Gait Based Biometric Authentication System with Reduced Search Space

Gait Based Biometric Authentication System with Reduced Search Space

L. R. Sudha (Annamalai University, India) and R. Bhavani (Annamalai University, India)
DOI: 10.4018/978-1-4666-9685-3.ch012
OnDemand PDF Download:


Deployment of human gait in developing new tools for security enhancement has received growing attention in modern era. Since the efficiency of any algorithm depends on the size of search space, the aim is to propose a novel approach to reduce the search space. In order to achieve this, the database is split into two based on gender and the search is restricted in the identified gender database. Then highly discriminant gait features are selected by forward sequential feature selection algorithm in the confined space. Experimental results evaluated on the benchmark CASIA B gait dataset with the newly proposed combined classifier kNN-SVM, shows less False Acceptance Rate (FAR) and less False Rejection Rate (FRR).
Chapter Preview


Authentication is a process of verifying the identity of the user in order to determine whether to allow an individual to access the system. This is the first line of defense for protecting any resource. It is an area which has grown before last two decades and become most widely used today, by finding applications in many places. The three factors in which authentication methods based on are what you know (Knowledge based), what you have (Object based) and what you are (Biometric based).

Knowledge Based Authentication

Password or secret phrase or PIN-based authentication schemes are examples of knowledge based type (Conklin et al. 2004). People can prove their identity by providing passwords or PINs. User name and password is the most common form for authenticating users to control access to personal computers, networks and internet. PIN codes are another example of authentication used to get access bank account and withdraw money from an ATM machine. For a long time it was the only one type of authentication used, because it is cheap, easy to implement and also very fast. Due to this, it is used in many different applications.

So an average person has many password protected accounts today. Because of the difficulty in remembering all passwords, people either use the same password for multiple accounts, or choose passwords that are easy to remember. Unfortunately, easy to remember usually means easy to guess. Some users select difficult passwords but then write them down where unauthorized eyes can find them. Thus, attempting to achieve greater security can actually result in worse security. Passwords can also be stolen by one system masquerading as another and by key loggers (whether hardware or software), or malware. So weakness in this type of authentication system is, passwords can often be forgotten, stolen, accidentally revealed or can be guessed.

Complete Chapter List

Search this Book: