SlideShare a Scribd company logo
1 of 11
SUBMITTED TO-            SUBMITTED BY-
MR. PRADEEP SHARMA       MANOJ KUMAR
(ASSISTANCE PROFESSOR)   IT, 08EAIIT026
   Authentication based on the physiological or behavioral
    characteristics of people
   It is a pattern recognition system at establishes a
    person’s identity by comparison of data .
   It’s authentication is "automatic", "real-time", "non-
    forensic" subset of the broader field of human
    identification.
 Biometric systems:
o Verification
o Identification
 Biometric devices:
o Positive Identification
o Negative Identification
   Fingerprint
   Handwritten signature
   Facial recognition
   Speech recognition
   Gait recognition
   It aims to discriminate individuals by the way they
    walk
   It is unobtrusive.
    It depends on how the silhouette shape of an individual
    changes over time in an image sequence
   Silhouette Representation
    2D silhouettes are changed
    into an associated sequence
          of 1D signals
   di=((xi-xc)2+(yi-yc)2)1/2
   Subject to the effects of different types of
    clothes.
   Lack of generality of viewing angles.
ANY QUESTION??

More Related Content

Similar to gait analysis

Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
anoop80686
 

Similar to gait analysis (20)

Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
The technology of biometric and it's recognition process.pptx
The technology of biometric  and it's recognition process.pptxThe technology of biometric  and it's recognition process.pptx
The technology of biometric and it's recognition process.pptx
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical Model
Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical ModelKomogortsev Biometric Identification Via An Oculomotor Plant Mathematical Model
Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical Model
 
Shamaas
ShamaasShamaas
Shamaas
 
Biometric technologies and applications
Biometric technologies and applicationsBiometric technologies and applications
Biometric technologies and applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

gait analysis

  • 1. SUBMITTED TO- SUBMITTED BY- MR. PRADEEP SHARMA MANOJ KUMAR (ASSISTANCE PROFESSOR) IT, 08EAIIT026
  • 2. Authentication based on the physiological or behavioral characteristics of people  It is a pattern recognition system at establishes a person’s identity by comparison of data .  It’s authentication is "automatic", "real-time", "non- forensic" subset of the broader field of human identification.
  • 3.  Biometric systems: o Verification o Identification  Biometric devices: o Positive Identification o Negative Identification
  • 4. Fingerprint  Handwritten signature  Facial recognition  Speech recognition  Gait recognition
  • 5. It aims to discriminate individuals by the way they walk  It is unobtrusive.  It depends on how the silhouette shape of an individual changes over time in an image sequence
  • 6.
  • 7.
  • 8. Silhouette Representation  2D silhouettes are changed into an associated sequence of 1D signals  di=((xi-xc)2+(yi-yc)2)1/2
  • 9.
  • 10. Subject to the effects of different types of clothes.  Lack of generality of viewing angles.