Computer Science ›› 2021, Vol. 48 ›› Issue (10): 246-257.doi: 10.11896/jsjkx.210100076

• Information Security • Previous Articles     Next Articles

Survey of Human Identification Algorithms Based on Wi-Fi Signal

KONG Jin-sheng, LI Jing-xin, DUAN Peng-song, CAO Yang-jie   

  1. School of Software Engineering,Zhengzhou University,Zhengzhou 450002,China
  • Received:2021-01-10 Revised:2021-05-19 Online:2021-10-15 Published:2021-10-18
  • About author:KONG Jin-sheng,born in 1963,Ph.D,professor.His main research interests include intelligent information proces-sing and intelligent systems,intelligent information processing theories and methods.
    DUAN Peng-song,born in 1983,Ph.D,lecturer,is a member of China Compu-ter Federation.His main research in-terests include wireless sensing,IoT and machine learning.
  • Supported by:
    National Natural Science Foundation of China(61972092),Think Tank Research Projects of Zhengzhou Collaborative Innovation Major Funding(20XTZX06013) and Key Scientific Research Projects of Colleges and Universities in Henan Province(21A520043).

Abstract: In recent years,Wi-Fi perception has become an emerging research direction in human-computer interaction due to its advantages of low cost,non-contact,unaffected by light,and better privacy.At present,the research of Wi-Fi perception has expanded from target positioning to fields such as action recognition and identity recognition.Taking human identity recognition as an example,the research on Wi-Fi perception technology in this field is summarized and analyzed.First,it briefly summarizes the development history,advantages and disadvantages of Wi-Fi perception technology,and introduces the advantages of using Wi-Fi signals for identification compared with traditional identification technologies.Second,it introduces Wi-Fi in detail.The basic process of perceiving identity includes 4 steps of signal acquisition,preprocessing,feature extraction,and identity recognition,and the specific operation process of each step is introduced in detail.Third,the existing gait and gestures are compared to the existing ones in terms of gait and gestures.The research results of Wi-Fi-aware identity are compared and analyzed horizontally and vertically.Finally,in view of the key issues in the current research in this field,the focus of future research is proposed,mainly including multi-person identification and migration learning.

Key words: CSI, Human identity recognition, RSS, Wi-Fi sensing

CLC Number: 

  • TP393
[1]ANZURES G,KELLY D J,PASCALIS O,et al.Own-and other-race face identity recognition in children:the effects of pose and feature composition[J].Developmental Psychology,2014,50(2):469.
[2]LEWIS G J,SHAKESHAFT N G,PLOMIN R et al.Face identity recognition and the social difficulties component of the autism-like phenotype:Evidence for phenotypic and genetic links[J].Journal of Autism and Developmental Disorders,2018,48(8):2758-2765.
[3]CASTRO D C D,NOWOZIN S.From face recognition to models of identity:a bayesian approach to learning about unknown identities from unsupervised data[C]//Proceedings of the European Conference on Computer Vision (ECCV).2018:745-761.
[4]ATUEGWU C,DARAMOLA S A,OKOKPUJIE K O,et al.Development of an Improved Fingerprint Feature Extraction Algorithm for Personal Verification[J].International Journal of Applied Engineering Research,2018,13(9):6608-6612.
[5]LIU M.The Principle and Design of Separate Fingerprint Identification System[C]//International Conference on Machine Learning and Intelligent Communications.Cham:Springer,2019:32-41.
[6]AL-WAISY A S,QAHWAJI R,IPSON S,et al.A multi-biometric iris recognition system based on a deep learning approach[J].Pattern Analysis and Applications,2018,21(3):783-802.
[7]WAGHMARE L M,CHIRCHI E R.Enhancement of personidentification using iris pattern[J].International Journal of Scientific and Engineering Research,2011,2(4):37-42.
[8]WANG L,TAN T,NING H,et al.Silhouette analysis-basedgait recognition for human identification[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2003,25(12):1505-1518.
[9]PHILLIPS P J,SARKAR S,ROBLEDO I,et al.The gait identification challenge problem:data sets and baseline algorithm[C]//Object Recognition Supported by User Interaction for Service Robots.IEEE,2002:385-388.
[10]CHEN M,LI Y F,BAO S D,et al.A Comparative Performance Study of Electrocardiogram-Based Human Identity Recognition[C]//2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Confe-rence on Embedded and Ubiquitous Computing (EUC).IEEE,2019:121-126.
[11]WANG X,SONG Q,YANG F,et al.Research on intelligentidentification and disinfection early warning access control system in epidemic situation[J].Journal of Testing Technology,2020,34(5):425-430.
[12]HE X L.Research and development plan of self-service temperature measurement identification device[J].Electronic Production,2020,2(4):25-26.
[13]WANG Z J,XU Z M.Human body identity and motion recognition based on low-resolution infrared array sensor[J].Electrical Technology,2019,20(11):6-10.
[14]PROKOSKI F.History,current status,and future of infraredidentification[C]//Proceedings IEEE Workshop on Computer Vision Beyond the Visible Spectrum:Methods and Applications (Cat.No.PR00640).IEEE,2000:5-14.
[15]VARDASCA R,MAGALHAES C,SILVA P,et al.Biomedical musculoskeletal applications of infrared thermal imaging on arm and forearm:a systematic review[J].Journal of Thermal Biology,2019,82:164-177.
[16]MA X,NA Z.Neural network speed identification scheme for speed sensor-less DTC induction motor drive system[C]//Third International Power Electronics and Motion Control Confe-rence.IEEE,2000:1242-1245.
[17]HOWLADER M S A,FRATER M R,RYAN M J.Optimizing sensor identification in long-delay networks to account for maximum frame size and variations in propagation speed[C]//2008 Australasian Telecommunication Networks and Applications Conference.IEEE,2008:240-245.
[18]PANNETIER B,DEZERT J,POLLARD E.Improvement ofmultiple ground targets tracking with GMTI sensor and fusion of identification attributes[C]//2008 IEEE Aerospace Confe-rence.IEEE,2008:1-13.
[19]LANCASTER J,BLACKMAN S.Joint IMM/MHT trackingand identification for multi-sensor ground target tracking[C]//2006 9th International Conference on Information Fusion.IEEE,2006:1-7.
[20]XIU-CHENG L I.Research on Target Identification Based on Sensor Signals of Ground Motion[J].Radio Engineering,2014,44(5):26-29.
[21]SHUNMUGAM P,KAMARUDIN K,MOSED A A A,et al.Human Identification through Kinect's Depth,RGB,and Sound Sensor[C/OL]//IOP Conference Series Materials Science and Engineering.2019.https://www.researchgate.net/publication/337690961_Human_Identification_through_Kinect's_Depth_RGB_and_Sound_Sensor.
[22]DRMANAC R.Methods and apparatus for DNA sequencing and DNA identification:U.S.Patent 6,025,136[P].2000-2-15.
[23]WALKER J A,HUGHES D A,ANDERS B A,et al.Quantitative intra-short interspersed element PCR for species-specific DNA identification[J].Analytical Biochemistry,2003,316(2):259-269.
[24]NATALE C D,PAOLESSE R,COMANDINI P,et al.Identification of schizophrenic patients by examination of body odor using gas chromatography-mass spectrometry and a cross-selective gas sensor array[J].Medical Science Monitor,2005,11(8):CR366-CR375.
[25]WU D,XU H.The progress of identification human body odor by police dog[J].Forensic Science and Technology,2005,6(9):1008-3650.
[26]BUDOWLE B,BUS M M,JOSSERAND M A,et al.A standalone humanitarian DNA identification database system to increase identification of human remains of foreign nationals[J].International Journal of Legal Medicine,2020,134(6):2039-2044.
[27]BAHL P,PADMANABHAN V N.RADAR:an in-building RF-based user location and tracking system[C]//Proceedings IEEE INFOCOM 2000.Conference on Computer Communications.Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies.IEEE,2000:775-784.
[28]BIANCHI V,CIAMPOLINI P,DE MUNARI I.RSSI-based indoor localization and identification for ZigBee wireless sensor networks in smart homes[J].IEEE Transactions on Instrumentation and Measurement,2018,68(2):566-575.
[29]CARPI F,DAVOLI L,MARTALO M,et al.RSSI-based Me-thods for LOS/NLOS Channel Identification in Indoor Scenarios[C]//2019 16th International Symposium on Wireless Communication Systems (ISWCS).IEEE,2019:171-175.
[30]HAN K,XING H,DENG Z,et al.A RSSI/PDR-based probabilistic position selection algorithm with NLOS identification for indoor localisation[J].ISPRS International Journal of Geo-Information,2018,7(6):232.
[31]HALPERIN D,HU W,SHETH A,et al.Tool release:Gathe-ring 802.11 n traces with channel state information[J].ACM Sigcomm Computer Communication Review,2011,41(1):53.
[32]ZENG Y,PATHAK P H,MOHAPATRA P.WiWho:wifi-based person identification in smart spaces[C]//2016 15th ACM/IEEE International Conference on Information Proces-sing in Sensor Networks (IPSN).IEEE,2016:1-12.
[33]WANG W,LIU A X,SHAHZAD M.Gait recognition using wifi signals[C]//Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.2016:363-373.
[34]ZHANG J,WEI B,HU W,et al.Wifi-id:human identification using wifi signal[C]//2016 International Conference onDistri-buted Computing in Sensor Systems (DCOSS).IEEE,2016:75-82.
[35]FENG C,ARSHAD S,LIU Y.Mais:multiple activity identification system using channel state information of wifi signals[C]//International Conference on Wireless Algorithms,Systems,and Applications.Cham:Springer,2017:419-432.
[36]LV J,YANG W,MAN D.Device-free passive identity identification via WiFi signals[J].Sensors,2017,17(11):2520.
[37]XIN T,GUO B,WANG Z,et al.FreeSense:human-behavior understanding using Wi-Fi signals[J].Journal of Ambient Intelligence and Humanized Computing,2018,9(5):1611-1622.
[38]YU X D,CHEN W J,WANG D,et al.Deep learning algorithm for non-contact identity recognition[J].Journal of Xi'an Jiaotong University,2019,53(4):122-127.
[39]WANG D,ZHOU Z,YU X,et al.CSIID:WiFi-based HumanIdentification via Deep Learning[C]//2019 14th International Conference on Computer Science & Education (ICCSE).IEEE,2019:326-330.
[40]ZHOU Z,LIU C,YU X,et al.Deep-WiID:WiFi-Based Contactless Human Identification via Deep Learning[C]//2019 IEEE SmartWorld,Ubiquitous Intelligence & Computing,Advanced &Trusted Computing,Scalable Computing & Communications,Cloud & Big Data Computing,Internet of People and Smart City Innovation(SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).IEEE,2019:877-884.
[41]DUAN P S,ZHOU Z Y,WANG C,et al.WiNet:a gait recognition model suitable for wireless sensing scenes[J].Journal of Xi'an Jiaotong University,2020,54(7):187-195.
[42]ZHOU Z Y,SONG B,DUAN P S,et al.Lightweight gait recognition model LWID based on WiFi signal[J].Computer Science,47(11):25-31.
[43]ZHANG L,WANG C,MA M,et al.WiDIGR:direction-independent gait recognition system using commercial Wi-Fi devices[J].IEEE Internet of Things Journal,2019,7(2):1178-1191.
[44]BU Q,MING X,HU J,et al.TransferSense:towards environ-ment independent and one-shot wifi sensing[J].Personal and Ubiquitous Computing,2021,25(2):1-19.
[45]SHAHZAD M,ZHANG S.Augmenting user identification with WiFi based gesture recognition[J].Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies,2018,2(3):1-27.
[46]ZHENG R Y.Research on identification technology based on CSI wireless sensing[D].Nanjing:Nanjing University of Aeronautics and Astronautics,2018.
[47]Hefei University of Technology.Identity verification methodbased on gesture signals in WiFi environment:CN201910717874.1[P].2019-11-05.
[48]ZHAO X N.Research on Identity Authentication Technology Based on Channel State Information [D].Harbin:Harbin Engineering University,2019.
[49]KONG H,LU L,YU J,et al.Continuous Authenticationthrough Finger Gesture Interaction for Smart Homes Using WiFi[J/OL].IEEE Transactions on Mobile Computing,2020.https://www.researchgate.net/publication/341536728_Continuous_Authentication_through_Finger_Gesture_Interaction_for_Smart_Homes_Using_WiFi.
[50]LI C,LIU M,CAO Z.WiHF:Enable User Identified Gesture Recognition with WiFi[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications.IEEE,2020:586-595.
[51]LIU X,CAO J,TANG S,et al.Wi-sleep:Contactless sleep monitoring via wifi signals[C]//2014 IEEE Real-Time Systems Symposium.IEEE,2014:346-355.
[52]CAO Y,WANG F,LU X,et al.Contactless body movement re-cognition during sleep via WiFi signals[J].IEEE Internet of Things Journal,2019,7(3):2028-2037.
[53]GU Y,ZHANG X,LIU Z,et al.WiFi-based real-time breathing and heart rate monitoring during sleep[C]//2019 IEEE Global Communications Conference (GLOBECOM).IEEE,2019:1-6.
[54]RAMEZANI R,XIAO Y,NAEIM A.Sensing-Fi:Wi-Fi CSI and accelerometer fusion system for fall detection[C]//2018 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI).IEEE,2018:402-405.
[55]PALIPANA S,ROJAS D,AGRAWAL P,et al.FallDeFi:Ubi-quitous fall detection using commodity Wi-Fi devices[J].Procee-dings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies,2018,1(4):1-25.
[56]YANG Z,ZHOU Z,LIU Y.From RSSI to CSI:indoor localization via channel response[J].ACM Computing Surveys (CSUR),2013,46(2):1-32.
[57]ZHOU J.Research on indoor intrusion detection and behavior recognition based on CSI in wireless sensing network [D].Nanjing:Nanjing University of Posts and Telecommunications,2018.
[58]BODENHAM D.Adaptive filtering and change detection forstreaming data[D].London:Imperial College London,2012.
[59]LIU H,SHAH S,JIANG W.On-line outlier detection and data cleaning[J].Computers & Chemical Engineering,2004,28(9):1635-1647.
[60]SUOMELA J.Median filtering is equivalent to sorting[J].ar-Xiv:1406.1717,2014.
[61]JIA Y H.Digital Image Processing[M].Wuhan:Wuhan University Press,2003.
[62]LU Y,LU S H,WANG X D,et al.Research review of human behavior perception technology based on WiFi signal[J].Chinese Journal of Computers,2019,434(2):3-23.
[63]CHEN Y,ZHU Y,HAO Z,et al.Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi[C]//International Conference on Network and System Security.Cham:Springer,2018:237-250.
[64]PU Q,GUPTA S,GOLLAKOTA S,et al.Whole-home gesture recognition using wireless signals[C]//Proceedings of the 19th Annual International Conference on Mobile Computing & Networking.2013:27-38.
[65]UNAR J A,SENG W C,ABBASI A.A review of biometrictechnology along with trends and prospects[J].Pattern Recognition,2014,47(8):2673-2688.
[66]CONNOR P,ROSS A.Biometric recognition by gait:a survey of modalities and features[J].Computer Vision and Image Understanding,2018,167:1-27.
[67]GREFF K,SRIVASTAVA R K,KOUTNIK J,et al.LSTM:A Search Space Odyssey[J].IEEE Transactions on Neural Networks and Learning Systems,2016,28(10):2222-2232.
[68]CAO X L.Identity authentication method based on dynamic gestures and its implementation on smart phones [D].Changsha:Central South University,2013.
[69]LIU J,DONG Y,CHEN Y,et al.Leveraging Breathing for Continuous User Authentication[C]//Proceedings of the 24th Annual International Conference on Mobile Computing and Networking.2018:786-788.
[70]SANAM T F,GODRICH H.A Multi-View Discriminant Lear-ning Approach for Indoor Localization Using Bimodal Features of CSI[J].arXiv:1908.07370,2019.
[71]KARANAM C R,KORANY B,MOSTOFI Y.Tracking fromone side:multi-person passive tracking with WiFi magnitude measurements[C]//Proceedings of the 18th International Conference on Information Processing in Sensor Networks.2019:181-192.
[72]DING Y S,GUO B,XIN T,et al.WiCount:a method of identif-ying people based on WiFi-CSI[J].Computer Science,2019,46(11):297-303.
[73]LIU S,ZHAO Y,XUE F,et al.DeepCount:crowd countingwith WiFi via deep learning[J].arXiv:1903.05316,2019.
[74]XIE X H.Research on WiFi-based indoor multi-person activity detection and recognition method[D].Changsha:Hunan University,2018.
[75]WANG W,LIU A X,SHAHZAD M,et al.Understanding and modeling of wifi signal based human activity recognition[C]//Proceedings of the 21st Annual International Conference on Mobile Computing and Networking.2015:65-76.
[76]FAWAZ H I,FORESTIER G,WEBER J,et al.Transfer lear-ning for time series classification[C]//2018 IEEE International Conference on Big Data (Big Data).IEEE,2018:1367-1376.
[77]FAWAZ H I,FORESTIER G,WEBER J,et al.Deep learningfor time series classification:a review[J].Data Mining and Knowledge Discovery,2019,33(4):917-963.
[78]FAWAZ H I,FORESTIER G,WEBER J,et al.Deep neural network ensembles for time series classification[C]//2019 International Joint Conference on Neural Networks (IJCNN).IEEE,2019:1-6.
[1] QING Chao-jin, DU Yan-hong, YE Qing, YANG Na, ZHANG Min-tao. Enhanced ELM-based Superimposed CSI Feedback Method with CSI Estimation Errors [J]. Computer Science, 2022, 49(6A): 632-638.
[2] LI Li,ZHENG Jia-li,WANG Zhe,YUAN Yuan,SHI Jing. RFID Indoor Positioning Algorithm Based on Asynchronous Advantage Actor-Critic [J]. Computer Science, 2020, 47(2): 233-238.
[3] LIU Feng, GE Pei-xin, ZENG Lian-sun. Transmission Scheme for Asymmetric Two-way Relay X Channel Based on Delayed CSIT [J]. Computer Science, 2019, 46(8): 152-156.
[4] YE Juan, CHEN Yuan-yan, WANG Ming, NI Ying-bo. Optimized Convex Localization Algorithm Using Multiple Communication Radius and Angle Correction [J]. Computer Science, 2019, 46(6A): 317-320.
[5] LI Xiao-wei, YU Jiang, CHANG Jun, YANG Jin-peng, RAN Ya-xin. Non-cooperative Human Behavior Recognition Method Based on CSI [J]. Computer Science, 2019, 46(12): 266-271.
[6] TIAN Li-wen and FENG Xiu-fang. Adaptive Correction Model Location Algorithm Based on CSI [J]. Computer Science, 2017, 44(7): 79-83.
[7] WANG Wei-hong, YAN Lu-qin and YANG Jie. Simulated Annealing for Weighted Localization Algorithm Based on LTE Directional Propagation Model [J]. Computer Science, 2017, 44(5): 251-256.
[8] LIN Wei-lan, XIAO Jin-chao and ZI Shuang-fei. Route-radius-based Adaptive Protocol for Long-chain Wireless Sensor Networks [J]. Computer Science, 2017, 44(3): 97-104.
[9] LI Yao-hui and CHEN Bing. Parameter Independent Access Point Positioning Method Based on CSI [J]. Computer Science, 2017, 44(12): 68-71.
[10] MA Wen-zhuo and ZHANG Jie. Design Robot System Based on Stereo Perception Technology Computer Engineering and Applications [J]. Computer Science, 2016, 43(Z6): 563-567.
[11] TANG Yang, BAI Yong, MA Yue and LAN Zhang-li. Research of WiFi-based Fingerprinting Matching Algorithm in Indoor Positioning [J]. Computer Science, 2016, 43(5): 73-75.
[12] XING Rong-hua and HUANG Hai-yan. Researches on Wireless Sensor Network Localization Based on Improved Gbest-guided Artificial Bee Colony Algorithm [J]. Computer Science, 2016, 43(12): 273-276.
[13] GUO Yan, LI Yong-tang and LI Chun-jie. Improved iSCSI Authentication Based on USB-Key [J]. Computer Science, 2015, 42(Z6): 359-361.
[14] WU Yi-zhi, TIAN Shuang-jie and ZHOU Yu-yan. Research of Software Defined Storage Area Network Based on iSCSI [J]. Computer Science, 2015, 42(Z6): 253-255.
[15] GE Bin, ZHENG Jian-bao and HAN Jiang-hong. RSSI Assisted Coordinate-tetrahedron Centroid Localization Algorithm in Three-dimensional Space [J]. Computer Science, 2015, 42(4): 81-84.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!