Open Access

Real-Time Identification from Gait Features Using Cascade Voting Method


Cite

[1] A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, p. 4–20, Jan. 2004. https://doi.org/10.1109/TCSVT.2003.81834910.1109/TCSVT.2003.818349 Search in Google Scholar

[2] A. Drosou, D. Loannidis, D. Tzovaras, K. Moustakas, and M. Petrou, “Activity related authentication using prehension biometrics,” Pattern Recognition, vol. 48, no. 5, p. 1743–1759, May 2015. https://doi.org/10.1016/j.patcog.2014.12.00810.1016/j.patcog.2014.12.008 Search in Google Scholar

[3] B. Miller, “Vital signs of identity [biometrics],” IEEE Spectrum, vol. 31, no. 2, p. 22–30, 1994. https://doi.org/10.1109/6.25948410.1109/6.259484 Search in Google Scholar

[4] K. A. Reynolds, P. M. Watt, S. A. Boone, and C. P. Gerba, “Occurrence of bacteria and biochemical markers on public surfaces,” International Journal of Environmental Health Research, vol. 15, no. 3, p. 225–234, 2005. https://doi.org/10.1080/0960312050011529810.1080/0960312050011529816134485 Search in Google Scholar

[5] R. Sahak, N. Tahir, A. I. M. Yassin, F. H. Kamaruzaman, and A. A. Misreb, “Human gait recognition using skeleton joint coordinates with orthogonal least square and locally linear embedded techniques,” International Journal of Simulation: Systems, Science and Technology, vol. 19, no. 5, p. 25.1–25.9, 2019. https://doi.org/10.5013/IJSSST.a.19.05.2510.5013/IJSSST.a.19.05.25 Search in Google Scholar

[6] P. C. Cattin, “Biometric Authentication System Using Human Gait”, Doctoral Thesis, ETH Zurich, Zurich, Switzerland, 2002. Search in Google Scholar

[7] A. Kale, A. Sundaresan, A. N. Rajagopalan, N. P. Cuntoor, A. K. R. Roy-Chowdhury, V. Kruger, and R. Chellappa “Identification of humans using gait”, IEEE Transaction on Image Processing, vol. 13, no. 9, p. 1163–1173, Aug. 2004. https://doi.org/10.1109/TIP.2004.83286510.1109/TIP.2004.832865 Search in Google Scholar

[8] N. Sadeghzadehyazdi, T. Batabyal, N. K. Dhar, B. O. Farmiloni, K. M. Iftekharuddin, and S. T. Acton, “GlidarCo: gait recognition by 3D skeleton estimation and biometric feature correction of flash lidar data”, arXiv preprint arXiv:1905.07058, 2019. Search in Google Scholar

[9] H. Fujiyoshi, and A. J. Lipton, “Real-time human motion analysis by image skeletonization,” in IEEE Workshop on Applications of Computer Vision, Princeton, NU, USA, Oct. 1998, pp. 15–21. https://doi.org/10.1109/ACV.1998.73285210.1109/ACV.1998.732852 Search in Google Scholar

[10] H. Sarbolandi, D. Lefloch, and A. Kolb, “Kinect range sensing: Structured-light versus Time-of-Flight Kinect,” Computer Vision and Image Understanding, vol. 139, pp. 1–20, Oct. 2015. https://doi.org/10.1016/j.cviu.2015.05.00610.1016/j.cviu.2015.05.006 Search in Google Scholar

[11] A. Bobick and A. Y. Johnson, “Gait recognition using static activity-specific parameters,” in IEEE 2001 Computer Society Conference on Computer Vision and Pattern Recognition, Kauai, USA, Dec. 2001. https://doi.org/10.1109/CVPR.2001.99050610.1109/CVPR.2001.990506 Search in Google Scholar

[12] J. P. Singh and S. Jain, “Person identification based on gait using dynamic body parameters,” in Trendz in Information Sciences & Computing, Chennai, India, Dec. 2010, pp. 248–252. https://doi.org/10.1109/TISC.2010.571464910.1109/TISC.2010.5714649 Search in Google Scholar

[13] N. Jianwattanapaisarn, N. Khamsemanan, and C. Nattee, “Gait recognition from freestyle walks using relative coordinates and random subsequence-based Sum-Rule classification,” in Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), Sapporo, Japan, Aug. 2016, pp. 5–9. https://doi.org/10.1109/SCIS-ISIS.2016.001610.1109/SCIS-ISIS.2016.0016 Search in Google Scholar

[14] Y. Wang, S. Rane, S. C. Draper, and P. Ishwar “A theoretical analysis of authentication, privacy and reusability across secure biometric systems,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1825–1840, Dec. 2012. https://doi.org/10.1109/TIFS.2012.221021510.1109/TIFS.2012.2210215 Search in Google Scholar

[15] A. El-Sallam, F. Sohe, and M. Bennamoun, “Robust pose invariant shape-based hand recognition,” in IEEE 2011 6th Conference on Industrial Electronics and Applications, Beijing, China, June 2011, pp. 1–10. https://doi.org/10.1109/ICIEA.2011.597559510.1109/ICIEA.2011.5975595 Search in Google Scholar

[16] K. Simoens, P. Tuyls, and B. Preneel, “Privacy weaknesses in biometric sketches,” in IEEE 2009 30th Symposium on Security and Privacy, Oakland, USA, May 2009, pp. 188–203, doi: 10.1109/SP.2009.24.10.1109/SP.2009.24 Search in Google Scholar

[17] A. Eng and L. A. Wahsheh, “Look into my eyes: A survey of biometric security,” in 10th International Conference on Information Technology: New Generations, Las Vegas, USA, Apr. 2013, pp. 422–427. https://doi.org/10.1109/ITNG.2013.6510.1109/ITNG.2013.65 Search in Google Scholar

[18] J. Lu, X. Yua, and T. Yahagi, “A method of face recognition based on fuzzy c-Means clustering and associated Sub-NNs,” IEEE Transactions on Neural Networks, vol. 18, no. 1, p. 150–160, Jan. 2007. https://doi.org/10.1109/TNN.2006.88467810.1109/TNN.2006.88467817278469 Search in Google Scholar

[19] D. Souza, A. Burlamaqui, and G. Souza Filho, “Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps,” Multimedia Tools Applications, vol. 77, p. 2013–2032, 2018. https://doi.org/10.1007/s11042-017-4374-x10.1007/s11042-017-4374-x Search in Google Scholar

[20] K. Dharavath, F. A. Talukdar, and R. H. Laskar, “Study on biometric authentication systems, challenges and future trends: A review,” in IEEE 2013 International Conference on Computational Intelligence and Computing Research, Enathi, India, Dec. 2013, pp. 1–7. https://doi.org/10.1109/ICCIC.2013.672427810.1109/ICCIC.2013.6724278 Search in Google Scholar

[21] A. N. Kataria, D. M. Adhyaru, A. K. Sharma, and T. H. Zaveri, “A survey of automated biometric authentication techniques,” in IEEE 2013 Nirma University International Conference on Engineering, Ahmedabad, India, Nov. 2013, pp. 1–6. https://doi.org/10.1109/NUiCONE.2013.678019010.1109/NUiCONE.2013.6780190 Search in Google Scholar

[22] W. Meng, D. S. Wong, S. Furnell, and J. Zhou, “Surveying the development of biometric user authentication on mobile phones,” IEEE Communications Surveys and Tutorials, vol. 17, no. 3, pp. 1268–1293, 2015. https://doi.org/10.1109/COMST.2014.238691510.1109/COMST.2014.2386915 Search in Google Scholar

[23] S. Pal, U. Pal, and M. Blumenstein, “Signature-based biometric authentication,” in Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Studies in Computational Intelligence, A. Muda, Y. H. Choo, A. Abraham, N. S. Srihari, Eds., vol 555. Springer, Cham, pp. 285–314, 2014. https://doi.org/10.1007/978-3-319-05885-6_1310.1007/978-3-319-05885-6_13 Search in Google Scholar

[24] D. Impedovo, G. Pirlo, L. Sarcinella, E. Stasolla, and C. A. Trull, “Analysis of stability in static signatures using Cosine similarity,” in International Conference on Frontiers in Handwriting Recognition, Bari, Italy, Sep. 2012, p. 231–235. https://doi.org/10.1109/ICFHR.2012.18010.1109/ICFHR.2012.180 Search in Google Scholar

[25] R. Plamondon and M. A. Djioua, “Multi-level representation paradigm for handwriting stroke generation,” Human Movement Science, vol. 25, no. 4–5, p. 586–607, 2006. https://doi.org/10.1016/j.humov.2006.07.00410.1016/j.humov.2006.07.004 Search in Google Scholar

[26] N. K. Hosseini and M. J. Nordin, “Human gait recognition: A silhouette based approach,” Journal of Automation and Control Engineering, vol. 1, no. 2, p. 103–105, 2013. https://doi.org/10.12720/joace.1.2.103-10510.12720/joace.1.2.103-105 Search in Google Scholar

[27] A. Veeraraghavan, A.K.R. Chowdhury, and R. Chellappa, “Role of shape and kinematics in human movement analysis,” in IEEE 2004 Computer Society Conference on Computer Vision and Pattern Recognition, Washington, USA, June-July 2004, pp. I–I. https://doi.org/10.1109/CVPR.2004.131510410.1109/CVPR.2004.1315104 Search in Google Scholar

[28] D. Cunado, M. S. Nixon, and J. N. Carter, “Automatic extraction and description of human gait models for recognition purposes”, Computer Vision and Image Understanding, vol. 90, no. 1, pp. 1–41, 2003. https://doi.org/10.1016/S1077-3142(03)00008-010.1016/S1077-3142(03)00008-0 Search in Google Scholar

[29] J. P. Singh, S. Jain, S. Arora, and U. P. Singh, “A survey of behavioural biometric gait recognition: Current success and future perspectives,” Archives of Computational Methods in Engineering, vol. 28, pp. 107–148, Nov. 2021. https://doi.org/10.1007/s11831-019-09375-310.1007/s11831-019-09375-3 Search in Google Scholar

[30] C. Yam, M. S. Nixon, and J. N. Carter, “Automated person recognition by walking and running via model-based approaches,” Pattern Recognition, vol. 37, no. 5, pp. 1057–1072, 2004. https://doi.org/10.1016/j.patcog.2003.09.01210.1016/j.patcog.2003.09.012 Search in Google Scholar

[31] J. Y., Kang, R. Kim, H. Kim, Y. Kang, S. Hahn, Z. Fu, M. I. Khalid, E. Schenck, and T. Thesen, “Automated tracking and quantification of autistic behavioural symptoms using Microsoft Kinect,” Studies in Health Technology and Informatics, vol. 220, pp. 167–170, Jan. 2016. Search in Google Scholar

[32] E. Gianaria and M. Grangetto, “Robust gait identification using Kinect dynamic skeleton data”, Multimedia Tools and Application, vol. 78, pp. 13925–13948, 2019. https://doi.org/10.1007/s11042-018-6865-910.1007/s11042-018-6865-9 Search in Google Scholar

[33] M. W. Rahman and M. L. Gavrilova, “Kinect gait skeletal joint feature-based person identification,” in IEEE 2017 16th International Conference on Cognitive Informatics and Cognitive Computing, Oxford, UK, July 2017, pp. 423–430. https://doi.org/10.1109/ICCI-CC.2017.810978310.1109/ICCI-CC.2017.8109783 Search in Google Scholar

[34] W. R. Hamilton, “II. On quaternions, or on a new system of imaginaries in algebra,” The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, vol. 25, no. 163, pp. 10–13, 1844. https://doi.org/10.1080/1478644440864492310.1080/14786444408644923 Search in Google Scholar

[35] W. R. Hamilton, “XXXIX. On quaternions, or on a new system of imaginaries in algebra,” The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, vol. 25, no. 166, pp. 241–246, 1844. https://doi.org/10.1080/1478644440864498410.1080/14786444408644984 Search in Google Scholar

[36] Y. Wang, J. Sun, J. Li, and D. Zhao, “Gait recognition based on 3D skeleton joints captured by Kinect,” in IEEE 2016 International Conference on Image Processing, Phoenix, USA, Sep. 2016, pp. 3151–3155. https://doi.org/10.1109/ICIP.2016.753294010.1109/ICIP.2016.7532940 Search in Google Scholar

[37] S. Jiang, Y. Wang, Y. Zhang, and J. Sun, “Real time gait recognition system based on Kinect skeleton feature,” in Asian Conference on Computer Vision, Singapore, Nov. 2014, pp. 1–11. https://doi.org/10.1007/978-3-319-16628-5_410.1007/978-3-319-16628-5_4 Search in Google Scholar

[38] S. Choi, J. Kim, W. Kim, and C. Kim, “Skeleton-based gait recognition via robust frame-level matching,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2577–2592, 2019. https://doi.org/10.1109/TIFS.2019.290182310.1109/TIFS.2019.2901823 Search in Google Scholar

eISSN:
2255-8691
Language:
English