Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Manuscript received January 30, 2017; revised February 4, 2017; accepted February 7, 2017. Date of publication February 23, 2017; date of current version
March 15, 2017.
AbstractBiometrics offer a personal and convenient way of keeping our identities and our data secure. Here, we introduce
a method of using mm-wave sensors to identify various individuals. In our system prototype, the compact radar sensor
has two transmit antennas and four receive ones. The transmitter(s) send a sequence of signals which are reflected and
scattered from a nearby part of the body of a user (a hand in our demo case). Different signal processing algorithms
are applied to the received signals in order to create a rich feature dataset. In our demo system, the resulting dataset is
classified using a random forest machine learning model, which is shown to facilitate identifying a group of individuals with
high accuracy. This technology has promising implications in terms of using mm-wave radars as an independent or an
auxiliary tool for biometric authentication.
Index TermsMicrowave/Millimeter Wave Sensors, internet of things, radars, biosensors, biometrics, identification, security.
I. INTRODUCTION
As the Internet of Things technologies gradually integrate into our
daily surroundings, sensors are becoming an increasingly prevalent
way of gathering information about the world around us. Biometric
systems, for example, can verify the identity of users based on various
forms of physiological input. The end goal of this form of authentica-
tion is to avoid the less dependable methods of passwords or physical
keys with a secure alternative, one that relies on the unique character-
istics of the users biometrics instead of the knowledge/devices they
Fig. 1. Typical 3D printed fingers and palms used for identity theft.
possess. There are many biometric authentication methods that have
been extensively studied, ranging from fingerprint scanners to retina Other techniques like facial recognition and vein imaging exist
sensors to facial recognition software. Of all of these, fingerprinting is [2][3], but those have been shown to be easily hackable or often
likely the most well-known, and has been achieved through a wide va- inaccurate; as in the case of users applying tattoos to their hands which
riety of methods, whether based on infrared, multiple camera systems, alters the acquired IR images for recognition. Amongst the multitude
or on acoustic waves [1]. However, all of these have been shown to be of technologies discussed above, most have shortcomings in terms of
prone to skimming and identity theft. In most of such cases, criminals ease of use, vulnerability to attacks, or accuracy [1]. Therefore, there
can create a 3D finger or hand with identical signature to that of a still exists a need for a secure, unobtrusive, and reliable biometric
user finger or hand when exposed to the aforementioned fingerprint authentication method.
scanners (Fig. 1).
Retinal recognition is a more reliable alternative to fingerprinting
that makes use of the distinct blood vessel pat-terns present in the II. PROPOSED BIOMETRIC
retina [2]. Optical cameras are used to perform this type of biometric IDENTIFICATION METHOD
authentication, eliminating the need for direct touch and reducing the Numerous research has been done on using mm-waves for imaging
occurrence of false negatives. However, the scanning process required [4] as well as for use in mmIDs [5] (which is a higher frequency
to obtain the retinal pattern requires the eye to be closely located to the version of Radio Frequency Identification RFIDs). Mm-wave imaging
camera, which is not as user-friendly as finger-printing. Moreover, this typically requires a cumbersome setup (since the technology typically
optical-based identification mechanism was shown to be not immune seeks probing deep into the human body), while RFIDs/MMIDs would
to hacking, skimming, and identity theft attempts [3]. require users to wear/possess some hardware for identification. To the
best of the authors knowledge, there is not an available wireless
Corresponding author: G. Shaker (e-mail: gshaker@uwaterloo.ca).
Associate Editor: Deepak Uttamchandani. solution that can rapidly identify individuals while employing a user-
Digital Object Identifier 10.1109/LSENS.2017.2673551 friendly, wearable-free, and low-cost setup.
1949-307X C 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.