Abstract—The need for more security on mobile devices is increasing with new functionalities and features made available. To improve the device security we propose gait recognition as a protection mechanism. Unlike previous work on gait recogni-tion, which was based on the use of video sources, floor sensors or dedicated high-grade accelerometers, this paper reports the performance when the data is collected with a commercially available mobile device containing low-grade accelerometers. To be more specific, the used mobile device is the Google G1 phone containing the AK8976A embedded accelerometer sensor [1]. The mobile device was placed at the hip on each volunteer to collect gait data. Preproccesing, cycle detection and recognition-analy...
Abstract: Ubiquitous mobile devices like smartphones and tablets are often not se-cured against unau...
The need to increase the security measures and make the users of different devices feel safer has l...
As the smartphone and the services it provides are becoming targets of cybercrime, it is critical to...
User authentication is a means of identifying the user and verifying that the user is allowed access...
The authentication via accelerometer-based biometric gait recognition offers a user-friendly alterna...
The authentication via accelerometer-based biometric gait recognition offers a user-friendly alterna...
Identification and verification first line of defence of every secure system. Due to the advancement...
Besides revealing useful information, like gender, age, existing impairments, the gait of every pers...
Abstract—The goal of our research is to develop methods for accelerometer-based gait recognition, wh...
Smart environments established by the development of mobile technology have brought vast benefits to...
Abstract—The rapid deployment of sensing technology in smartphones and the explosion of their usage ...
In this paper we present a comparative test of different approaches to gait recognition by smartphon...
Abstract—The rapid deployment of sensing technology in smartphones and the explosion of their usage ...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
This thesis will look at the biometric feature gait, and how different circumstances impact the abil...
Abstract: Ubiquitous mobile devices like smartphones and tablets are often not se-cured against unau...
The need to increase the security measures and make the users of different devices feel safer has l...
As the smartphone and the services it provides are becoming targets of cybercrime, it is critical to...
User authentication is a means of identifying the user and verifying that the user is allowed access...
The authentication via accelerometer-based biometric gait recognition offers a user-friendly alterna...
The authentication via accelerometer-based biometric gait recognition offers a user-friendly alterna...
Identification and verification first line of defence of every secure system. Due to the advancement...
Besides revealing useful information, like gender, age, existing impairments, the gait of every pers...
Abstract—The goal of our research is to develop methods for accelerometer-based gait recognition, wh...
Smart environments established by the development of mobile technology have brought vast benefits to...
Abstract—The rapid deployment of sensing technology in smartphones and the explosion of their usage ...
In this paper we present a comparative test of different approaches to gait recognition by smartphon...
Abstract—The rapid deployment of sensing technology in smartphones and the explosion of their usage ...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
This thesis will look at the biometric feature gait, and how different circumstances impact the abil...
Abstract: Ubiquitous mobile devices like smartphones and tablets are often not se-cured against unau...
The need to increase the security measures and make the users of different devices feel safer has l...
As the smartphone and the services it provides are becoming targets of cybercrime, it is critical to...