The University of Southampton
University of Southampton Institutional Repository

Can gait biometrics be spoofed?

Can gait biometrics be spoofed?
Can gait biometrics be spoofed?
Gait recognition is a relatively new biometrics and no effort has yet been devoted to studying spoofing attacks against video-based gait recognition systems. Spoofing occurs when a person tries to imitate the clothing and/or walking style of someone else in order to gain illegitimate access and advantages. To gain insight into the performance of current gait biometric systems when confronted to spoofing attacks, we provide in this paper the first investigation in the research literature on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a novel gait spoofing database recorded at the University of Southampton. The experiments point out very interesting findings that can be used as a reference for future investigations by the research community.
Hadid, Abdenour
d7d2f038-b1dd-4c43-b58f-a799d37aeb4d
Bustard, John
8fa23e3b-8594-4c87-81c4-a77e774c8c0b
Nixon, Mark S.
2b5b9804-5a81-462a-82e6-92ee5fa74e12
Hadid, Abdenour
d7d2f038-b1dd-4c43-b58f-a799d37aeb4d
Bustard, John
8fa23e3b-8594-4c87-81c4-a77e774c8c0b
Nixon, Mark S.
2b5b9804-5a81-462a-82e6-92ee5fa74e12

Hadid, Abdenour, Bustard, John and Nixon, Mark S. (2012) Can gait biometrics be spoofed? 21st International Conference on Pattern Recognition (ICPR 2012), Japan. 11 - 15 Nov 2012. 4 pp .

Record type: Conference or Workshop Item (Paper)

Abstract

Gait recognition is a relatively new biometrics and no effort has yet been devoted to studying spoofing attacks against video-based gait recognition systems. Spoofing occurs when a person tries to imitate the clothing and/or walking style of someone else in order to gain illegitimate access and advantages. To gain insight into the performance of current gait biometric systems when confronted to spoofing attacks, we provide in this paper the first investigation in the research literature on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a novel gait spoofing database recorded at the University of Southampton. The experiments point out very interesting findings that can be used as a reference for future investigations by the research community.

Text
hadid ICPR2012.pdf - Other
Download (1MB)

More information

Published date: November 2012
Venue - Dates: 21st International Conference on Pattern Recognition (ICPR 2012), Japan, 2012-11-11 - 2012-11-15
Related URLs:
Organisations: Vision, Learning and Control

Identifiers

Local EPrints ID: 363314
URI: https://eprints.soton.ac.uk/id/eprint/363314
PURE UUID: c0867de0-bfa2-4ebe-852f-5d846b7ad58c
ORCID for Mark S. Nixon: ORCID iD orcid.org/0000-0002-9174-5934

Catalogue record

Date deposited: 20 Mar 2014 16:48
Last modified: 20 Jul 2019 01:28

Export record

Contributors

Author: Abdenour Hadid
Author: John Bustard
Author: Mark S. Nixon ORCID iD

University divisions

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of https://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×