Biometric authentication based on gait pattern or writing motion with an inertial measurement unit
10503886 ยท 2019-12-10
Assignee
Inventors
Cpc classification
G06F21/6218
PHYSICS
G06F21/32
PHYSICS
International classification
Abstract
The present invention relates to use an Inertial Measurement Unit (IMU) to record the acceleration trajectory of a person's gait or pen-less handwriting motion or any predesignated gestures, and to convert the data to a unique biometric pattern. The pattern is unique for each case and can be used as biometric security authentication.
Claims
1. A method for biometric authentication based on a repeated movement, comprising: obtaining, by at least one first inertia measurement sensor located on each individual of a subject group, time dependent measurements of magnitude of acceleration vectors, x.sub.ori(t), y.sub.ori(t), and z.sub.ori(t), in three Cartesian directions of said each individual of the subject group performing said repeated movement; computing, by a computer processor, an authentication function, S(t), for each individual of said subject group based on the acceleration vectors, wherein
S(t)=[A.sub.x(t).sup.2+A.sub.y(t).sup.2+A.sub.z(t).sup.2].sup.1/2
and
A.sub.x(t)=x.sub.ori(t)x.sub.off,
A.sub.y(t)=y.sub.ori(t)y.sub.off,
A.sub.z(t)=z.sub.ori(t)z.sub.off, and x.sub.off, y.sub.off, and z.sub.off are zero offset values of each acceleration vector at the start of the respective measurements and where the magnitude of the authentication function, S(t), as it proceeds through a trajectory characteristic of an individual during each cycle of the repeated movement, is converted into a single point in a multi-dimensional space; analyzing S(t), by the computer processor, over at least two cycles of said repeated movement using multivariate analysis to create an analyzed, reference S(t); storing on a computer readable storage medium the analyzed, reference S(t) for each individual to create stored, analyzed reference values S(t) of said subject group as biometric identifiers in a database of biometric identifiers; obtaining, by at least one second inertia measurement sensor located on a test subject, time dependent measurements of magnitude of acceleration vectors, x.sub.ori(t), y.sub.ori(t), and z.sub.ori(t), in three Cartesian directions of said test subject performing said repeated movement; computing, by a computer processor, a test subject authentication function, S(t), of said test subject based on the acceleration vectors; comparing the stored, analyzed reference values of S(t) for the subject group with the test subject authentication function S(t); matching the stored, analyzed reference values of S(t) of said test subject with the test subject authentication function S(t) as the biometric identifiers of the subject group in the database of biometric identifiers using a Partia Least Squares Discriminant Analysis; and authenticating said test subject if the test subject authentication function S(t) is within a predetermined tolerance level of one or more stored, analyzed reference values of S(t) and wherein authentication is determined by a motion component of the movement with least phase shift sensitivity tolerance.
2. The method according to claim 1 wherein said repeated movement is hand writing.
3. The method according to claim 1 wherein said repeated movement is walking.
4. The method according to claim 1 wherein said repeated movement is running.
5. A non-transitory computer-readable medium comprising computer instructions for causing a computer processor to obtain, by at least one first inertia measurement sensor located on each individual of a subject group, time dependent measurements of magnitude of acceleration vectors, x.sub.ori(t), y.sub.ori(t), and z.sub.ori(t), in three Cartesian directions of said each individual of the subject group performing said repeated movement; compute an authentication function, S(t), for each individual of said subject group based on the acceleration vectors, wherein
S(t)=[A.sub.x(t).sup.2+A.sub.y(t).sup.2+A.sub.z(t).sup.2].sup.1/2
and
A.sub.x(t)=x.sub.ori(t)x.sub.off,
A.sub.y(t)=y.sub.ori(t)y.sub.off,
A.sub.z(t)=z.sub.ori(t)z.sub.off, and x.sub.off, y.sub.off, and z.sub.off are zero offset values of each acceleration vector at the start of the respective measurements and where the magnitude of the authentication function, S(t), as it proceeds through a trajectory characteristic of an individual during each cycle of the repeated movement, is converted into a single point in a multi-dimensional space; analyze S(t) over at least two cycles of said repeated movement using multivariate analysis to create an analyzed, reference S(t); store the analyzed, reference S(t) for each individual to create stored, analyzed reference values S(t) of said subject group as biometric identifiers in a database of biometric identifiers; obtain, by at least one second inertia measurement sensor located on a test subject, time dependent measurements of magnitude of acceleration vectors, x.sub.ori(t), y.sub.ori(t), and z.sub.ori(t), in three Cartesian directions of said test subject performing said repeated movement; compute a test subject authentication function, S(t), of said test subject based on the acceleration vectors; compare the stored, analyzed reference values of S(t) for the subject group with the test subject authentication function S(t); match the stored, analyzed reference values of S(t) of said test subject with the test subject authentication function S(t) as the biometric identifiers of the subject group in the database of biometric identifiers using a Partia Least Squares Discriminant Analysis; and authenticate said test subject if the test subject authentication function S(t) is within a predetermined tolerance level of one or more stored, analyzed reference values of S(t) and wherein authentication is determined by a motion component of the movement with least phase shift sensitivity tolerance.
6. The non-transitory computer-readable medium according to claim 5, wherein the repeated movement is hand writing.
7. The non-transitory computer-readable medium according to claim 5, wherein the repeated movement is walking.
8. The non-transitory computer-readable medium according to claim 5, wherein the repeated movement is running.
9. An apparatus for biometric authentication based on a repeated movement, comprising: at least one first inertia measurement sensor located on each individual of a subject group configured to obtain time dependent measurements of magnitude of acceleration vector, x.sub.ori(t), y.sub.ori(t), and z.sub.ori(t), in three Cartesian directions of said each individual of said subject group performing said repeated movement; a first computer processor configured to compute an authentication function, S(t), of said subject group based on the acceleration vectors, wherein
S(t)=[A.sub.x(t).sup.2+A.sub.y(t).sup.2+A.sub.z(t).sup.2].sup.1/2
and
A.sub.x(t)=x.sub.ori(t)x.sub.off,
A.sub.y(t)=y.sub.ori(t)y.sub.off,
A.sub.z(t)=z.sub.ori(t)z.sub.off, and x.sub.off, y.sub.off, and z.sub.off are zero offset values of each acceleration vector at the start of the measurement and where the magnitude of the authentication function, S(t), as it proceeds through a trajectory characteristic of an individual during each cycle of the repeated movement, is converted into a single point in a multi-dimensional space; analyzing S(t), by the first computer processor, over at least two cycles of said repeated movement using multivariate analysis to create an analyzed, reference S(t); a computer readable storage medium for storing the analyzed reference S(t) for each individual of said subject group as biometric identifiers in a database of biometric identifiers; at least one second inertia measurement sensor located on a test subject configured to obtain time dependent measurements of magnitude of acceleration vector along x.sub.ori(t), y.sub.ori(t), and z.sub.ori(t) directions and phase relationship of said test subject performing said repeated movement; a second computer processor configured to: compute a test subject authentication function S(t) of said test subject based on the acceleration vectors; compare the stored, analyzed reference values of S(t) for the subject group with the test subject authentication function S(t); match the stored, analyzed reference S(t) of said test subject with the test subject authentication function S(t) as the biometric identifiers of the subject group in the database of biometric identifiers using a Partia Least Squares Discriminant Analysis; and authenticate said test subject if the test subject authentication function S(t) is within a predetermined tolerance level of one or more stored, analyzed reference values of S(t) and wherein authentication is determined by a motion component of the movement with least phase shift sensitivity tolerance.
10. The apparatus according to claim 9 wherein said repeated movement is hand writing.
11. The apparatus according to claim 9 wherein said repeated movement is walking.
12. The apparatus according to claim 9 wherein said repeated movement is running.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The above and other objects and features of the present invention will become apparent from the following description of the invention, when taken in conjunction with the accompanying drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
DETAILED DESCRIPTION OF THE INVENTION
(16) The present invention is not to be limited in scope by any of the specific embodiments described herein. The following embodiments are presented for exemplification only.
(17) Data Acquisition
(18) A 3-axes accelerometer (i.e. IMU) that can be either a stand-alone unit or an embedded device in a smartphone is used for data collection to record acceleration vectors along the three Cartesian axes.
(19) For gait biometric authentication, a sensor is placed against lower back of an individual as shown in
(20)
(21)
(22) Due to the data conversion algorithm used in this invention, results are independent of the inclination angle.
(23) (Nihao) characters, respectively. In this particular setting, the measurement is made for 2D movement in a plane. In both cases, the data rate is 100 Hz. With the IMU sensitivity of 0.003 g, where g is the gravitational constant, the accuracy in displacement measurement is less than 0.05 mm.
(24) Gait authentication measurement is not limited to the placement of IMU against the lower back of an individual. The sensor can also be mounted on anywhere of the individual such as pockets, belt clip pouch and other mounting places as long as the data collection to build a library archive of a control group and the data collection for authentication share the same sensor placement location and method.
(25) Data Reduction and Library Archive Data Base Development
(26) 1. Data Reduction
(27) The original raw data that record accelerations in 3D or 2D form as x.sub.ori(t), y.sub.ori (t), z.sub.ori(t) are processed by a single time dependent function. The single time dependent function contains magnitude of acceleration vector along each direction and their phase relationship. At the start of the measurement, zero offset values, x.sub.off, y.sub.off, z.sub.off, in all three directions are recorded and then are subtracted from the original raw data. The new data set appear as a set of functions in the transformed coordinate system:
A.sub.x(t)=x.sub.ori(t)x.sub.off
A.sub.y(t)=y.sub.ori(t)y.sub.off
A.sub.z(t)=z.sub.ori(t)z.sub.off
(28) The magnitude of the vector S(t), known as authentication function, is calculated by:
S(t)=[A.sub.x(t).sup.2+A.sub.y(t).sup.2+A.sub.z(t).sup.2].sup.1/2
(29) S(t) contains both magnitude and phase of all Cartesian components and is used for data base archive as well as formatting new data for authentication. It should be noted that with this algorithm, the magnitude of the vector sum is invariant of the orientation of the initial coordinate system. Therefore, the results are not affected by the way the sensor is mounted as long as the motion does not involve axial rotation. The authentication function S(t) that consists of repetitive data of many cycles is analyzed by multivariate analysis with developed software or any commercial tool with this function. In a preferred embodiment, commercial software SIMCA by MKS Instruments is used.
(30) The raw measurement of a person walking with three sets of accelerations along the orthogonal coordinates, as shown in ) in Chinese characters shown in
(31) 2. Data Library
(32) After the data is collected and transformed according to the algorithm described above, each data set is divided into equal segments for further analysis. For gait biometrics, the first few strides are discarded and only the strides after reaching steady state is used. Each stride represents one segment. For biometric based on hand writing or other gestures, the user is asked to repeat the motion a few times and each pattern is used as one authentication function. Each authentication function is then divided into N slices in the time domain. The choice of N depends on the resolution. Each slice can be equal or different as long as the data for authentication is sliced in the same way.
(33) In this test, the inventor used N=100 and each slice has the same width in time. Each slice is assigned with an index i, where i=1, 2, . . . N, and corresponding value for each slice is S(t.sub.i). Therefore, a segment is represented by a single point S(t.sub.i=1,2,3, . . . N) in an N-dimensional space. When the features of the samples are sufficiently similar, these values form a cluster in a closely packed proximity.
(34) 3. Identity Authentication
(35) Authentication is based on the data collected from a test individual performing a specific task such as walking or writing under the same condition as that used in collecting a control group data stored in the library. After the onset of walking, the gait takes a few steps to develop into a steady form. For gait based biometric authentication, it is found that authentication based on second stride gives a 20% error and for the third stride, a less than 5% error. The error reduces as the gait approaches a steady state. Therefore, the test individual must walk for a few strides until a steady state is reached for high authentication accuracy. After data of the test individual is collected, the test data is processed with the same algorithm used to build the control archive. The test data is then processed by a software based on Partial Least Square Discriminant Analysis to search and match against control data stored in the archive for authentication acceptance or rejection.
(36) To test the validity of gait biometric authentication of the present invention, the gait data from 10 individuals of different gender and age walking in normal pace are collected. The data are processed and stored in the library archive in the computer for future reference. At a different time, one of the individual from the archive group is subjected to gait measurement under the same condition as before for data authentication. The time between collecting the archived data and collecting the data for authentication varies from a few days to a few months. The data of the first four strides and the last four strides are discarded. Two strides from the steady state are taken from test individual for authentication. With this setup, the present invention has achieved 100% authentication matching and zero case of rejection. Additionally, gait of a test individual who is not on the archive group is tested, the result is rejected since the computer is unable to find any match.
(37) Authentication of writing style is also tested by the same algorithm. In this case, only writing motion in 2D space without rotation is considered. Two sets of writings, an English word goodbye and a Chinese character phrase Nihao both in cursive form, are tested for 7 individuals. The library archive is based on 7 repetitive writings of the same word or phrase. The time between collecting the archived data and collecting the data for authentication varies from a few days to a few weeks. Again, the results demonstrated 100% matching.
(38) 4. Identity Forgery Proof
(39) To further validate the usefulness and robustness of the present invention, studies are carried out to investigate security of the present invention against forgery. For gait biometric signature, the phase of each Cartesian component is shifted in both positive and negative directions with respect to the other two components and the result is checked for authentication by Partial Least Square Discriminant Analysis with following findings: 1) Among the accelerations along three Cartesian coordinates, surge motion is the least sensitive and sway motion is the most sensitive followed by heave motion. For Surge movement, the gait can tolerate as much as 75 msec shift without rejection in the authentication. 2) The maximum tolerance in phase shift of the Heave movement is 20 msec without rejection in authentication. The most sensitive component characterizing a person's gait identity is the Sway motion. The tolerance level to maintain authentication is less than 10 msec phase shift in both positive and negative directions.
(40) Similar findings are made on the effect of phase shift of acceleration in either axis on the effect of authentication based on hand motion in 2D writing.
(41) The embodiments disclosed herein may be implemented using general purpose or specialized computing devices, computer processors, microcontrollers, or electronic circuitries including but not limited to digital signal processors (DSP), application specific integrated circuits (ASIC), field programmable gate arrays (FPGA), and other programmable logic devices configured or programmed according to the teachings of the present disclosure. Computer instructions or software codes running in the general purpose or specialized computing devices, computer processors, or programmable logic devices can readily be prepared by practitioners skilled in the software or electronic art based on the teachings of the present disclosure.
(42) The foregoing description of the present invention has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations will be apparent to the practitioner skilled in the art.
(43) The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, thereby enabling others skilled in the art to understand the invention for various embodiments and with various modifications that are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the following claims and their equivalence.
INDUSTRIAL APPLICABILITY
(44) The present invention discloses the use of an IMU to record the acceleration trajectory of a person's gait or pen-less handwriting motion or any predesignated gestures, and to convert the data to a unique pattern with a special algorithm. More particularly, it relates to a method of using an IMU to record the acceleration trajectory of a person's gait or pen-less handwriting motion or any predesignated gestures for biometric security authentication.
(45) If desired, the different functions discussed herein may be performed in a different order and/or concurrently with each other. Furthermore, if desired, one or more of the above-described functions may be optional or may be combined.
(46) While the foregoing invention has been described with respect to various embodiments and examples, it is understood that other embodiments are within the scope of the present invention as expressed in the following claims and their equivalents. Moreover, the above specific examples are to be construed as merely illustrative, and not limitative of the reminder of the disclosure in any way whatsoever. Without further elaboration, it is believed that one skilled in the art can, based on the description herein, utilize the present invention to its fullest extent. All publications recited herein are hereby incorporated by reference in their entirety.