By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh. Achieving Security through Kinect using Skeleton Analysis (ASKSA)

Slides:



Advertisements
Similar presentations
ARTIFICIAL PASSENGER.
Advertisements

Miroslav Hlaváč Martin Kozák Fish position determination in 3D space by stereo vision.
Joshua Fabian Tyler Young James C. Peyton Jones Garrett M. Clayton Integrating the Microsoft Kinect With Simulink: Real-Time Object Tracking Example (
Kinect Development By: Richard Isely III. Outline What is the Kinect History ▫How it started ▫Microsoft Project The Components of the Kinect ▫What they.
KINECT Vinayak Thapliyal and Noah Balsmeyer 1. Overview  What is the Kinect?  Why was it made?  How does it work?  How does it compare to other sensors?
KINECT REHABILITATION
Kinect A brief introduction to Microsoft’s Kinect Sensor
Robust Part-Based Hand Gesture Recognition Using Kinect Sensor
ALFRED THOMPSON MICROSOFT ACADEMIC TEAM Kinect for FRC 2012.
SM1205 Interactivity Topic 01: Introduction Spring 2012SCM-CityU1.
Game Development with Kinect
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
SM1205 Interactivity Topic 01: Introduction Spring 2011SCM-CityU1.
Motion detector ​ Bikesh Shrestha ​ Ari Rajamäki.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
1 References: 1. J.M. Hart, Windows System Programming, 4th Ed., Addison-Wesley, 2010, Ch.12 2.Microsoft Kinect SDK for Developers,
Mohammed Rizwan Adil, Chidambaram Alagappan., and Swathi Dumpala Basaveswara.
SG-VoIP Page 1 / 14 PLANET Pan / Tilt Internet Camera Internet Surveillance Solution.
(CONTROLLER-FREE GAMING
Kinect Player Gender Recognition from Speech Analysis
LEGO Mindstorms NXT Introduction. Component NXT Brick Touch Sensor Light Sensor Ultrasonic Sensor Interactive Servo Motors MMN Lab.
Professor : Yih-Ran Sheu Student’s name : Nguyen Van Binh Student ID: MA02B203 Kinect camera 1 Southern Taiwan University Department of Electrical Engineering.
Introduction Kinect for Xbox 360, referred to as Kinect, is developed by Microsoft, used in Xbox 360 video game console and Windows PCs peripheral equipment.
GAMING CONSOLES … “Evolution to the next level” Presented by:- Manindar Singh Ratan Regd.No.: Branch:- IT, Group:- ‘B’ Sem:- 7 th,CVRCE Game.
Project Guide: Mr. B.RAVINDER Assistant Professor (CSE) Batch No.: CSB33 Team Members: D. Sai Goud A0569 Satya Swarup Sahoo A0574 G. Shivadeep.
INTRODUCTION Generally, after stroke, patient usually has cerebral cortex functional barrier, for example, the impairment in the following capabilities,
Object Tracking Using Autonomous Quad Copter Carlos A Munoz, Advisor: Dr. Tarek Sobh Robotics, Intelligent Sensing & Control (RISC) Lab., School of Engineering,
Page 1 | Microsoft Work With Color Data Kinect for Windows Video Courses Jan 2013.
A Method for Hand Gesture Recognition Jaya Shukla Department of Computer Science Shiv Nadar University Gautam Budh Nagar, India Ashutosh Dwivedi.
Virtual Mirror for Fashion Retailing
Project By: Brent Elder, Mike Holovka, Hisham Algadaibi.
1 EEC-492/592 Kinect Application Development Lecture 2 Wenbing Zhao
Project By: Brent Elder, Mike Holovka, Hisham Algadaibi.
S ENSORS U SED I N G AMES By Wusqa Waqar. What are sensors and how are they used in games? A sensor is a converter that measures a physical quantity and.
Programming with the Kinect for Windows SDK
Kinect & 3D Scanning Mark Breedveld
Professor : Tsung Fu Chien Student’s name : Nguyen Trong Tuyen Student ID: MA02B208 An application Kinect camera controls Vehicles by Gesture 1 Southern.
EEC 490 GROUP PRESENTATION: KINECT TASK VALIDATION Scott Kruger Nate Dick Pete Hogrefe James Kulon.
CONTENT 1. Introduction to Kinect 2. Some Libraries for Kinect 3. Implement 4. Conclusion & Future works 1.
Technology Traditional Kinect Based Therapy Exercises Patient have the option to do typical therapy exercise that would normally be performed at an in-office.
By Naveen kumar Badam. Contents INTRODUCTION ARCHITECTURE OF THE PROPOSED MODEL MODULES INVOLVED IN THE MODEL FUTURE WORKS CONCLUSION.
1 Machine Vision. 2 VISION the most powerful sense.
Video Camera Security and Surveillance System ICAMES 2008 Team Members : Semih Altınsoy Denis Kürov Team Advisor: Assist. Prof. M. Elif Karslıgil May,
By: David Gelbendorf, Hila Ben-Moshe Supervisor : Alon Zvirin
KINECT FOR WINDOWS Ken Casada Developer Evangelist, Microsoft Switzerland | blogblog.
Application of Facial Recognition in Biometric Security Kyle Ferris.
Product: Microsoft Kinect Team I Alex Styborski Brandon Sayre Brandon Rouhier Section 2B.
Computer Applications I I dentify alternative input devices and techniques.
A Gesture Based System Humanize Technology.  Communication is the way we learn.  What about learners with communication difficulties?  Make technology.
Identify internal hardware devices (e. g
What you need: In order to use these programs you need a program that sends out OSC messages in TUIO format. There are a few options in programs that.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Kinect for Windows By: Craig Delzangle COSC 380. What I’m going to cover: History How Kinect works Kinect and Windows Uses Conclusion Questions.
Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.
Contents Introduction Requirements Design Technology Working Interaction.
Microsoft Kinect Jason Wong Pierce Nichols Rick Berggreen Tri Le.
Microsoft Kinect How does a machine infer body position?
Preliminary project assignment Smart house Natural User Interface for Business NUIT4B.
Creative Coding & the New Kinect
Southern Taiwan University Department of Electrical Engineering
VIRTUAL INTELLIGENCE PROJECT NATAL (Kinect & Xbox 360)
EEC-693/793 Applied Computer Vision with Depth Cameras
EEC-693/793 Applied Computer Vision with Depth Cameras
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Technology in Motion The Play station Move was released September 2010
EEC-693/793 Applied Computer Vision with Depth Cameras
Kinect for Creative Development with open source frameworks
Application of Facial Recognition in Biometric Security
Presentation transcript:

By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh

Achieving Security through Kinect using Skeleton Analysis (ASKSA)

Outline Introduction About the Kinect Contribution State Diagram & Software Security Algorithm Demo Future Work Conclusion

ASKSA Project Our project is a hardware / software solution that provides a more accurate security system. Detects humans and differentiates the home owner from an ill-intentioned intruder. Compares the skeleton dimensions of a person to those stored in the database. Works well in all lighting situations specially in the dark. Alerts the home owner in intrusion cases and reduces the false alarms as much as possible.

Cont…

About the Kinect Motion sensing input device. Invented by Microsoft. Based around a webcam style. Users interact with the Xbox360need no touch a game controller through a (NUI). Not actually hacked, but someone wrote an open- source driver for PCs that essentially opens the USB connection and read the sensor inputs

Cont… The maximum depth range is 4 meters and the minimum range is 0.5 meter. On , Microsoft announced its official release of its SDK for non–commercial use.

Kinect Components RGB camera. Tow 3D depth sensors. Multi-array microphone that is capable of separate the voices that are in front of the device from the others sounds of the environment to use voice commands.

Cont… Use an infrared laser to project a matrix of dots and then the camera detects the distortion of each respective dot, enabling the Kinect to calculate the distance of each dot at 30 frames per second. A depth matrix produces, which is the distance of each pixel.

Kinect Features Developers use the Kinect to build interesting applications C++, C# or VB.NET. Raw sensor stream: access to low-level streams from the depth sensor. Skeletal tracking: track the skeleton image of a person moving within the Kinect field. Advance audio capabilities: supports the voice recognition technique.

Contribution Biometric Authentication: ASKSA to automatically differentiate between a known person and an unknown person based on skeletal recognition technology. Enhancement of security cameras’ utility and minimization of false alarms. ASKSA works in various lighting conditions and in the dark. ASKSA security algorithm is an efficient lookup against an in-memory biometric database. ASKSA is inexpensive compared with current security solutions.

State Diagram

Software Modules Kinect Manager Alarm Manager Authentication Manager Mail Manager Twillio Manager

Security Algorithm Kinect provides a collection of 20 joint positions, each with an x, y, and z Our system relies on the distances between the joints of the skeleton of the human 9 distances are taken into account (12 joints) All the 12 joints must be detected when authenticating, undetected joint get ∞ position It is almost impossible to match the 9 distances between two different persons  Secure Algorithm

Cont… In order for a seen person to pass authentication, the sum of the differences of the lengths from a known person must be within a specific threshold

Authentication Process Measurements for the seen person joints are taken ASKSA starts searching for the closest known person in the database If the sum of the differences of the lengths for the seen person from a known person is less than 12 cm the authentication success, otherwise the authentication fails ASKSA give the person 10 seconds to pass/fail the authentication What if the person get close/far from the Kinect ?!

Equations Used

Numerical Notes The average lengths for the 9 segments we took for ordinary people is approximately 327 cm 12/327 = 3.7%  ASKSA is able to differentiate two persons who have at least 3.7% difference in their skeletal dimensions 12 cm was taken as threshold after several experiments on many persons Kinect 30 FPS  10 sec = 300 frame If delta < epsilon in one of the 300 frames the authentication immediately success Any ∞ position joint make the authentication fails

Snapshots & Demo

Future Work Adding a new skeleton to the known person database via voice commands. Adding a filter to smooth the fluctuations of Kinect’s measurements, which would prevent false matches. Adding face recognition and more skeleton joints

Conclusion Skeletal recognition technology is predicted have a bright future. Play Station 4 uses a built-in Kinect that uses facial recognition and skeletal dimensions to differentiate players. ASKSA provides a security system, which has fewer false alarms, is more secure, and inexpensive compared with current security solutions.