techniques USLEEM, (UREDT+event extraction), and Adap-Th are used to extract individual footfall events from the entire dataset.
TABLE-US-00003 TABLE III Dataset created using USLEEM, UREDT and Adap-Th technique (j = 2, 3, 5, 7, 10) Footstep Number of footsteps sample Dataset Name per sample USLEEM UREDT Adap-Th Dataset.sub.i 1 47586 46645 46549 Dataset.sub.j j
TABLE-US-00004 TABLE IV Details of the scenarios used for performance analysis of imposter detection # # Imposters Registered # detection SN Scenario user Imposters problems 1 1 3 2 56 2 3 56 3 4 56 4 5 56 5 2 4 2 70 6 3 70 7 4 70 8 3 5 2 56 9 3 56
[0058] Table III displays the total number of footsteps extracted by the three event extraction techniques. Each footfall event, (referring to Table II) is treated as a single sample and the final dataset (Dataset.sub.1) is created by extracting features from them. A few more datasets are created by averaging the features from consecutive footfalls e.g. in Dataset.sub.j features from j consecutive footsteps are averaged and are treated as a single sample. In this way, five new datasets are created by assigning j to 2, 3, 4, 7, and 10.
[0059] Feature extraction plays a vital part in a biometric system. Classifiers' accuracy depends on the distinctiveness of features among different individuals. Time and frequency domain features are calculated for each of the footfall events (obtained from the event extraction technique). Mean, standard deviation, skewness, and kurtosis of the event make the time domain features. Length of the footfall event is also considered as an important feature. The length of a footfall is directly related to the shape and structure of the foot of an individual. Feature set also includes spectral energy of frequency bins of size 2 Hz from 0 to 250 Hz. It has been observed that there is no significant information in the footfall signal beyond 250-Hz.
Person Identification and Imposter Detection
[0060] Different multiclass supervised machine learning (ML) algorithms (SVM-Linear (SVM-Lin), SVM Gaussian (SVM-RBF), Logistic Regression (LR), Linear Discriminant Analysis (LDA) and k-Nearest Neighbor (kNN) are used for person identification. Each individual represents a single class in the ML algorithm. The datasets are normalized before training and testing, and 5-fold cross validation is carried out to avoid underfitting and overfitting. The hyper parameters of the classifiers (C for SVM-Lin, and C and γ for SVM-RBF) are obtained from grid search. The performance parameters for the algorithms include accuracy, precision, recall, and F1 score. It has been observed by researchers, combining features of multiple consecutive footsteps or discarding footsteps of low signal to noise ratio (SNR) increases the overall prediction accuracy. The required number of consecutive footsteps and the active area (sensing region) of a seismic sensor determine the total number of sensors required for a specific system. So, there is always a tendency to achieve high accuracy by using optimal number of footsteps. This reduces the overall infrastructure of the system and also decreases the prediction time (which may be very crucial in border areas and high security zones). So, the six datasets (Dataset.sub.1 . . . Dataset.sub.10), referring to Table III, are used to study the performance of the classifiers as number of footsteps per sample are increased.
Detection of Non-Registered User (Imposter)
[0061] The most challenging part in footfall based biometric system is imposter (intruder) detection. The main drawback of the above-mentioned ML classifiers is that they always assign footfalls of an unknown person (whose data were not used to train the model) to one of the predefined classes. The existing system only works when the individuals (classes) remain the same for training and testing scenarios. To overcome this problem, an imposter detection technique based on one-class/unary classifiers capable of predicting the presence or absence of an individual within the pre-registered dataset has been implemented. Using this technique, the system first detects the presence of an individual's footfall in the trained feature space. Classification for person identification is carried out only in case of registered users. Otherwise, it gives an intruder detected warning signal.
[0062] Two, one class machine learning models namely one class support vector machine (OC-SVM) and support vector data description (SVDD) are used for imposter detection. The one class classifiers (OC-SVM and SVDD) generate binary output i.e. +1 if the test sample lies within the decision boundary or −1 if the sample is an outlier. In imposter detection scenario data of each registered user are used to train individual one class models. If there are r number of registered users, there will be r number of trained one class models. The test sample is predicted as imposter (anomaly) if all the trained one class classifiers return −1 i.e. the test sample is anomalous to all the one class classifiers. Eqn. 5 shows the decision rule used for predicting imposters.
[0063] Three main scenarios, as in Table III, uses the footfall dataset of 8 individuals to calculate the performance of the techniques for imposter detection. In each scenario, r number of classes is treated as registered users (r={3, 4, 5}). Each scenario is further divided into sub-scenarios. These sub-scenarios are created by fixing the number of registered users and varying the number of imposters from 2 to 8-r. Each sub-scenario is further subdivided into .sup.8Cr combinations of imposter detection problem to compute the robustness of the techniques. It is done to select all sets of r combinations (order of selection does not matter) of classes as registered users. The imposters are selected from the rest. Cases where the number of registered users is less than 3, or the number of imposters is less than 2 were not considered as these scenarios do not resemble realistic situation. The final performance of the techniques corresponding to each scenario is calculated by averaging the results obtained from all sub-scenarios. In the training phase, only the data of registered users are available. The data of the imposters are completely unseen by the trained machines and are only used during the live phase (which resemblance real scenario cases). Fivefold cross validation is carried out in each of the imposter detection problems.
[0064] The performance of human identification and imposter detection techniques, referring to Table V, are calculated using the dataset.
TABLE-US-00005 TABLE V Performance of different classifiers used for person identification with varying footsteps per sample Classifiers Number of Footsteps/sample Accuracy (%) 1 2 3 5 7 10 SVM Lin. 79.00 88.4 91.97 94.97 96.72 97.39 SVM RBF 83.47 90.51 93.06 95.71 96.79 97.54 LR 73.48 84.37 88.23 93.62 96.07 96.82 LDA 67.86 78.75 84.63 89.58 93.24 95.54 kNN 71.86 80.53 84.72 88.23 91.21 94.24
Person Identification
[0065] The first phase of a person identification technique is event detection and extraction. Event detection capability of USLEEM is compared with existing techniques like UREDT, Adap-Th, amplitude threshold (Amp-Th.), and kurtosis based technique. Event extraction technique Adap-Th uses STA-LTA for event detection.
[0066] The performance of different classifiers (for human identification) with variation in number of footsteps per sample is presented in Table V. Events are extracted using the USLEEM technique. It is important to achieve high prediction accuracy from few footfalls, as it reduces prediction time, saves energy and is economical. The sensing range of geophones on concretes is 2˜m to 2.5˜m. So, more than one geophone will be required for applications that need very high prediction accuracy. As the system will demand a large number of footsteps per sample. It can be observed, referring to Table V, that in case of 10 footsteps/sample the performance of all the classifiers is almost the same. However, in 1 footstep/sample scenario SVM-RBF outperforms the rest and achieves an accuracy of 83.47% which is 25.61% higher than LDA (which performs worst). The Gaussian kernel of SVM-RBF increases the dimension of the feature space (disjointing the classes) before performing classification. The feature space of the classes is somewhat overlapped in 1-footstep/sample scenario and they slowly become disjoint as number of footsteps per sample increase.
[0067]
[0068]
TABLE-US-00006 TABLE VI Confusion matrix of person identification obtained using SVM-RBF on Dataset.sub.2. Actual P1 0.91 0.02 0.03 0.04 0.00 0.00 0.01 0.00 Class P2 0.04 0.87 0.01 0.06 0.00 0.00 0.01 0.01 P3 0.04 0.00 0.92 0.02 0.00 0.00 0.01 0.01 P4 0.03 0.03 0.03 0.87 0.00 0.00 0.02 0.02 P5 0.00 0.00 0.00 0.00 0.89 0.09 0.00 0.02 P6 0.00 0.00 0.01 0.00 0.04 0.88 0.00 0.07 P7 0.01 0.00 0.02 0.01 0.00 0.00 0.96 0.00 P8 0.01 0.00 0.00 0.04 0.01 0.04 0.00 0.90 P1 P2 P3 P4 P5 P6 P7 P8 Predicted Class
Imposter Detection Using One Class Classifiers
[0069] A comparative analysis, referring to
SVDD encloses the dataset with a spherical boundary and OC-SVM draws a hyperplane between the dataset of the training class and the origin. If r is the number of registered users, SVDD has r spherical boundaries and OC-SVM has r hyperplane on the feature space. The r hyperplanes in the feature space overlap among themselves and results in poor performance of OC-SVM. The hyperspheres of SVDD are more disjoints (non-overlapped) than the hyperplanes of OC-SVM due to its spherical nature. ROC curves of SVDD and OC-SVM are obtained from scenario 2, referring to Table IV and
[0070] Performance parameters (accuracy, precision, recall, and F1 score) of SVDD for imposter detection are presented in Table VII. The mean and standard deviation are calculated by averaging the performance parameters of all the sub scenarios. Imposter detection accuracy decreases slightly (4% for SVDD and 1% for OC-SVM) from scenario 1 to scenario 3 when dataset.sub.10 is used. An increase in the number of registered user results in large overlapping of different classes in the feature set. However, for both the techniques the overall accuracy and individual F1 score of the classes almost remain the same as number of imposters increases for all the three scenarios. This makes the system robust in imposter detection.
TABLE-US-00007 TABLE VII Performance of SVDD for different imposter detection scenarios obtained using Dataset.sub.10. # Performance Parameters Registered Overall Precision Recall F1 Scenario User Parameters Accuracy Registered Imposter Registered Imposter Registered Imposter 1 3 Mean 80.22 85.88 76.63 72.96 87.47 78.58 81.51 Std 2.48 4.13 1.82 2.35 4.30 2.42 2.62 2 4 Mean 78.31 82.09 75.83 73.46 83.16 77.26 79.14 Std 2.74 4.35 2.08 2.50 4.94 2.53 3.03 3 5 Mean 76.19 78.70 74.57 73.25 79.13 75.62 76.58 Std. 2.77 3.52 2.69 3.21 4.29 2.72 2.97
TABLE-US-00008 TABLE VIII Performance of OC-SVM for different imposter detection scenarios obtained using Dataset.sub.7. # Performance Parameters Registered # Overall Precision Recall F1-Score Scenario User Imposter Accuracy Registered Imposter Registered Imposter Registered Imposter 1 3 2 Mean 75.65 77.14 75.29 75.19 76.11 75.71 75.27 Std. 5.29 7.89 3.19 2.13 10.37 4.12 6.70 3 Mean 75.74 76.52 75.70 75.49 75.99 75.71 75.58 Std. 3.39 4.99 2.29 2.41 6.63 2.78 4.18 4 Mean 75.23 75.74 75.30 74.98 75.47 75.12 75.18 Std. 2.14 3.21 1.49 1.59 4.21 1.77 2.61 5 Mean 75.37 76.13 75.19 74.45 76.30 75.05 75.56 Std. 1.04 1.26 1.35 1.91 1.72 1.15 1.07 Average Mean 75.50 76.38 75.37 75.03 75.97 75.40 75.40 Std. 2.97 4.34 2.08 2.01 5.73 2.46 3.64 2 4 2 Mean 73.11 72.83 74.22 76.21 70.00 74.17 71.66 Std. 4.83 6.36 3.51 2.66 9.15 3.75 6.32 3 Mean 72.53 71.86 73.77 75.51 69.56 73.45 71.38 Mean 2.76 3.59 2.16 1.94 5.25 2.18 3.57 4 Std. 72.68 71.86 73.92 75.40 69.96 73.46 71.75 Mean 1.34 1.52 1.45 1.68 2.24 1.25 1.57 Average Mean 72.77 72.18 73.97 75.71 69.84 73.69 71.60 Std. 2.98 3.83 2.37 2.09 5.55 2.39 3.82 3 5 2 Std. 70.46 69.31 72.32 75.64 65.28 72.14 68.35 Mean 3.88 4.65 3.13 2.37 7.13 2.97 5.15 3 Std. 70.99 69.60 73.01 76.11 65.88 72.58 69.09 Mean 1.21 1.34 1.33 1.50 2.09 1.08 1.49 Average Mean 70.73 69.45 72.66 75.88 65.58 72.36 68.72 Std. 2.54 2.99 2.23 1.93 4.61 2.03 3.32
[0071] Overall, the system records and analyses footfall generated seismic waveforms. The unsupervised learning-based event detection and extraction technique USLEEM outperforms the existing techniques and is computationally cheaper than UREDT. Using SVM-RBF with USLEEM we were able to achieve an identification accuracy of 90.6% (features extracted from two consecutive footsteps), thereby identifying humans as registered users and imposters and making the system suitable for certain applications where the prior information of imposters is not available.
[0072] According to an embodiment of the present invention, a method for person identification and imposter detection comprises steps of detection and extraction (201, 202; 301, 302) of seismic signals generated from corresponding footfalls, by means of unsupervised learning based detection and extraction module (USLEEM); and detection and identification of imposter and/or registered users (304, 305, 306, 307) respectively by means of an identification module. The said step of detection and extraction of seismic signals generated from corresponding footfalls comprising at least one training phase including—splitting (202) each of said seismic signals, into N equal segments, extracting (202) feature vectors (FE-I) corresponding to time domain and frequency domain features from each of said segment of the N segments, clustering (202) each of the said feature vectors into a clustered event so as to form at least one trained model of USLEEM, and storing of the said trained model. The step of detection and extraction of seismic signals generated from corresponding footfalls further comprising at least one live phase including—splitting (301) each of said seismic signals, into N equal segments, extracting (302), feature vectors (FE-I) corresponding to time domain and frequency domain features from each of said segment of the N segments and detecting footfalls from the extracted featured vectors (FE-I) thereafter feeding (303) it to the trained model. The step of detection and identification of imposter and/or registered users respectively is performed by means of an identification module, said method steps including—detection (307) of at least one imposter, by means of One—Class machine learning model when feature vectors (FE-II) obtained from the extracted footfalls of live phase are fed to the One-Class model and identification of registered users, and identification (306) of registered users, from feature vectors (FE-II) obtained from the extracted footfalls of live phase, by means of multi-class machine learning model. Gaussian Mixture Model, GMM, clustering facilitates clustering each of the said feature vectors into a clustered event. Each cluster is parameterized by a set of p, p, and E and the method further comprises classifying said clustered event into a footfall event and noise by
where |Σ.sub.C.sub.
where f.sub.test.sup.wi is the feature vector of the i.sup.th segment of a test signal Signal.sub.test, p(C.sub.k|f.sub.test.sup.w.sup.
Some of the non-limiting advantages of seismic sensor based biometric system are: [0073] 1. Individuals are not required to orient or position themselves in a special manner. [0074] 2. Easy implementation, sensor data are less affected by environmental parameters, and the sensor is easily camouflageable. [0075] 3. Beneficial for sentries posted in high-security zones (bureaucratic building), military camps, and army check posts.
[0076] Although a method for person identification and imposter detection using unsupervised learning-based detection and extraction technique, USLEEM, a smart device implementing the method and a biometric authentication system thereof has been described in language specific to structural features, it is to be understood that the embodiments disclosed in the above section are not necessarily limited to the specific methods or devices described herein. Rather, the specific features are disclosed as examples of implementations of method for person identification and imposter detection using unsupervised learning-based detection and extraction technique, USLEEM, a smart device and a biometric authentication system thereof.