identity verification system based on gait recognition
TRANSCRIPT
Team memeber:Mingyang ZhengZhe HeWeijia XuZiyun Wang
Identity Verification System Based on Gait Recognition
Source of InspirationI
IntroductionII
Project FeaturesIV
Scheme of RealizationIII
PerspectiveV
OutLine
DemoVI
Gait
Recognition
1 2
34
advantages
Free from
Forging
Active recognition
Efficient and
Reliable
Never Forget
I. Source of Inspiration
II. Introduction
(i) Framework(i) Framework
Plantar pressure information acquisition module
MCUWireless
Communication
Module
PC
Database MatchingDatabase Matching
certified usercertified user
Uncertified Uncertified useruser
accessaccess
rejectionrejection
Scheme
Pressure Collecting Module
MCU Processing Module
Wireless Communication Module
(ii) Hardware(ii) Hardware
1
2
3
1
3 2
II. Introduction
Feature Abstraction Module
Training Module
Authentication module
GUI Module
(iii) Software(iii) Software
4
3
2
11
24
3
II. Introduction
Scheme
Sample
supplementcheck
retain
Voltage
receiving
Record Dimension
Reduction
Original Data -> Feature Vector
II. Introduction
III. Scheme of Realization
(i)(i) HardwareHardware PlatformPlatform
1. Pressure Collecting Module
3. Wireless Communication Module
2. MCU Processing Module
i Pressure Collecting Interface
Data Recording Interface
Identity Verification Interface
2. Software Platform
III. Scheme of Realization
Pressure Collecting Interface
Data Recording Interface
Identity Verification Interface
III. Scheme of Realization
2. Software Platform
Pressure Collecting Interface
Data Recording Interface
Identity Verification Interface
III. Scheme of Realization
2. Software Platform
1. Biological characteristics certification
3. High Security
2. Active Identification Technology
IV. Project Features
imitat
eVery difficult
to imitate!
The recognition feature is hidden in the user’s behavior
IV. Project Features
1. Biological characteristics certification
Pressure Sensor
The identity feature extraction process is unilaterally completed by the hardware system
IV. Project Features
2. Active Identification Technology
Controversy: Touch ID Fingerprint Unlocking
Copy the fingerprint with fingerprint film
Once leaked,
decrypted forever!
Even if gait is leaked
can not copy!
No need to worry about key information disclosure, can not be copied
IV. Project Features
3. High Security
识别嫌疑人识别嫌疑人 Biological Biological keykey
Information Information encryptionencryption
Access Access control control
systemssystemsBiometricsBiometrics
智能家居智能家居ConfidentialityConfidentiality DepartmentDepartment
DetectionDetection
Identify Identify suspectssuspects
Smart HomeSmart Home
V. Perspective