SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
Identification of Humans Using Gait

(Synopsis)
Abstract
We propose a view-based approach to recognize humans from their
gait. Two different image features have been considered: the width of
the outer contour of the binarized silhouette of the walking person and
the entire binary silhouette itself. To obtain the observation vector
from the image features, we employ two different methods. In the first
method, referred to as the indirect approach, the high-dimensional
image feature is transformed to a lower dimensional space by
generating what we call the frame to exemplar (FED) distance. The
FED vector captures both structural and dynamic traits of each
individual. For compact and effective
gait representation and recognition, the gait information in the FED
vector sequences is captured in a hidden Markov model (HMM). In the
second method, referred to as the direct approach, we work with the
feature vector directly (as opposed to computing the FED) and train an
HMM. We estimate the HMM parameters
(specifically the observation probability ) based on the distance
between the exemplars and the image features. In this way, we avoid
learning high-dimensional probability density functions. The statistical
nature of the HMM lends overall robustness to representation and
recognition.
Overview Of Project

GAIT refers to the style of walking of an individual. Often, in surveillance
applications, it is difficult to get face or iris information at the resolution required for
recognition. Studies in psychophysics indicate that humans have the capability of
recognizing people from even impoverished displays of gait, indicating the presence of
identity information in gait. From early medical studies, it appears that there are 24
different components to human gait, and that, if all the measurements are
considered, gait is unique. It is interesting, therefore, to study the utility of gait as a
biometric. A gait cycle corresponds to one complete cycle from rest (standing) position
to-right-foot-forward-to-rest-to-left-foot forward- to-rest position. The movements within
a cycle consist of the motion of the different parts of the body such as head, hands, legs,
etc. The characteristics of an individual are reflected
not only in the dynamics and periodicity of a gait cycle but also in the height and width
of that individual. Given the video of an unknown individual, we wish to use gait as a cue
to find who among the individuals in the database the person
is. For a normal walk, gait sequences are repetitive and exhibit nearly periodic behavior.
As gait databases continue to grow in size, it is conceivable that identifying a person only
by gait may be difficult. However, gait can still serve as a useful filtering tool that allows
us to narrow the search down to a considerably
smaller set of potential candidates. Approaches in computer vision to the gait recognition
problem can be broadly classified as being either model-based or
model-free. Both methodologies follow the general framework of feature extraction,
feature correspondence and high-level processing. The major difference is with regard to
feature correspondence between two consecutive frames. Methods which
assume a priori models match the two-dimensional (2-D) image sequences to the model
data. Feature correspondence is automatically achieved once matching between the
images and the model data is established. Examples of this approach include the work of
Lee et al., where several ellipses are fitted to different parts
of the binarized silhouette of the person and the parameters of these ellipses such as
location of its centroid, eccentricity, etc. are used as a feature to represent the gait of a
person. Recognition is achieved by template matching. In , Cunado et al. extract a gait
signature by fitting the movement of the thighs to an articulated
pendulum-like motion model. The idea is somewhat similar to an early work by Murray
who modeled the hip rotation angle as a simple pendulum, the motion of which was
approximately described by simple harmonic motion. In activity specific static
parameters are extracted for gait recognition. Model-free
methods establish correspondence between successive frames based upon the prediction
or estimation of features related to position, velocity, shape, texture, and color.
Alternatively, they assume some implicit notion of what is being observed. Examples of
this approach include thework ofHuang et al.,whouse optical flow to derive a motion
image sequence for a walk cycle.
Principal components analysis is then applied to the binarized silhouette to derive
what are called eigen gaits. Benabdelkader et al. use image self-similarity plots as a gait
feature. Little and Boyd extract frequency and phase features from moments of the
motion image derived from optical flow and use template
matching to recognize different people by their gait. Acareful analysis of gaitwould
reveal that it has two important components. The first is a structural component that
captures the physical build of a person, e.g., body dimensions, length of limbs,
etc. The secnd component is the motion dynamics of the body during a gait cycle. Our
effort in this paper is directed toward deriving and fusing information from these two
components.We propose a systematic approach to gait recognition by building
representations for the structural and dynamic components of gait. The assumptions we
use are: 1) the camera is static and the only motion within the field of view is that of the
moving person and 2) the subject is monitored by multiple cameras so that the
subject presents a side viewto at least one of the cameras. This is because the gait of a
person is best brought out in the side view. The image sequence of that camera which
produces the best side view is used. Our experiments were set up in line with the above
assumptions.
We considered two image features, one being the width of the outer contour of the
binarized silhouette, and the other being the binary silhouette itself. A set of exemplars
that occur during a gait cycle is derived for each individual. To obtain the observation
vector from the image features we employ two different
methods. In the indirect approach the high-dimensional image feature is transformed to a
lower dimensional space by generating the frame to exemplar (FED) distance. The FED
vector captures both structural and dynamic traits of each individual.
For compact and effective gait representation and recognition, the gait information in the
FED vector sequences is captured using a hidden Markov model (HMM) for each
individual. In the direct approach, we work with the feature vector directly
and train an HMM for gait representation. The difference between the direct and indirect
methods is that in the former the feature vector is directly used as the observation vector
for the HMM whereas in the latter, the FED is used as the observation vector. In the
direct method, we estimate the observation
probability by an alternative approach based on the distance between the exemplars and
the image features. In this way, we avoid learning high-dimensional probability density
functions. The performance of the methods is tested on different databases.
Description of the Problem
An important issue in gait is the extraction of appropriate salient features that will
effectively capture the gait characteristics. The features must be reasonably robust to
operating conditions and should yield good discriminability across individuals.
As mentioned earlier, we assume that the side view of each individual is available.
Intuitively, the silhouette appears to be a good feature to look at as it captures the motion
of most of the body parts. It also supports night vision capability as it can be
derived from IR imagery also. While extracting this feature we are faced with two
options.
1) Use the entire silhouette.
2) Use only the outer contour of the silhouette.
The choice of using either of the above features depends upon the quality of the binarized
silhouettes. If the silhouettes are of good quality, the outer contour retains all the
information of the silhouette and allows a representation, the dimension of
which is an order of magnitude lower than that of the binarized silhouette. However, for
low quality, low resolution data, the extraction of the outer contour from the binarized
silhouette may not be reliable. In such situations, direct use of the binarized
silhouette may be more appropriate.
We choose the width of the outer contour of the silhouette as one of our feature vectors.
In Fig. 1, we show plots of the width profiles of two different individuals for several gait
cycles. Since we use only the distance between the left and right extremities of the
silhouette, the two halves of the gait cycle are almost indistinguishable. From here on, we
refer to half cycles as cycles, for the sake of brevity.

Existing System
There are various biometric based concepts are used in industrial applications for
identification of an individual. They are
•

Signature verification (ie comparing a 'new' signature or signing with
previously enrolled reference information) takes two forms: dynamic
signature verification and analysis of a static signature

•

Face Recognition method using Laplace faces and also using other methods

•

Identification by voice rather than appearance has a long history in literature
(a 1930s)

•

Iris recognition methods

•

Recognition using Digital Signatures

•

The existing system has some drawbacks. The problems are:
o Not unique
o Easily malpractice can be possible
o Easily traceable by intruders
o Low reliability
o No unique identification
Proposed System
GAIT refers to the style of walking of an individual. Often, in surveillance
applications, it is difficult to get face or iris information at the resolution required for
recognition. Studies in psychophysics indicate that humans have the capability of
recognizing people from even impoverished displays of gait, indicating the presence of
identity information in gaitRecognition on the basis of how an individual walks has
attracted interest from defence and other agencies for remote surveillance or infrared
recordings of movement in an area under covert surveillance. The technology essentially
involves dynamic mapping of the changing relationships of points on a body as that
person

moves.

Early work from the late 1980s built on biomechanics studies that dated. It centred on the
'stride pattern' of a sideways silhouette, with a few measurement points from the hip to
feet. More recent research appears to be encompassing people in the round and seeking to
address the challenge of identification in adverse conditions (eg at night, amid smoke or
at

such

a

distance

that

the

image

quality

is

very

poor).
System Requirement
Hardware specifications:
Processor

:

Intel Processor IV

RAM

:

128 MB

Hard disk

:

20 GB

CD drive

:

40 x Samsung

Floppy drive

:

1.44 MB

Monitor

:

15’ Samtron color

Keyboard

:

108 mercury keyboard

Mouse

:

Logitech mouse

Software Specification
Operating System – Windows XP/2000
Language used – J2sdk1.4.0

Mais conteúdo relacionado

Mais procurados

Gait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVMGait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVMIJEEE
 
Online Vigilance Analysis Combining Video and Electrooculography Features
Online Vigilance Analysis Combining Video and Electrooculography FeaturesOnline Vigilance Analysis Combining Video and Electrooculography Features
Online Vigilance Analysis Combining Video and Electrooculography FeaturesRuofei Du
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceIOSR Journals
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaDrishty Sharma
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
RETINA IDENTIFICATION
RETINA IDENTIFICATIONRETINA IDENTIFICATION
RETINA IDENTIFICATIONislam_injamul
 
Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...IRJET Journal
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Nadeer Abu Jraerr
 

Mais procurados (20)

Gait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVMGait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVM
 
Vein rishabh
Vein rishabhVein rishabh
Vein rishabh
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
I046035458
I046035458I046035458
I046035458
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
Online Vigilance Analysis Combining Video and Electrooculography Features
Online Vigilance Analysis Combining Video and Electrooculography FeaturesOnline Vigilance Analysis Combining Video and Electrooculography Features
Online Vigilance Analysis Combining Video and Electrooculography Features
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
RETINA IDENTIFICATION
RETINA IDENTIFICATIONRETINA IDENTIFICATION
RETINA IDENTIFICATION
 
Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...Infrared Vein Detection System For Person Identification – An Image Processin...
Infrared Vein Detection System For Person Identification – An Image Processin...
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...Iris segmentation analysis using integro differential operator and hough tran...
Iris segmentation analysis using integro differential operator and hough tran...
 
Recent advances in diagnostic aids
Recent advances in diagnostic aidsRecent advances in diagnostic aids
Recent advances in diagnostic aids
 
Seminar
SeminarSeminar
Seminar
 

Destaque (16)

Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
gait analysis
gait analysisgait analysis
gait analysis
 
Gait analysis
Gait analysisGait analysis
Gait analysis
 
An approach for human gait identification based on area
An approach for human gait identification based on areaAn approach for human gait identification based on area
An approach for human gait identification based on area
 
2013225014
20132250142013225014
2013225014
 
PERSON DE-IDENTIFICATION IN VIDEOS ppt
PERSON DE-IDENTIFICATION IN VIDEOS  pptPERSON DE-IDENTIFICATION IN VIDEOS  ppt
PERSON DE-IDENTIFICATION IN VIDEOS ppt
 
BATCH 11
BATCH 11BATCH 11
BATCH 11
 
Human Recognition in Video
Human Recognition in VideoHuman Recognition in Video
Human Recognition in Video
 
Gait biomechanics
Gait biomechanicsGait biomechanics
Gait biomechanics
 
Human Gait
Human GaitHuman Gait
Human Gait
 
Gait analysis and.ppt by ramachandra
Gait analysis and.ppt by ramachandraGait analysis and.ppt by ramachandra
Gait analysis and.ppt by ramachandra
 
Presentation on bezier curve
Presentation on bezier curvePresentation on bezier curve
Presentation on bezier curve
 
Gait ppt
Gait pptGait ppt
Gait ppt
 
Gait
GaitGait
Gait
 
Gait
GaitGait
Gait
 
Circuit Analysis – DC Circuits
Circuit Analysis – DC CircuitsCircuit Analysis – DC Circuits
Circuit Analysis – DC Circuits
 

Semelhante a Identification of humans using gait (synopsis)

BIOMETRIC AUTHORIZATION SYSTEM USING GAIT BIOMETRY
BIOMETRIC AUTHORIZATION SYSTEM USING GAIT BIOMETRYBIOMETRIC AUTHORIZATION SYSTEM USING GAIT BIOMETRY
BIOMETRIC AUTHORIZATION SYSTEM USING GAIT BIOMETRYIJCSEA Journal
 
To identify the person using gait knn based approach
To identify the person using gait   knn based approachTo identify the person using gait   knn based approach
To identify the person using gait knn based approacheSAT Journals
 
Paper id 25201433
Paper id 25201433Paper id 25201433
Paper id 25201433IJRAT
 
Gait Recognition for Security and Surveillance System- A Review
Gait Recognition for Security and Surveillance System- A ReviewGait Recognition for Security and Surveillance System- A Review
Gait Recognition for Security and Surveillance System- A ReviewIJCSIS Research Publications
 
Robust Human Tracking Method Based on Apperance and Geometrical Features in N...
Robust Human Tracking Method Based on Apperance and Geometrical Features in N...Robust Human Tracking Method Based on Apperance and Geometrical Features in N...
Robust Human Tracking Method Based on Apperance and Geometrical Features in N...csandit
 
ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...
ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...
ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...cscpconf
 
Gait Recognition for Person Identification using Statistics of SURF
Gait Recognition for Person Identification using Statistics of SURFGait Recognition for Person Identification using Statistics of SURF
Gait Recognition for Person Identification using Statistics of SURFijtsrd
 
Paper id 25201492
Paper id 25201492Paper id 25201492
Paper id 25201492IJRAT
 
hpe3d_report.pdf
hpe3d_report.pdfhpe3d_report.pdf
hpe3d_report.pdfgsrawat
 
Principal component analysis for human gait recognition system
Principal component analysis for human gait recognition systemPrincipal component analysis for human gait recognition system
Principal component analysis for human gait recognition systemjournalBEEI
 
Symbolic representation and recognition of gait an approach based on lbp of ...
Symbolic representation and recognition of gait  an approach based on lbp of ...Symbolic representation and recognition of gait  an approach based on lbp of ...
Symbolic representation and recognition of gait an approach based on lbp of ...sipij
 
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ijitjournal
 
CHARACTERIZING HUMAN BEHAVIOURS USING STATISTICAL MOTION DESCRIPTOR
CHARACTERIZING HUMAN BEHAVIOURS USING STATISTICAL MOTION DESCRIPTORCHARACTERIZING HUMAN BEHAVIOURS USING STATISTICAL MOTION DESCRIPTOR
CHARACTERIZING HUMAN BEHAVIOURS USING STATISTICAL MOTION DESCRIPTORsipij
 
3D Human Pose And Shape Estimation From Multi-View Imagery
3D Human Pose And Shape Estimation From Multi-View Imagery3D Human Pose And Shape Estimation From Multi-View Imagery
3D Human Pose And Shape Estimation From Multi-View ImageryLiz Adams
 
3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D ImageWaqas Tariq
 
A Methodology for Extracting Standing Human Bodies From Single Images
A Methodology for Extracting Standing Human Bodies From Single ImagesA Methodology for Extracting Standing Human Bodies From Single Images
A Methodology for Extracting Standing Human Bodies From Single ImagesProjectsatbangalore
 

Semelhante a Identification of humans using gait (synopsis) (20)

BIOMETRIC AUTHORIZATION SYSTEM USING GAIT BIOMETRY
BIOMETRIC AUTHORIZATION SYSTEM USING GAIT BIOMETRYBIOMETRIC AUTHORIZATION SYSTEM USING GAIT BIOMETRY
BIOMETRIC AUTHORIZATION SYSTEM USING GAIT BIOMETRY
 
To identify the person using gait knn based approach
To identify the person using gait   knn based approachTo identify the person using gait   knn based approach
To identify the person using gait knn based approach
 
Paper id 25201433
Paper id 25201433Paper id 25201433
Paper id 25201433
 
Ei25822827
Ei25822827Ei25822827
Ei25822827
 
Gait Recognition for Security and Surveillance System- A Review
Gait Recognition for Security and Surveillance System- A ReviewGait Recognition for Security and Surveillance System- A Review
Gait Recognition for Security and Surveillance System- A Review
 
Robust Human Tracking Method Based on Apperance and Geometrical Features in N...
Robust Human Tracking Method Based on Apperance and Geometrical Features in N...Robust Human Tracking Method Based on Apperance and Geometrical Features in N...
Robust Human Tracking Method Based on Apperance and Geometrical Features in N...
 
ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...
ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...
ROBUST HUMAN TRACKING METHOD BASED ON APPEARANCE AND GEOMETRICAL FEATURES IN ...
 
Gait Recognition for Person Identification using Statistics of SURF
Gait Recognition for Person Identification using Statistics of SURFGait Recognition for Person Identification using Statistics of SURF
Gait Recognition for Person Identification using Statistics of SURF
 
C045071117
C045071117C045071117
C045071117
 
Paper id 25201492
Paper id 25201492Paper id 25201492
Paper id 25201492
 
hpe3d_report.pdf
hpe3d_report.pdfhpe3d_report.pdf
hpe3d_report.pdf
 
Principal component analysis for human gait recognition system
Principal component analysis for human gait recognition systemPrincipal component analysis for human gait recognition system
Principal component analysis for human gait recognition system
 
Symbolic representation and recognition of gait an approach based on lbp of ...
Symbolic representation and recognition of gait  an approach based on lbp of ...Symbolic representation and recognition of gait  an approach based on lbp of ...
Symbolic representation and recognition of gait an approach based on lbp of ...
 
1879 1885
1879 18851879 1885
1879 1885
 
1879 1885
1879 18851879 1885
1879 1885
 
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
 
CHARACTERIZING HUMAN BEHAVIOURS USING STATISTICAL MOTION DESCRIPTOR
CHARACTERIZING HUMAN BEHAVIOURS USING STATISTICAL MOTION DESCRIPTORCHARACTERIZING HUMAN BEHAVIOURS USING STATISTICAL MOTION DESCRIPTOR
CHARACTERIZING HUMAN BEHAVIOURS USING STATISTICAL MOTION DESCRIPTOR
 
3D Human Pose And Shape Estimation From Multi-View Imagery
3D Human Pose And Shape Estimation From Multi-View Imagery3D Human Pose And Shape Estimation From Multi-View Imagery
3D Human Pose And Shape Estimation From Multi-View Imagery
 
3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image
 
A Methodology for Extracting Standing Human Bodies From Single Images
A Methodology for Extracting Standing Human Bodies From Single ImagesA Methodology for Extracting Standing Human Bodies From Single Images
A Methodology for Extracting Standing Human Bodies From Single Images
 

Mais de Mumbai Academisc

Mais de Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Web based development
Web based developmentWeb based development
Web based development
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Engineering
EngineeringEngineering
Engineering
 

Último

Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 

Último (20)

Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 

Identification of humans using gait (synopsis)

  • 1. Identification of Humans Using Gait (Synopsis)
  • 2. Abstract We propose a view-based approach to recognize humans from their gait. Two different image features have been considered: the width of the outer contour of the binarized silhouette of the walking person and the entire binary silhouette itself. To obtain the observation vector from the image features, we employ two different methods. In the first method, referred to as the indirect approach, the high-dimensional image feature is transformed to a lower dimensional space by generating what we call the frame to exemplar (FED) distance. The FED vector captures both structural and dynamic traits of each individual. For compact and effective gait representation and recognition, the gait information in the FED vector sequences is captured in a hidden Markov model (HMM). In the second method, referred to as the direct approach, we work with the feature vector directly (as opposed to computing the FED) and train an HMM. We estimate the HMM parameters (specifically the observation probability ) based on the distance between the exemplars and the image features. In this way, we avoid learning high-dimensional probability density functions. The statistical nature of the HMM lends overall robustness to representation and recognition.
  • 3. Overview Of Project GAIT refers to the style of walking of an individual. Often, in surveillance applications, it is difficult to get face or iris information at the resolution required for recognition. Studies in psychophysics indicate that humans have the capability of recognizing people from even impoverished displays of gait, indicating the presence of identity information in gait. From early medical studies, it appears that there are 24 different components to human gait, and that, if all the measurements are considered, gait is unique. It is interesting, therefore, to study the utility of gait as a biometric. A gait cycle corresponds to one complete cycle from rest (standing) position to-right-foot-forward-to-rest-to-left-foot forward- to-rest position. The movements within a cycle consist of the motion of the different parts of the body such as head, hands, legs, etc. The characteristics of an individual are reflected not only in the dynamics and periodicity of a gait cycle but also in the height and width of that individual. Given the video of an unknown individual, we wish to use gait as a cue to find who among the individuals in the database the person is. For a normal walk, gait sequences are repetitive and exhibit nearly periodic behavior. As gait databases continue to grow in size, it is conceivable that identifying a person only by gait may be difficult. However, gait can still serve as a useful filtering tool that allows us to narrow the search down to a considerably smaller set of potential candidates. Approaches in computer vision to the gait recognition problem can be broadly classified as being either model-based or
  • 4. model-free. Both methodologies follow the general framework of feature extraction, feature correspondence and high-level processing. The major difference is with regard to feature correspondence between two consecutive frames. Methods which assume a priori models match the two-dimensional (2-D) image sequences to the model data. Feature correspondence is automatically achieved once matching between the images and the model data is established. Examples of this approach include the work of Lee et al., where several ellipses are fitted to different parts of the binarized silhouette of the person and the parameters of these ellipses such as location of its centroid, eccentricity, etc. are used as a feature to represent the gait of a person. Recognition is achieved by template matching. In , Cunado et al. extract a gait signature by fitting the movement of the thighs to an articulated pendulum-like motion model. The idea is somewhat similar to an early work by Murray who modeled the hip rotation angle as a simple pendulum, the motion of which was approximately described by simple harmonic motion. In activity specific static parameters are extracted for gait recognition. Model-free methods establish correspondence between successive frames based upon the prediction or estimation of features related to position, velocity, shape, texture, and color. Alternatively, they assume some implicit notion of what is being observed. Examples of this approach include thework ofHuang et al.,whouse optical flow to derive a motion image sequence for a walk cycle. Principal components analysis is then applied to the binarized silhouette to derive what are called eigen gaits. Benabdelkader et al. use image self-similarity plots as a gait
  • 5. feature. Little and Boyd extract frequency and phase features from moments of the motion image derived from optical flow and use template matching to recognize different people by their gait. Acareful analysis of gaitwould reveal that it has two important components. The first is a structural component that captures the physical build of a person, e.g., body dimensions, length of limbs, etc. The secnd component is the motion dynamics of the body during a gait cycle. Our effort in this paper is directed toward deriving and fusing information from these two components.We propose a systematic approach to gait recognition by building representations for the structural and dynamic components of gait. The assumptions we use are: 1) the camera is static and the only motion within the field of view is that of the moving person and 2) the subject is monitored by multiple cameras so that the subject presents a side viewto at least one of the cameras. This is because the gait of a person is best brought out in the side view. The image sequence of that camera which produces the best side view is used. Our experiments were set up in line with the above assumptions. We considered two image features, one being the width of the outer contour of the binarized silhouette, and the other being the binary silhouette itself. A set of exemplars that occur during a gait cycle is derived for each individual. To obtain the observation vector from the image features we employ two different methods. In the indirect approach the high-dimensional image feature is transformed to a lower dimensional space by generating the frame to exemplar (FED) distance. The FED vector captures both structural and dynamic traits of each individual.
  • 6. For compact and effective gait representation and recognition, the gait information in the FED vector sequences is captured using a hidden Markov model (HMM) for each individual. In the direct approach, we work with the feature vector directly and train an HMM for gait representation. The difference between the direct and indirect methods is that in the former the feature vector is directly used as the observation vector for the HMM whereas in the latter, the FED is used as the observation vector. In the direct method, we estimate the observation probability by an alternative approach based on the distance between the exemplars and the image features. In this way, we avoid learning high-dimensional probability density functions. The performance of the methods is tested on different databases.
  • 7. Description of the Problem An important issue in gait is the extraction of appropriate salient features that will effectively capture the gait characteristics. The features must be reasonably robust to operating conditions and should yield good discriminability across individuals. As mentioned earlier, we assume that the side view of each individual is available. Intuitively, the silhouette appears to be a good feature to look at as it captures the motion of most of the body parts. It also supports night vision capability as it can be derived from IR imagery also. While extracting this feature we are faced with two options. 1) Use the entire silhouette. 2) Use only the outer contour of the silhouette. The choice of using either of the above features depends upon the quality of the binarized silhouettes. If the silhouettes are of good quality, the outer contour retains all the information of the silhouette and allows a representation, the dimension of which is an order of magnitude lower than that of the binarized silhouette. However, for low quality, low resolution data, the extraction of the outer contour from the binarized silhouette may not be reliable. In such situations, direct use of the binarized silhouette may be more appropriate. We choose the width of the outer contour of the silhouette as one of our feature vectors. In Fig. 1, we show plots of the width profiles of two different individuals for several gait cycles. Since we use only the distance between the left and right extremities of the
  • 8. silhouette, the two halves of the gait cycle are almost indistinguishable. From here on, we refer to half cycles as cycles, for the sake of brevity. Existing System There are various biometric based concepts are used in industrial applications for identification of an individual. They are • Signature verification (ie comparing a 'new' signature or signing with previously enrolled reference information) takes two forms: dynamic signature verification and analysis of a static signature • Face Recognition method using Laplace faces and also using other methods • Identification by voice rather than appearance has a long history in literature (a 1930s) • Iris recognition methods • Recognition using Digital Signatures • The existing system has some drawbacks. The problems are: o Not unique o Easily malpractice can be possible o Easily traceable by intruders o Low reliability o No unique identification
  • 9. Proposed System GAIT refers to the style of walking of an individual. Often, in surveillance applications, it is difficult to get face or iris information at the resolution required for recognition. Studies in psychophysics indicate that humans have the capability of recognizing people from even impoverished displays of gait, indicating the presence of identity information in gaitRecognition on the basis of how an individual walks has attracted interest from defence and other agencies for remote surveillance or infrared recordings of movement in an area under covert surveillance. The technology essentially involves dynamic mapping of the changing relationships of points on a body as that person moves. Early work from the late 1980s built on biomechanics studies that dated. It centred on the 'stride pattern' of a sideways silhouette, with a few measurement points from the hip to feet. More recent research appears to be encompassing people in the round and seeking to address the challenge of identification in adverse conditions (eg at night, amid smoke or at such a distance that the image quality is very poor).
  • 10. System Requirement Hardware specifications: Processor : Intel Processor IV RAM : 128 MB Hard disk : 20 GB CD drive : 40 x Samsung Floppy drive : 1.44 MB Monitor : 15’ Samtron color Keyboard : 108 mercury keyboard Mouse : Logitech mouse Software Specification Operating System – Windows XP/2000 Language used – J2sdk1.4.0