identity verification system based on gait recognition
TRANSCRIPT
Team memeber:Mingyang ZhengZhe HeWeijia XuZiyun Wang
Identity Verification System Based on Gait Recognition
Source of InspirationI
IntroductionII
Project FeaturesIV
Scheme of RealizationIII
PerspectiveV
OutLine
DemoVI
1.Situation
Exam Cheating
2.Put forward
I. Source of Inspiration
Gait
Recognition
1 2
34
advantages
Free from
Forging
Active recognition
Efficient and
Reliable
Never Forget
I. Source of Inspiration
II. Introduction
(i) Framework(i) Framework
Plantar pressure information acquisition module
MCUWireless
Communication
Module
PC
Database MatchingDatabase Matching
certified usercertified user
Uncertified Uncertified useruser
accessaccess
rejectionrejection
Scheme
Pressure Collecting Module
MCU Processing Module
Wireless Communication Module
(ii) Hardware(ii) Hardware
1
2
3
1
3 2
II. Introduction
Plantar Pressure
Distribution Information
samplingsampling
II. Introduction
Feature Abstraction Module
Training Module
Authentication module
GUI Module
(iii) Software(iii) Software
4
3
2
11
24
3
II. Introduction
Scheme
Sample
supplementcheck
retain
Voltage
receiving
Record Dimension
Reduction
Original Data -> Feature Vector
II. Introduction
Identity Verification
Testing
Training
Verifying
II. Introduction
1. Hardware Platform
2. Software Platform
III. Scheme of Realization
III. Scheme of Realization
(i)(i) HardwareHardware PlatformPlatform
1. Pressure Collecting Module
3. Wireless Communication Module
2. MCU Processing Module
III. Scheme of Realization
(i)(i) HardwareHardware PlatformPlatform
i Pressure Collecting Interface
Data Recording Interface
Identity Verification Interface
2. Software Platform
III. Scheme of Realization
Pressure Collecting Interface
Data Recording Interface
Identity Verification Interface
III. Scheme of Realization
2. Software Platform
Pressure Collecting Interface
Data Recording Interface
Identity Verification Interface
III. Scheme of Realization
2. Software Platform
1. Biological characteristics certification
3. High Security
2. Active Identification Technology
IV. Project Features
imitat
eVery difficult
to imitate!
The recognition feature is hidden in the user’s behavior
IV. Project Features
1. Biological characteristics certification
Pressure Sensor
The identity feature extraction process is unilaterally completed by the hardware system
IV. Project Features
2. Active Identification Technology
Controversy: Touch ID Fingerprint Unlocking
Copy the fingerprint with fingerprint film
Once leaked,
decrypted forever!
Even if gait is leaked
can not copy!
No need to worry about key information disclosure, can not be copied
IV. Project Features
3. High Security
识别嫌疑人识别嫌疑人 Biological Biological keykey
Information Information encryptionencryption
Access Access control control
systemssystemsBiometricsBiometrics
智能家居智能家居ConfidentialityConfidentiality DepartmentDepartment
DetectionDetection
Identify Identify suspectssuspects
Smart HomeSmart Home
V. Perspective
1. Set up database;
2. Give access to certified user
3. Reject uncertified user
VI. Demo