Computer Science ›› 2023, Vol. 50 ›› Issue (4): 388-396.doi: 10.11896/jsjkx.220300278

• Interdiscipline & Frontier • Previous Articles     Next Articles

WiDoor:Close-range Contactless Human Identification Approach

CAO Chenyang, YANG Xiaodong, DUAN Pengsong   

  1. School of Cyber Science and Engineering,Zhengzhou University,Zhengzhou 450002,China
  • Received:2022-03-30 Revised:2022-08-21 Online:2023-04-15 Published:2023-04-06
  • About author:CAO Chenyang,born in 1995,postgra-duate.His main research interests include wireless sensing,IoT and machine learning.
    DUAN Pengsong,born in 1983,Ph.D,lecturer,is a member of China Compu-ter Federation.His main research inte-rests include wireless sensing,IoT and machine learning.
  • Supported by:
    National Natural Science Foundation of China(61972092),Collaborative Innovation Major Project of Zhengzhou(20XTZX06013) and Research Foundation Plan in Higher Education Institutions of Henan Province(21A520043).

Abstract: The rapid development of contactless identification technology based on Wi-Fi sensing has shown excellent application potential in the fields of intelligent human-computer interaction and intelligent security.However,it has been found that in narrow indoor scenarios,accuracy of existing lightweight identification model decreases with the shortening of transceiver distance.To solve the above problem,a close-range and contactless identification method,WiDoor,is proposed.During the data acquisition stage,WiDoor optimizes antenna deployment at receiving end based on Fresnel propagation model,and reconstructs gait information of multiple antennas to obtain the more complete gait description.In the identification stage,a lightweight convolution model,which combines the concatenated convolution module and the multi-scale convolution module,is used to reduce computational complexity while ensuring high identification accuracy.Experimental results show that WiDoor achieves identification accuracy rate of 99.1% on the 10-person dataset collected at the transceiver distance of 1 m.Moreover,parameter quantity of identification model is only 2% of those with the same identification accuracy,which outperforms other similar methods.

Key words: Wi-Fi sensing, Close-range identification, Antenna deployment optimization, Convolutional neural network

CLC Number: 

  • TP391
[1]ALI M M H,MAHALE V H,YANNAWAR P,et al.Overview of fingerprint recognition system[C]//2016 International Conference on Electrical,Electronics,and Optimization Techniques(ICEEOT).IEEE,2016:1334-1338.
[2]YOON S,JAIN A K.Longitudinal study of fingerprint recognition[J].Proceedings of the National Academy of Sciences,2015,112(28):8555-8560.
[3]LI Z,LI Y,XIONG W,et al.Research on Voiceprint Recognition Technology Based on Deep Neural Network[C]//Proceedings of the 2021 International Conference on Bioinformatics and Intelligent Computing.2021:412-417.
[4]MA M.A Study on Machine Leaning Based Voiceprint Recognition[C]//Proceedings of the 2020 Conference on Artificial Intelligence and Healthcare.2020:194-198.
[5]SHEN H,WANG B,WANG J.Research on Robustness ofVoiceprint Recognition Technology[C]//Proceedings of the 2018 International Conference on Algorithms,Computing and Artificial Intelligence.2018:1-5.
[6]DE MARSICO M,PETROSINO A,RICCIARDI S.Iris recognition through machine learning techniques:A survey[J].Pattern Recognition Letters,2016,82:106-115.
[7]NGUYEN K,FOOKES C,ROSS A,et al.Iris recognition with off-the-shelf CNN features:A deep learning perspective[J].IEEE Access,2017,6:18848-18855.
[8]NAZMDEH V,MORTAZAVI S,TAJEDDIN D,et al.Iris re-cognition;from classic to modern approaches[C]//2019 IEEE 9th Annual Computing and Communication Workshop and Conference(CCWC).IEEE,2019:981-988.
[9]SOLTANPOUR S,BOUFAMA B,WU Q M J.A survey of local feature methods for 3D face recognition[J].Pattern Recognition,2017,72:391-406.
[10]WANG Y,DU B,SHEN Y,et al.EV-gait:Event-based robust gait recognition using dynamic vision sensors[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2019:6358-6367.
[11]WAN C,WANG L,PHOHA V.A survey on gait recognition[J].ACM Computing Surveys(CSUR),2018,51(5):1-35.
[12]STEVENAGE S V,NIXON M S,VINCE K.Visual analysis of gait as a cue to identity[J].Applied Cognitive Psychology:The Official Journal of the Society for Applied Research in Memory and Cognition,1999,13(6):513-526.
[13]BAHL P,PADMANABHAN V N.RADAR:An in-building RF-based user location and tracking system[C]//Proceedings IEEE INFOCOM 2000.Conference on Computer Communications.Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies(Cat.No.00CH37064).IEEE,2000:775-784.
[14]HALPERIN D,HU W,SHETH A,et al.Tool release:Gathe-ring 802.11 n traces with channel state information[J].ACM SIGCOMM Computer Communication Review,2011,41(1):53-53.
[15]ZENG Y,PATHAK P H,MOHAPATRA P.WiWho:WiFibased person identification in smart spaces[C]//2016 15th ACM/IEEE International Conference on Information Proces-sing in Sensor Networks(IPSN).IEEE,2016:1-12.
[16]ZHANG J,WEI B,HU W,et al.WiFi-id:Human identification using WiFi signal[C]//2016 International Conference on Distributed Computing in Sensor Systems(DCOSS).IEEE,2016:75-82.
[17]XIN T,GUO B,WANG Z,et al.Freesense:Indoor human identification with WiFi signals[C]//2016 IEEE Global Communications Conference(GLOBECOM).IEEE,2016:1-7.
[18]WANG W,LIU A X,SHAHZAD M.Gait recognition usingWiFi signals[C]//Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.2016:363-373.
[19]WANG D,ZHOU Z,YU X,et al.CSIID:WiFi-based humanidentification via deep learning[C]//2019 14th International Conference on Computer Science & Education(ICCSE).IEEE,2019:326-330.
[20]BU Q,MING X,HU J,et al.TransferSense:towards environment independent and one-shot Wi-Fi sensing[J].Personal and Ubiquitous Computing,2022,26(1):555-573.
[21]DUAN P S,ZHOU Z Y,WANG C,et al.Winet:A gait recognition model suitable for wireless sensing scene[J].Journal of Xi’an Jiaotong University,2020,54(7):187-195.
[22]ZHOU Z Y,SONG B,DUAN P S,et al.LWID:Lightweight Gait Recognition Model Based on WiFi Signals[J].Computer Science,2020,47(11):25-31.
[23]SANDLER M,HOWARD A,ZHU M,et al.Mobilenetv2:Inverted residuals and linear bottlenecks[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2018:4510-4520.
[24]IANDOLA F N,HAN S,MOSKEWICZ M W,et al.Squeeze-Net:AlexNet-level accuracy with 50x fewer parameters and< 0.5 MB model size[J].arXiv:1602.07360,2016.
[25]SZEGEDY C,VANHOUCKE V,IOFFE S,et al.Rethinking the inception architecture for computer vision[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:2818-2826.
[26]HE K,ZHANG X,REN S,et al.Deep residual learning forimage recognition[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:770-778.
[27]RAPPAPORT T S.Wireless communications:principles andpractice[M].New Jersey:Prentice Hall PTR,1996:86-92.
[28]GIANNAKIS G B,LIU Z,MA X,et al.Space-time coding for broadband wireless communications[M].New Jersey:John Wiley & Sons,2007:35-53.
[29]HRISTOV H D.Fresnal Zones in Wireless Links,Zone Plate Lenses and Antennas[M].London:Artech House,Inc.,2000:64-78.
[30]HAO Z J,QIAO Z Q,DANG X C,et al.Wi-Do:Highly Robust Human Motion Perception Model Under WiFi Signal[J].Journal of Computer Research and Development,2022,59(2):463-477.
[31]ZHANG D,WANG H,WU D.Toward centimeter-scale human activity sensing with Wi-Fi signals[J].Computer,2017,50(1):48-57.
[32]ZHANG F,ZHANG D,XIONG J,et al.From fresnel diffraction model to fine-grained human respiration sensing with commodity wifi devices[J].Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies,2018,2(1):1-23.
[33]ZHANG F,NIU K,XIONG J,et al.Towards a diffraction-based sensing approach on human activity recognition[J].Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies,2019,3(1):1-25.
[1] SHAO Yunfei, SONG You, WANG Baohui. Study on Degree of Node Based Personalized Propagation of Neural Predictions forSocial Networks [J]. Computer Science, 2023, 50(4): 16-21.
[2] WANG Xiaofei, FAN Xueqiang, LI Zhangwei. Improving RNA Base Interactions Prediction Based on Transfer Learning and Multi-view Feature Fusion [J]. Computer Science, 2023, 50(3): 164-172.
[3] MEI Pengcheng, YANG Jibin, ZHANG Qiang, HUANG Xiang. Sound Event Joint Estimation Method Based on Three-dimension Convolution [J]. Computer Science, 2023, 50(3): 191-198.
[4] ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161.
[5] CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85.
[6] ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119.
[7] DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119.
[8] LIU Yue-hong, NIU Shao-hua, SHEN Xian-hao. Virtual Reality Video Intraframe Prediction Coding Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(7): 127-131.
[9] XU Ming-ke, ZHANG Fan. Head Fusion:A Method to Improve Accuracy and Robustness of Speech Emotion Recognition [J]. Computer Science, 2022, 49(7): 132-141.
[10] WU Zi-bin, YAN Qiao. Projected Gradient Descent Algorithm with Momentum [J]. Computer Science, 2022, 49(6A): 178-183.
[11] YANG Yue, FENG Tao, LIANG Hong, YANG Yang. Image Arbitrary Style Transfer via Criss-cross Attention [J]. Computer Science, 2022, 49(6A): 345-352.
[12] YANG Jian-nan, ZHANG Fan. Classification Method for Small Crops Combining Dual Attention Mechanisms and Hierarchical Network Structure [J]. Computer Science, 2022, 49(6A): 353-357.
[13] ZHANG Jia-hao, LIU Feng, QI Jia-yin. Lightweight Micro-expression Recognition Architecture Based on Bottleneck Transformer [J]. Computer Science, 2022, 49(6A): 370-377.
[14] WANG Jian-ming, CHEN Xiang-yu, YANG Zi-zhong, SHI Chen-yang, ZHANG Yu-hang, QIAN Zheng-kun. Influence of Different Data Augmentation Methods on Model Recognition Accuracy [J]. Computer Science, 2022, 49(6A): 418-423.
[15] SUN Jie-qi, LI Ya-feng, ZHANG Wen-bo, LIU Peng-hui. Dual-field Feature Fusion Deep Convolutional Neural Network Based on Discrete Wavelet Transformation [J]. Computer Science, 2022, 49(6A): 434-440.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!