2011
DOI: 10.1007/978-3-642-18178-8_31
|View full text |Cite
|
Sign up to set email alerts
|

Walk the Walk: Attacking Gait Biometrics by Imitation

Abstract: Abstract. Since advances in gait biometrics are rather new, the current volume of security testing on this feature is limited. We present a study on mimicking, or imitation, of the human gait. Mimicking is a very intuitive way of attacking a biometric system based on gait, and still this topic is almost nonexistent in the open literature. The bottom line question in our research is weather it is possible to learn to walk like someone else. If this turned out to be easy, it would have a severe effect of the pot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(27 citation statements)
references
References 9 publications
0
27
0
Order By: Relevance
“…The gait of a subject is visible to potential attackers who might analyze it to get access to the phone via mimicking. This was considered in a study by Mjaaland [8]. Despite having obtained feedback in the form of videos and statistical analysis, the participants did not show a significant improvement in learning a different gait.…”
Section: Introductionmentioning
confidence: 94%
See 1 more Smart Citation
“…The gait of a subject is visible to potential attackers who might analyze it to get access to the phone via mimicking. This was considered in a study by Mjaaland [8]. Despite having obtained feedback in the form of videos and statistical analysis, the participants did not show a significant improvement in learning a different gait.…”
Section: Introductionmentioning
confidence: 94%
“…The cycles identified in the previous step are cleaned by deleting unusual cycles (see also [8]). The pairwise distance between all cycles is computed using dynamic time warping (DTW) [12].…”
Section: E Omit Unusual Cyclesmentioning
confidence: 99%
“…The minimal polynomials for each element in GF(2 v ) are determined, respectively. Then, the generator polynomial g(x) is calculated according to (10). Finally, m(x) is multiplied by g(x) yielding a codeword c(x) = c n−1 x n−1 + c n−2 x n−2 + · · · + c 0 , where c 0 · · · c n−1 are coefficients of the codeword…”
Section: Bch Encoding Schemementioning
confidence: 99%
“…Specifically, gait could be collected implicitly without the user awareness. It is difficult to mimic gait data [10], whereas a copy of a fingerprint or face could be easily obtained, and the system security fully depends on the resistance of the sensor [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation