Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System
Abstract
:1. Introduction
2. Literature Review
3. Identification: Legitimate or Counterfeit (ILC) System
3.1. ILC Assumptions and Design Goals
3.1.1. Assumptions
- Assumption 1—Registration: The smartphone accelerometer sensor is activated and records data on the gait pattern of the phone’s user.
- Assumption 2—Smartphone positioning: The smartphone is in the individual’s pocket as they are walking towards the designated destination.
- Assumption 3—Sensing time frame: The individual is walking for at least 90 s, but not exceeding two minutes, traversing a predetermined distance of 100 m in a straight line.
3.1.2. Design Goals
- Goal 1—Seamless identification: ILC should be able to differentiate between a legitimate and counterfeit phone owner without requiring direct user involvement.
- Goal 2—Real-time user verification: ILC should process the sensing of the individual walk pattern, validate it with the stored data, and provide the outcome in real-time.
- Goal 3—High detecting accuracy: ILC should be able to achieve a detection accuracy of 90% or above in identifying counterfeit phone owners, according to the confusion matrix performance metrics [26].
- Goal 4—Lightweight system: ILC system should be designed for minimal memory usage, storing only less critical values on the owner’s device.
3.2. System Components
- Gait Cycle Phases: key measurements in biometric identification, providing a valuable procedure in the gait of a person. The gait cycle comprises two main phases: the stance phase and the swing phase. Each phase is further divided into subphases [27,28,29] as shown in Figure 2. In this section, we provide an overview of the significance of these components in biometric identification.
- Stance Phase: the period of time in which one foot makes contact with the ground and ends when the same foot contacts the ground again. This phase is divided into subphases, such as the loading response, mid stance, and terminal stance [30].
- 2.
- The probability density function (PDF) is a statistical function that defines the probability distribution of a random variable. It is used to measure the similarity score between the registered data and the real-time outcome data. This score indicates the likelihood of an event occurring within a specific range of values [25].
- 3.
- Evaluation metrics refer to quantitative measures used to evaluate the performance and effectiveness of models, algorithms, or analyses. These metrics provide insights to evaluate and compare the effectiveness, accuracy and predictive capabilities of various statistical models or algorithms as shown in Table 2.
- True Positive (TP): Refers to situations in which both the actual and expected classes are positive. This occurs when the system correctly identifies the legitimate phone owner.
- False Positive (FP): Occurs when the actual class is negative, but the anticipated class is positive. Essentially, the system incorrectly identifies someone who is not the legitimate owner, labeling them as legitimate.
- False Negative (FN): Refers to cases where the actual class is positive but the predicted class is negative. In this scenario, the system incorrectly identifies the legitimate phone owner as counterfeit.
- True Negative (TN): Occurs when both the actual and predicted classes are negative, indicating that the system correctly identifies a counterfeit user as not the legitimate owner.
3.3. System Methodology
3.3.1. Know Your Owner (KYO)
- Capture raw sensor data: The process begins by capturing the gait measurements of the owner from the x-axis accelerometer sensor data.
- Data preprocessing: The moving average filter [33], which we denote as the moving average process, is used. This filtering methodology operates by convolving the input signal with a rectangular window function, thereby effecting a smoothing operation on the signal samples. The convolution integral finds the mathematical mean of the signal values within a certain window span. It does this by reducing the high-frequency parts of the signal while keeping the low-frequency parts and step transitions. This approach mitigates the destructive effects of additive noise and enhances the perceptibility of the underlying walking signal. This method calculates the average of data samples within a specified window size of three that moves across the samples.
- Extract gait cycle feature: While various features can be extracted from the gait cycle, our focus is on a single feature, local maximum peak samples. These peak samples are calculated using the following algorithm (Algorithm 1):
Algorithm 1 Gait cycle feature extraction algorithm. 1: Input: ▹Raw Accel-X data, (N: data size) 2: Output: Gait cycle feature—list of the local maximum peak samples 3: Begin: 4: ▹Smoothing data with window size(s), store it in 5: ▹Calculate the mean of , store it in 6: ▹Calculate the standard deviation of , store it in 7: ▹P is a list to store the peak values 8: ▹maxP: local maximum peak threshold, k is a constant equal to 2 9: for to N do ▹Check the smoothed data 10: if (( then 11: Append to P ▹Detect Peaks 12: end if 13: end for 14: Return: P 15: End - Calculate the mean and standard deviation: Afterward, the mean and standard deviation as shown in Equations (2) and (3), respectively, are computed from the phone owner’s peak samples, which represent the usual walking pattern. The mean is calculated as:
- Store mean and standard deviation: The computed mean and standard deviation are then stored on the phone owner’s device for future identity verification purposes.
- Build a Gaussian distribution: We model the legitimate phone owner’s walking pattern using a Gaussian distribution, visually representing the PDF [34]. This density quantifies how probable it is to observe each peak X-acceleration value, providing a clearer picture of data distribution around the mean. The distribution illustrates peak X-acceleration values during gait cycles as depicted in Figure 4. This normal distribution, characterized by the calculated mean () and standard deviation (), provides a statistical summary of the owner’s typical walking pattern, which is essential for establishing a personalized baseline for future verification.
- Calculate probability scores: The probability score for each peak sample is calculated using the PDF as shown in Equation (4), considering the owner’s mean and standard deviation. These probability scores are then used to calculate the verification threshold:
- Calculate the verification threshold: We now proceed to define the threshold score that will ensure an accurate identification of the owner. The threshold score is set for each peak sample as shown in Equation (5) after establishing probability scores as demonstrated in Equation (4). These probability scores, which reflect the typical gait pattern of the phone owner, are averaged to determine the verification threshold as illustrated by the following equation:
Algorithm 2 Verification threshold calculation algorithm. | ||
1: | Input: | ▹P is a set of owner’s peak values retrieved from Algorithm 1, (n:data size) |
2: | Output: verification Threshold | |
3: | Begin: | |
4: | ▹Calculate the mean of P, store it in | |
5: | ▹Calculate the standard deviation of P, store it in | |
6: | ▹ is a list to hold the probability distribution scores | |
7: | for to n do | ▹ n: number of peak samples to calculate the verification threshold |
8: | ▹ Calculate probability using PDF | |
9: | Append to | ▹ Add calculated probability distribution score to the list |
10: | end for | |
11: | Store , | ▹ Store mean and standard deviation on the owner’s device |
12: | ▹Calculate verification threshold using the mean of the probability scores | |
13: | Return: verification Threshold | |
14: | End |
3.3.2. Detection and Control (DAC)
- Capture sensor data (real-time): This action involves the real-time monitoring and analysis of the current phone holder’s gait pattern. Similarly to the KYO process, the DAC component begins with capturing accelerometer data along the x-axis from the current phone holder.
- Data preprocessing: This action involves preprocessing the X-axis accelerometer data using the same process as in KYO. By applying the moving average process, smoother samples are obtained.
- Extract gait cycle feature: Peak sample features are extracted from X-accelerometer sensor samples as shown in Algorithm 1.
- Calculate probability scores: Subsequently, the PDF is established for each peak sample taking into account the owner’s mean and standard deviation. The probability score for each peak of the observed gait pattern is calculated using the following formula:
- Calculate the overall score: The overall probability score is calculated first by determining the total number of peak samples that have close probability values , and then dividing this by the total number of peak samples used for identity verification.
- Verification Threshold: The verification threshold, established in the KYO process, is a benchmark score derived from the owner’s gait data. This threshold is stored on the device and used in the DAC component to verify the legitimacy of the phone user.
- Get Owner Threshold: Retrieve the stored verification threshold from the owner’s device.
- Indicate Legitimate Phone Owner: If the DAC probability score exceeds the verification threshold, the system concludes that the phone is being used by the legitimate owner.
- Indicate Counterfeit User: If the DAC probability score falls below the verification threshold, the system identifies the phone user as a potential counterfeit holder.
4. System Analysis and Validation
4.1. Feature Extraction
4.2. Gait Cycle Features Extraction
- Acceleration Magnitude Calculation: Utilizing the accelerometer sensor, measure the acceleration magnitude on the X, Y, and Z axes.
- Data Smoothing: Apply a moving average technique to the magnitude variable, using a window size of 5, to reduce noise and ensure data consistency.
- Mean and Standard Deviation Calculations: Compute the mean of the acceleration data. Then, compute the first and second standard deviations to establish thresholds for identifying significant local maximum peaks.
- Local Maximum Peaks Detection: Identify the local maximum peaks by applying a threshold of mean + 2 standard deviations, which assumes that approximately 95% of the data falls within this range under a normal distribution.
Algorithm 3 Gait cycle features calculation algorithm. | ||
1: | Input: | ▹Raw Accel-X, Accel-Y, Accel-Z data |
2: | , | ▹m = data size |
3: | , | |
4: | ||
5: | Output: Number of strides, average stride time, total time. | |
6: | Begin: | |
7: | ▹Initialize magnitude list | |
8: | for timestamp to m do | |
9: | value of acceleration in the X-axis at timestamp t | |
10: | value of acceleration in the Y-axis at timestamp t | |
11: | value of acceleration in the Z-axis at timestamp t | |
12: | ▹ Smooth data with consistent window size(s) | |
13: | ▹ Calculate the magnitude | |
14: | Append to magnitudeList | |
15: | end for | |
16: | ▹Calculate mean of magnitudeList | |
17: | ▹Calculate standard deviation of magnitudeList | |
18: | ▹Initialize list for local maximum peaks | |
19: | ▹maxP: local maximum peak threshold, k is a constant equals to 2. | |
20: | for to length(magnitudeList) do | |
21: | if then | |
22: | Append to peakList | ▹ Detect peaks |
23: | end if | |
24: | end for | |
25: | ▹Number of strides | |
26: | ▹Initialize list for times between peaks | |
27: | for to do | |
28: | strideTime← | |
29: | Append strideTime to strideTimeList | |
30: | end for | |
31: | ▹Average stride time | |
32: | ▹Total experiment time | |
33: | ←DetectPeaks(X) | ▹X-peaks as defined in Peak Algorithm 1 |
34: | Return: , | |
35: | End |
- Number of Strides: Accurately determine the total number of strides by subtracting the initial peak from the count of local maximum peaks. This correction accounts for the initial peak, which may not be associated with a preceding stride and is therefore excluded from the stride count.
- Average Stride Time: Calculate the time duration between two consecutive local maximum peaks, then average these durations to determine the average stride time.
- Total Experiment Time: Determine the exact data points (timestamps) that mark the start and end of the walking activity.
5. Experiment and Result
5.1. Experiment
- Data Acquisition Team: A diverse group of 10 people (users), carefully selected to include a (3:7) distribution ratio across gender’s representation and age groups, facilitated the data collection process. This team is comprised of male and female participants; their age demographics are strategically segmented into two distinct categories, the first encompassing those within the 22–25 year age bracket, and the second encompassing individuals ranging from 26 to 30 years of age. This deliberate selection criteria ensured a well-rounded perspective, capturing the variations that may arise from the interplay of gender and generational differences within the targeted sample.Users were instructed to walk in a straight line for 100 m on the Western University Football Field, with data acquisition occurring at a frequency of 100 Hz. This process yielded a dataset comprising a total of 12,000 samples obtained from the accelerometer sensor on the X-axis, generated in CSV format.
- Data preprocessing: We performed a series of steps to refine the collected data. Initially, we removed the initial records gathered during preparation and the data captured when the users’ tasks ended and the recording ceased. This step aimed to eliminate potential noise in the data, ensuring that the retained data accurately reflect the intended measurements. Additionally, we employed the moving average process, which involves calculating the average of a small group of neighboring data points using a window size of five. This approach resulted in smoother data, enhancing the ability to identify meaningful user patterns during the analysis.
- Experiment setup: The data for this experiment consist of 12,000 samples. Specifically, 7500 samples represent data from the phone owner, while the remaining 4500 samples are from unauthorized phone holders. The phone owner’s samples are divided into three distinct segments: 3000 samples are allocated for constructing the phone owner’s normal distribution, 2000 samples are used to determine the threshold value, and the remaining 2500 samples, along with the 4500 samples from unauthorized phone holders, are used for real-time verification.
5.2. Results
5.2.1. Gait Cycle Features Analysis
5.2.2. Overall Accuracy Evaluation
5.2.3. Real-Time User Verification
- Calculate DAC Probability Score: The phone calculates the DAC probability score, quantifying the likelihood that the current user’s gait matches the known pattern. This score is a numeric representation of similarity; higher scores indicate a closer match to the expected gait pattern, while lower scores suggest a significant deviation from the original owner’s gait pattern.
- Decision-Making: This step involves comparing the calculated DAC probability score against a set verification threshold, determined based on the mean and standard deviations from the phone owner’s typical data. The system evaluates whether the DAC probability score exceeds the verification threshold derived from the owner’s mean and variance. If it does, it implies that the new peak data closely match the owner’s typical peak data as defined by the KYO probability distribution. This similarity indicates that the device is likely being used by the legitimate owner. Conversely, if the DAC probability score falls below the verification threshold, it suggests that the current holder’s peak data significantly deviate from the owner’s typical walking patterns, suggesting that the phone is in the hands of an unauthorized user.
5.2.4. Analyzing Data Variability
6. Discussion and Conclusion
6.1. Discussion
6.2. Conclusions
- The ILC system achieves an accuracy of 92.18% in recognizing unauthorized phone holders, illustrating the effectiveness of the proposed approach for user identification. Furthermore, the extracted gait cycle features expose variations among users, further accentuating the potential integration of this application to increase verification reliability.
- A new solution for real-time behavior analysis, introduced as an identification method, seamlessly verifies the eligibility of legitimate phone holders.
- The proposed method outperforms some other statistical methods with no need for training and low complexity.
- This new approach focuses first on verifying the identity of the smartphone’s owner. Once the phone verifies its rightful owner, it can be used to access a range of accounts and services seamlessly. This innovation eliminates the need to remember multiple passwords for various accounts, simplifying the verification process and enhancing user convenience.
- Lightweight System: The memory usage of the ILC system is minimal, storing only three values on the owner’s device: the mean, the standard deviation, and the verification threshold.
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Hussain, H. Password Security: Best Practices and Management Strategies. 2022. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstractid=4136333 (accessed on 18 June 2024).
- Sobers, R. 84 Must-Know Data Breach Statistics. 2023. Available online: https://www.varonis.com/blog/data-breach-statistics (accessed on 10 November 2023).
- Okoli, K.; Bekeneva, Y. Balancing security and user experience in the evolving digital landscape. E3S Web Conf. 2024, 471, 04007. [Google Scholar] [CrossRef]
- Okoli, K.; Joseph, I.; Chijioke, F.; Bekeneva, Y.; Chijioke, A.; Kodondo, I. Human-Machine Interaction in E-commerce: A Multi-Faceted Examination of CAPTCHA Effect. In Proceedings of the 2024 Conference of Young Researchers in Electrical and Electronic Engineering (ElCon), Saint Petersburg, Russia, 29–31 January 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 259–263. [Google Scholar]
- Panchal, G.; Samanta, D.; Das, A.K.; Kumar, N.; Choo, K.K.R. Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services. IEEE Trans. Cloud Comput. 2022, 10, 749–761. [Google Scholar] [CrossRef]
- Salunke, S.V.; Ouda, A. Ensemble Learning to Enhance Continuous User Authentication for Real World Environments. In Proceedings of the 2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Istanbul, Turkiye, 4–7 July 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 102–108. [Google Scholar]
- Liu, Y.; Zhou, T.; Yue, Z.; Liu, W.; Han, Y.; Li, Q.; Yang, X. Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing. IEEE Trans. Cloud Comput. 2023, 11, 564–578. [Google Scholar] [CrossRef]
- Galbally, J.; Marcel, S.; Fierrez, J. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition. IEEE Trans. Image Process. 2014, 23, 710–724. [Google Scholar] [CrossRef]
- Bansal, P.; Ouda, A. Continuous Authentication in the Digital Age: An Analysis of Reinforcement Learning and Behavioral Biometrics. Computers 2024, 13, 103. [Google Scholar] [CrossRef]
- Huang, X.; Boulgouris, N.V. Unobtrusive Biometric Identification Based on Gait. In Biometrics: Theory, Methods, and Applications; Wiley: Hoboken, NJ, USA, 2010; pp. 539–558. [Google Scholar] [CrossRef]
- Pataky, T.C.; Mu, T.; Bosch, K.; Rosenbaum, D.; Goulermas, J.Y. Gait recognition: Highly unique dynamic plantar pressure patterns among 104 individuals. J. R. Soc. Interface 2012, 9, 790–800. [Google Scholar] [CrossRef]
- Maulana, N.; Istiqomah, F.; Priananda, C.W. Integration of Centralized Fingerprint Biometric Authentication to Prevent Room Access Violations Using RBAC. In Proceedings of the 2023 International Conference on Advanced Mechatronics, Intelligent Manufacture and Industrial Automation (ICAMIMIA), Surabaya, Indonesia, 14–15 November 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 905–909. [Google Scholar]
- Sharma, S.; Saini, A.; Chaudhury, S. A survey on biometric cryptosystems and their applications. Comput. Secur. 2023, 134, 103458. [Google Scholar] [CrossRef]
- Bagwan, S.M.R.; Gupta, G.; Thigale, S.B. Robust Multi-Bio-Metric Authentication Framework in Face and Iris recognition. In Proceedings of the 2023 2nd International Conference for Innovation in Technology (INOCON), Bangalore, India, 3–5 March 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–10. [Google Scholar]
- Priyanka, V.; Shyam, G.K. Enhancement of Accuracy for Iris Presentation Attack. In Proceedings of the 2023 International Conference on Network, Multimedia and Information Technology (NMITCON), Bengaluru, India, 1–2 September 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–7. [Google Scholar]
- Cao, Q.; Xu, F.; Li, H. User authentication by gait data from smartphone sensors using hybrid deep learning network. Mathematics 2022, 10, 2283. [Google Scholar] [CrossRef]
- Wang, Y.; Zhang, X.; Hu, H. Continuous User Authentication on Multiple Smart Devices. Information 2023, 14, 274. [Google Scholar] [CrossRef]
- Zeng, X.; Zhang, X.; Yang, S.; Shi, Z.; Chi, C. Gait-based implicit authentication using edge computing and deep learning for mobile devices. Sensors 2021, 21, 4592. [Google Scholar] [CrossRef]
- Zou, Q.; Wang, Y.; Wang, Q.; Zhao, Y.; Li, Q. Deep learning-based gait recognition using smartphones in the wild. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3197–3212. [Google Scholar] [CrossRef]
- Chen, F.S.; Belman, A.K.; Phoha, V.V. Formalizing PQRST Complex in Accelerometer-based Gait Cycle for Authentication. arXiv 2022, arXiv:2205.07108. [Google Scholar]
- Kumari, S.; Singh, K.; Khan, T.; Ariffin, M.M.; Mohan, S.K.; Baleanu, D.; Ahmadian, A. A novel approach for continuous authentication of mobile users using Reduce Feature Elimination (RFE): A machine learning approach. Mob. Netw. Appl. 2023, 28, 767–781. [Google Scholar] [CrossRef]
- Axente, M.S.; Dobre, C.; Ciobanu, R.I.; Purnichescu-Purtan, R. Gait recognition as an authentication method for mobile devices. Sensors 2020, 20, 4110. [Google Scholar] [CrossRef]
- Delgado-Santos, P.; Tolosana, R.; Guest, R.; Vera-Rodriguez, R.; Deravi, F.; Morales, A. GaitPrivacyON: Privacy-preserving mobile gait biometrics using unsupervised learning. Pattern Recognit. Lett. 2022, 161, 30–37. [Google Scholar] [CrossRef]
- Muro-De-La-Herran, A.; Garcia-Zapirain, B.; Mendez-Zorrilla, A. Gait analysis methods: An overview of wearable and non-wearable systems, highlighting clinical applications. Sensors 2014, 14, 3362–3394. [Google Scholar] [CrossRef] [PubMed]
- Nguyen-Trang, T.; Nguyen-Thoi, T.; Nguyen-Thi, K.N.; Vo-Van, T. Balance-driven automatic clustering for probability density functions using metaheuristic optimization. Int. J. Mach. Learn. Cybern. 2023, 14, 1063–1078. [Google Scholar] [CrossRef]
- Sokolova, M.; Lapalme, G. A systematic analysis of performance measures for classification tasks. Inf. Process. Manag. 2009, 45, 427–437. [Google Scholar] [CrossRef]
- Price, C.; Schmeltzpfenning, T.; Nester, C.J.; Brauner, T. Foot and footwear biomechanics and gait. In Handbook of Footwear Design and Manufacture; Elsevier: Amsterdam, The Netherlands, 2021; pp. 79–103. [Google Scholar]
- Zhao, H.; Xu, H.; Wang, Z.; Wang, L.; Qiu, S.; Peng, D.; Li, J.; Jiang, J. Analysis and evaluation of hemiplegic gait based on wearable sensor network. Inf. Fusion 2023, 90, 382–391. [Google Scholar] [CrossRef]
- Núñez-Trull, A.; Álvarez-Medina, J.; Jaén-Carrillo, D.; Rubio-Peirotén, A.; Roche-Seruendo, L.E.; Gómez-Trullén, E.M. Influence of walking speed on gait spatiotemporal parameters and the functional rockers of the foot in healthy adults. Med. Eng. Phys. 2023, 104002. [Google Scholar] [CrossRef]
- Cho, H. Walking Speed Estimation and Gait Classification Using Plantar Pressure and On-Device Deep Learning. IEEE Sens. J. 2023, 23, 23336–23347. [Google Scholar] [CrossRef]
- Di Gregorio, R.; Vocenas, L. Identification of gait-cycle phases for prosthesis control. Biomimetics 2021, 6, 22. [Google Scholar] [CrossRef] [PubMed]
- Ruuska, S.; Hämäläinen, W.; Kajava, S.; Mughal, M.; Matilainen, P.; Mononen, J. Evaluation of the confusion matrix method in the validation of an automated system for measuring feeding behaviour of cattle. Behav. Process. 2018, 148, 56–62. [Google Scholar] [CrossRef] [PubMed]
- Han, D.; Bashar, S.K.; Lázaro, J.; Mohagheghian, F.; Peitzsch, A.; Nishita, N.; Ding, E.; Dickson, E.L.; DiMezza, D.; Scott, J.; et al. A real-time ppg peak detection method for accurate determination of heart rate during sinus rhythm and cardiac arrhythmia. Biosensors 2022, 12, 82. [Google Scholar] [CrossRef]
- Chen, J. Normal Distribution: What It Is, Uses, and Formula. Investopedia. 2024. Available online: https://www.investopedia.com/terms/n/normaldistribution.asp (accessed on 13 March 2024).
- Micucci, D.; Mobilio, M.; Napoletano, P. Unimib shar: A dataset for human activity recognition using acceleration data from smartphones. Appl. Sci. 2017, 7, 1101. [Google Scholar] [CrossRef]
- Auliya, S.F.; Nugroho, L.E.; Setiawan, N.A. User identification using smartphone activity data. In Proceedings of the AIP Conference Proceedings, Yogyakarta, Indonesia, 7–8 September 2021; AIP Publishing: Melville, NY, USA, 2023; Volume 2654. [Google Scholar]
Method | Characteristics | Advantages | Limitations |
---|---|---|---|
RBAC System by N. Maulana et al. [12] | Uses BioLite N2 fingerprint scanners at each door entry to ensure access based on employee roles. | Ensures access control based on roles, simplifies management for single devices. | Inability to define roles accurately across heterogeneous devices, time and location restrictions, physical discomfort from touching scanners. |
Multi-Modal Framework by S. M. R et al. [14] | Combines facial and iris traits for identity verification. | Improved security and processing speed, more effective than single-trait systems. | Requires significant storage, advanced algorithms, and processing power; resource-intensive. |
DC-CNNPAD by V. Priyanka and G. K. [15] | Uses Dual Channel Convolutional Neural Network for iris presentation attack detection. | High accuracy in detecting fake iris presentations, suitable for smartphones, low energy consumption. | Challenges in enhancing both identification and privacy, dependency on specific datasets, computational complexity. |
Gait Evaluation by A. Muro-De- La-Herran et al. [24] | Uses wearable sensors on lower legs to capture gait patterns. | Valuable insights into gait patterns, potential for clinical applications. | Limited by controlled settings, lack of long-term follow-up, discomfort from constant wear, environmental constraints. |
HDLN System by Cao et al. [16] | Uses CNN and LSTM algorithms for mobile gait recognition with smartphone sensors. | Improved feature-learning performance, good recognition performance. | Complex, requires extensive training, high computational requirements, not suitable for large datasets. |
PQRST Complex by F. S. Chen et al. [20] | Uses accelerometer to capture foot movement in three dimensions for user recognition. | Enhances identification system performance, focuses on swing phase. | May overlook insights from stance phase, high power consumption and computational demands. |
Smartphone-Based Framework by S. Kumari et al. [21] | Captures daily activity patterns using accelerometer, magnetometer, and gyroscope. | High performance with various ML algorithms, aims to replace traditional verification methods. | High computational cost and system processing time, not the most pragmatic for smartphones. |
Gait Recognition by M.S. Axente et al. [22] | Utilizes built-in sensors on Android devices for gait recognition. | Significant performance with histogram similarity, enhanced with gyroscope inputs. | Continuous data collection and processing strain battery resources. |
GaitPrivacyON by P. Delgado-Santos et al. [23] | Merges CNN and RNN for mobile gait recognition. | Privacy-preserving, effective user identification. | High computational requirements, challenges in real-world application. |
Decision/Status | Legitimate | Counterfeit |
---|---|---|
Legitimate | TP | FP |
Counterfeit | FN | TN |
Experimental Setup Item | Settings |
---|---|
Number of users Activity Session length Age range Sex Time line Device Data sampling | 10 Walking with phones in pocket Approx: 90 s–less than 2 min 22 years to 30 years 3 male & 7 female 2 weeks iPhone 11 100 Hz |
User | Number of Strides | Average Stride Time (s) | Total Time (s) |
---|---|---|---|
1 | 92 | 0.984 | 89.389 |
2 | 63 | 1.097 | 67.936 |
3 | 52 | 1.155 | 59.301 |
4 | 96 | 0.658 | 62.037 |
5 | 81 | 0.741 | 58.997 |
6 | 66 | 1.052 | 64.243 |
7 | 91 | 0.726 | 63.943 |
8 | 57 | 1.043 | 58.373 |
9 | 104 | 0.579 | 60.108 |
10 | 87 | 0.796 | 69.211 |
Phone Owner | Accuracy (%) |
---|---|
1 | 94.95 |
2 | 87.13 |
3 | 87.02 |
4 | 86.70 |
5 | 84.71 |
6 | 94.97 |
7 | 98.35 |
8 | 98.30 |
9 | 92.63 |
10 | 97.06 |
Average accuracy | 92.18 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Edrah, A.; Ouda, A. Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System. Computers 2024, 13, 159. https://doi.org/10.3390/computers13070159
Edrah A, Ouda A. Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System. Computers. 2024; 13(7):159. https://doi.org/10.3390/computers13070159
Chicago/Turabian StyleEdrah, Aisha, and Abdelkader Ouda. 2024. "Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System" Computers 13, no. 7: 159. https://doi.org/10.3390/computers13070159
APA StyleEdrah, A., & Ouda, A. (2024). Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System. Computers, 13(7), 159. https://doi.org/10.3390/computers13070159