Walk the walk: attacking gait biometrics by imitation

作者: Bendik B. Mjaaland , Patrick Bours , Danilo Gligoroski

DOI: 10.1007/978-3-642-18178-8_31

关键词:

摘要: Since advances in gait biometrics are rather new, the current volume of security testing on this feature is limited. We present a study mimicking, or imitation, human gait. Mimicking very intuitive way attacking biometric system based gait, and still topic almost nonexistent open literature. The bottom line question our research weather it possible to learn walk like someone else. If turned out be easy, would have severe effect potential as an authentication mechanism future. We developed software tool that uses wearable sensors collect analyze acceleration data. further experiment, involving extensive training test subjects, using various sources feedback video statistical analysis. attack scores analyzed by regression, goal determine whether not participants increasing their mimicking skills, simply: if they learning. The experiment involved 50 enrolled into system. error rates compete with state art technology, EER 6.2%. part revealed difficult task, physiological characteristics work against us when we try change something fundamental walk. showed few indications learning, results most attackers even worsened over time, showing did nothing help them succeed. The identified natural boundary impostors' performance, point resistance so significant was given name; plateau. location value plateau predetermines outcome attack; for success has lie below acceptance threshold corresponding Equal Error Rate (EER).

参考文章(18)
Michael J. Pazzani, Eamonn J. Keogh, Derivative Dynamic Time Warping. siam international conference on data mining. pp. 1- 11 ,(2001)
Catherine Soanes, Sara Hawker, Compact Oxford English dictionary of current English Oxford University Press. ,(2005)
Stacy J. Morris, A shoe-integrated sensor system for wireless gait analysis and real-time therapeutic feedback Massachusetts Institute of Technology. ,(2004)
Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle, An Analysis of Minutiae Matching Strength Lecture Notes in Computer Science. pp. 223- 228 ,(2001) , 10.1007/3-540-45344-X_32
Branimir Dukic, Miroslav Katic, m-order - payment model via SMS within the m-banking information technology interfaces. pp. 93- 98 ,(2005) , 10.1109/ITI.2005.1491103
Heikki J. Ailisto, Mikko Lindholm, Jani Mantyjarvi, Elena Vildjiounaite, Satu-Marja Makela, Identifying people from gait pattern with accelerometers Biometric technology for human identification. Conference. ,vol. 5779, pp. 7- 14 ,(2005) , 10.1117/12.603331
K. Pousttchi, M. Schurig, Assessment of today's mobile banking applications from the view of customer requirements hawaii international conference on system sciences. pp. 70184- ,(2004) , 10.1109/HICSS.2004.1265440
N.L. Clarke, S.M. Furnell, Authentication of users on mobile telephones - A survey of attitudes and practices Computers & Security. ,vol. 24, pp. 519- 527 ,(2005) , 10.1016/J.COSE.2005.08.003