Authentication Using Gait Analysis: As Human gait is unique for every individual.It is synchroniztion between skeletal,neurological and muscular system of human body.And human gait is acheived by locomotion achieved by the limb movement.So we eill use data related to human ga
Authentication using gait analysis
Authentication Using Gait Analysis:
As Human gait is unique for every individual.It is synchroniztion between skeletal,neurological and muscular system of human body.And human gait is acheived by locomotion achieved by the limb movement.So we eill use data related to human gait and we will use these to identify the person.
Authentication Methods:
Authentication:
Authentication is a process which is used to check credentials, identify user when there is a request to enter a system. Some of the authentication methods are traditional (username, password), biometric, facial recognition, retinal scan, gait recognition etc.
Why there was need for Authentication:
Authentication was developed to make our system secure. Its basic purpose was to not allow unknown access to our system.
Single factor Authentication (SFA):
Single factor authentication is a basic form of authentication. In SFA a person credentials are verified. The basic form of SFA is checking password to username. It is common type of authentication technique.
Multi factor Authentication (SFA):
Multi factor authentication uses combination of different factors like username, pin, fingerprint, smart card etc.
Traditional Authentication Method:
The traditional authentication method is username, password method. In this method password is checked(verified).
In this method, username, passwords are stored locally on a server. When a user enters username and passwords, they are compared with the data in a local server, if it matches then access is granted.
Why it is not preferrable:
It is not preferable because of the security. As data is stored on a local server so data can be easily accessed, so it not preferrable. So other authentication techniques were introduced.
Authentication system using gait analysis.
The purpose of Authentication System is to provide a suitable environment for user for authentication rather than using traditional method (id, password system). This system will store the data taken from different users and will grant access(authenticate) to them if their data matches the data stored in the system.
Scope:
Constraints:
Objectives:
As it is state of the art system, so user does not need to remember passwords, id like for old authentication systems. This system will also ease the organization in monitoring the data related to their users.
Assumptions:
As Human gait is unique for every individual.It is synchroniztion between skeletal,neurological and muscular system of human body.And human gait is acheived by locomotion achieved by the limb movement.So we eill use data related to human gait and we will use these to identify the person.
We will use different data sets and will analyze them and will make a system.
we will use ECG ttecnique for data collection.
As this system is different from regular( traditional) authentication method in which one has to remeber the password and id in order to access in the system, so there is no need to remeber credentials.
System will store data about the user like it will recod the time in which they were given access.
System will prevent from invalid accessa s it is difficult to break in the systrem.
As the final system will be in the form of a complete system, so it should work properly.It should be according to the design which was made in the start of project.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| digital watch | Equipment | 2 | 20000 | 40000 |
| Sensors | Miscellaneous | 6 | 1000 | 6000 |
| Total in (Rs) | 46000 |
The designed project aims at tracking the sun to achieve the maximum sun light incident on...
People die in road accidents every day. Most of the accidents occur due to distraction and...
Our FYP is based on the disposal of IEDs. There are two types of IEDs at the moment. The f...
Abrasive water jet cutting machine is an innovative industrial tool that incorporates...
Conventional Heat Exchangers are classified as parallel, counter or cross flow in which he...