Template-based gait authentication through Bayesian thresholding
Citations
16 citations
7 citations
Cites background from "Template-based gait authentication ..."
...Again, however, gait authentication systems relying on cameras [10], [11] present privacy issues....
[...]
4 citations
Cites background from "Template-based gait authentication ..."
...2975219 In many studies, the sensors used in authentication techniques based on the gait and other forms of behavior have been cameras [3], [4]....
[...]
3 citations
2 citations
Cites background from "Template-based gait authentication ..."
...Note that sub-carriers with indices [1, 2, 3, 4, 5, 6, 33, 60, 61, 62, 63, 64] have approximately zero amplitude in this case, and hence, highlighting the importance of the sparsity reduction proposed in Section III-B....
[...]
...1) User Authentication: Majority of the wireless aided user authentication systems in the literature require the user to carry or wear a device to facilitate the authentication process [6]– [8]....
[...]
References
17 citations
"Template-based gait authentication ..." refers methods in this paper
...[9] focused on reducing the effect of clothing variations by extracting a rowwise width vector from the GEnI of the subjects....
[...]
...[9] proposed an intuitive way to locate a gait period by calculating the correlation between the first frame and each of the successive frames....
[...]
15 citations
"Template-based gait authentication ..." refers methods in this paper
...Ghebleh and Moghaddam [10] obtained a similar performance for clothinginvariance by extracting DFT features from the GEI....
[...]
6 citations
Additional excerpts
...[8] addressed the problem of corrupted sil-...
[...]
5 citations
"Template-based gait authentication ..." refers background in this paper
...quantifies the posterior probability for all classes of a system [24]....
[...]