Sei sulla pagina 1di 4

VOL. 1, NO.

1, FEBRUARY 2017 3500104

Microwave/Millimeter Wave Sensors

Wireless Biometric Individual Identification Utilizing Millimeter Waves


Kailtyn Diederichs1,2 , Amy Qiu1,3 , and George Shaker1,4,5
1 Centre of Intelligent Antenna and Radio Systems, University of Waterloo, Waterloo, ON N2L 3G1, Canada
2 Department of Systems Design Engineering, University of Waterloo, Waterloo, ON N2L 3G1, Canada
3 Department of Biomedical Engineering, University of Waterloo, Waterloo, ON N2L 3G1, Canada
4 Department of Electrical and Computer Engineering, Waterloo, ON N2L 3G1, Canada
5 Spark Tech Labs, Waterloo, ON N2L 3G1, Canada
Senior Member, IEEE

Manuscript received January 30, 2017; revised February 4, 2017; accepted February 7, 2017. Date of publication February 23, 2017; date of current version
March 15, 2017.

AbstractBiometrics offer a personal and convenient way of keeping our identities and our data secure. Here, we introduce
a method of using mm-wave sensors to identify various individuals. In our system prototype, the compact radar sensor
has two transmit antennas and four receive ones. The transmitter(s) send a sequence of signals which are reflected and
scattered from a nearby part of the body of a user (a hand in our demo case). Different signal processing algorithms
are applied to the received signals in order to create a rich feature dataset. In our demo system, the resulting dataset is
classified using a random forest machine learning model, which is shown to facilitate identifying a group of individuals with
high accuracy. This technology has promising implications in terms of using mm-wave radars as an independent or an
auxiliary tool for biometric authentication.

Index TermsMicrowave/Millimeter Wave Sensors, internet of things, radars, biosensors, biometrics, identification, security.

I. INTRODUCTION
As the Internet of Things technologies gradually integrate into our
daily surroundings, sensors are becoming an increasingly prevalent
way of gathering information about the world around us. Biometric
systems, for example, can verify the identity of users based on various
forms of physiological input. The end goal of this form of authentica-
tion is to avoid the less dependable methods of passwords or physical
keys with a secure alternative, one that relies on the unique character-
istics of the users biometrics instead of the knowledge/devices they
Fig. 1. Typical 3D printed fingers and palms used for identity theft.
possess. There are many biometric authentication methods that have
been extensively studied, ranging from fingerprint scanners to retina Other techniques like facial recognition and vein imaging exist
sensors to facial recognition software. Of all of these, fingerprinting is [2][3], but those have been shown to be easily hackable or often
likely the most well-known, and has been achieved through a wide va- inaccurate; as in the case of users applying tattoos to their hands which
riety of methods, whether based on infrared, multiple camera systems, alters the acquired IR images for recognition. Amongst the multitude
or on acoustic waves [1]. However, all of these have been shown to be of technologies discussed above, most have shortcomings in terms of
prone to skimming and identity theft. In most of such cases, criminals ease of use, vulnerability to attacks, or accuracy [1]. Therefore, there
can create a 3D finger or hand with identical signature to that of a still exists a need for a secure, unobtrusive, and reliable biometric
user finger or hand when exposed to the aforementioned fingerprint authentication method.
scanners (Fig. 1).
Retinal recognition is a more reliable alternative to fingerprinting
that makes use of the distinct blood vessel pat-terns present in the II. PROPOSED BIOMETRIC
retina [2]. Optical cameras are used to perform this type of biometric IDENTIFICATION METHOD
authentication, eliminating the need for direct touch and reducing the Numerous research has been done on using mm-waves for imaging
occurrence of false negatives. However, the scanning process required [4] as well as for use in mmIDs [5] (which is a higher frequency
to obtain the retinal pattern requires the eye to be closely located to the version of Radio Frequency Identification RFIDs). Mm-wave imaging
camera, which is not as user-friendly as finger-printing. Moreover, this typically requires a cumbersome setup (since the technology typically
optical-based identification mechanism was shown to be not immune seeks probing deep into the human body), while RFIDs/MMIDs would
to hacking, skimming, and identity theft attempts [3]. require users to wear/possess some hardware for identification. To the
best of the authors knowledge, there is not an available wireless
Corresponding author: G. Shaker (e-mail: gshaker@uwaterloo.ca).
Associate Editor: Deepak Uttamchandani. solution that can rapidly identify individuals while employing a user-
Digital Object Identifier 10.1109/LSENS.2017.2673551 friendly, wearable-free, and low-cost setup.
1949-307X C 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.

See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.


3500104 VOL. 1, NO. 1, FEBRUARY 2017

Fig. 3. HFSS simulation results of different 3D fingerprint CAD models.

Fig. 2. Cross section of human skin.

Lets consider the human hands as an example. Alongside with


fingerprints, palmprints have also long been used for criminal and
forensic purposes, as the lines and wrinkles of the palm are unique
in the same way those of fingers are [3]. Moreover, the veins be-
neath the skin are also unique and present a higher level of security.
The existing biometric systems that make use of palmprints and palm Fig. 4. Unwrapped reflection phase at port 1 for 3 different users.
veins are largely optical-based, which have the same limitations as
optical fingerprint sensors. However, noting that there are approxi- changing the dielectric constant/uniformity of the 3D fingerprint mod-
mately 2700 ridge units per square inch of friction skin, with an els resulted in even more significant differences. This simplisticyet
average ridge separation of 0.020 mm to 2 mm, and an average ridge computer intensiveset of simulations demonstrated that mm-wave
breadth of 0.45 mm, and noting that the finger pad skin of a human biometric identification should be a possibility.
has three distinct layers (Fig. 2): epidermis (ranging from 0.5 mm to
1.5 mm), dermis (ranging from 0.6 mm3 mm), and subcutaneous
B. Electromagnetic Measurements
tissue (which varies significantly depending on the fat tissue), one
can argue that mm-waves are well-suited to sense such a multitude of Along the same line of thought for the simulations, we conducted a
minute differences and possibly help in identifying individuals. This set of measurements using Keysight N5227A PNA-67GHz four-port
is mainly because at 60 GHz, the free space wavelength is 5 mm. Microwave Network Analyzer. Each port was fitted with a WR-15
Considering the nominal dielectric constant of a uniform skin layer, horn antenna. A transition from waveguide to 1.8 mm connector was
the guided wavelength is about 1.5 mm which is comparable to many used to interface the horns with the VNA. We fixed the location of
of the outline palm/finger features outlined earlier, indicating possible the horns and a number of volunteers placed their hands in a fixed
satisfactory resolution to distinguish among different individuals. position relative to the horns. Measured scattering parameters data
showed that each user can be clearly distinguished. Fig. 4. shows
the unwrapped reflection phase at port 1 of 3 different users. The
III. PROOF OF CONCEPT INVESTIGATIONS magnitude, phase, and group delay responses at all ports (whether
To check the validity of the proposed method, we conducted a few reflection or transmission) were clearly distinguishable.
simple simulations and measurements;
C. System Challenges
A. Electromagnetic Simulations
Both simulations and basic RF measurements high-
A set of 3D CAD of human fingerprints were created and imported lighted a few clear conceptual challenges. For example, the
into a full wave electromagnetic simulator (Ansys HFSS). As a simpli- scattering parameters clearly differ depending on the relative position
fication, all of the models had the same uniform dielectric properties between the finger/hand and the horn antennas. In addition, measure-
to observe if the different fingerprint patterns may be electromagnet- ments with various positions/hands showed that the dermis layer and
ically observed. Two horn antennas were placed 6 mm above each subcutaneous tissue contribute significantly to the observed scattering
fingerprint model, one as a Tx and the other as an Rx. The scattering parameters. Accounting for such issues would necessitate increasing
parameters for each case were calculated. In the range of 50 GHz to the available number of channels (Tx to Rx) along with applying
70 GHz, it is clear that the magnitudes of S11 and S21 are distinctively some innovative signal processing/machine learning algorithms to
different among the tested cases (Fig. 3). This is also true for the ob- help identify individuals in a realistic scenario. These issues are
served reflection/transmission phases and group delay signals. Slightly addressed in our practical implementation.
VOL. 1, NO. 1, FEBRUARY 2017 3500104

IV. PRACTICAL IMPLEMENTATION


In our prototype system, we utilized an 8 channel (2Tx, 4Rx)
monostatic radar device using frequency-modulated continuous wave
(FMCW) operating in the 5764 GHz range [6]. The radar is packaged
in a flat surface box where the distance from the surface of the eight
printed planar antennas to plastic enclosure top is 6 mm. The radar
system was utilized in two steps: first, the training phase, where users
were instructed to place their hands on top of the enclosure. At each
hand placement, the signal is recorded from each hand in straight and
slightly angled positions (clockwise and counterclockwise rotations
of approximately 5 and 10 degrees) for a total of 10 unique sets of data
points. This was done to ensure that the classifier would be able to
ignore the noise generated from slightly different hand positions. The
users were also instructed to press their palm down on the enclosure
to allow full contact. However, they were allowed to shift their hands
slightly during the recording of data, to mimic natural user behavior
when using typical biometric authentication methods, and also to train
the classifier to recognize and handle slight movements. The collected
Fig. 5. The radar system enclosure and hand models in full-wave
data points were all labelled under each user for use in supervised ma- simulation (top figure) and the system prototype (bottom figure).
chine learning, which was performed while the training process took
place. Next, once the training part was completed, users randomly
placed their hands for identification.
In this work, the classifier algorithm used to build the initial model
for our hand identification system is a random forest, which is a
set of regression trees taken together to classify complex data points
into discrete categories. Each tree comprises of a series of branching
classifications based on randomly selected features. When several trees
are taken together, the most popular predicted outcome is taken as the
classifier for the data point.
At each hand placement, we collected 512 features (8 channels
X 64 data points each) plus the average, absolute value, root means
square, global maxima and minima of the signals from all channels,
resulting in a total of more than 600 features. The processed radar Fig. 6. The confusion matrix for five different persons.
signal streams included range, overall hand acceleration, the total
energy received from the returning radar signal, energy measured
from moving targets, velocity dispersion, spatial dispersion, energy users to try to hold their hands still in the air, and minimize the radiated
strongest component (the measure of the energy reflected from the power requirements (since the power transmitted needs to be higher
target with the largest radar cross section), movement index and fine as the distance between the user and the device increases, which could
displacement, along with the IQ data for each channel. Note that be an issue when considering safety limitations).
despite the fact that the measurements were done in a stationary mode
(placed hand), some radar metrics were used to ensure validity of the
measurements and minimize training errors (e.g. recording data before V. SYSTEM VERIFICATIONS
hand is placed properly).
The initial set of trials were conducted using two individuals, with
It is noteworthy to mention that we are operating the radar sensor at
both their left hands and right hands. Three classes were labelled in to-
10 dBm (0.1 mW) RF output power using antennas with 6 dBi of gain.
tal: no hands, hands of individual one, and hands of individual two. The
Ignoring attenuation by the plastic material itself, and considering the
training of a no hands class was necessary for the model to become
distance from the sensor top to plastic enclosure top (6 mm), the power
accustomed to the inevitable degree of background noise and clutter.
density at the surface is maximum at 0.9 W/m2 (in the direction of
The data was labelled during collection and analyzed using the random
maximum transmission) which is lower than the FCC safety limit of
forest classifier. We achieved more than 98% accuracy in identification.
10 W/m2 . Given that the system is operating at about one tenth of the
Fig. 5 demonstrates a sample test case, where a user places
safety limit, and given that users need to place their hands for mere
her hand on top of the compact-size radar system, which
seconds for identification, we believe the system is fully safe to use in
is connected to a laptop via USB for data processing and
commercial applications.
visualization. After the initial phase of training, which takes about
In general, users do not need to place their hands directly on the
1 minute of total time, the system can identify a user within seconds
packaged system. We chose a touch-based system as it serves two pur-
of placing her hand (each user was granted a different color ID on the
poses: minimize hand position variations when compared to allowing
computer screen for visualization).
3500104 VOL. 1, NO. 1, FEBRUARY 2017

We expanded our trials to a large number of individuals, achieving a ACKNOWLEDGMENT


consistent accuracy in the high 80 s. All individuals are undergraduate This work was supported by NSERC and by Googles Advanced Technology and
students, ranging from 18 to 22 years old, and hailing from more than Projects group (ATAP) through the Project Soli Alpha Access Grant.
20 different countries. Fig. 6 lists the confusion matrix for five different
persons (P1 to P5). The list of five persons include a Canadian female,
a Canadian male, a Chinese-Canadian female, an Indian-Canadian
REFERENCES
female, and a Korean-Canadian male. [1] A. K. Jain, A. Ross, and S. Prabhakar, An introduction to biometric recognition,
IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 420, Jan. 2004.
[2] H.-x. Yang and Y.-y. Cai, Adaptively weighted orthogonal gradient binary pattern
VI. CONCLUSION for single sample face recognition under varying illumination, IET Biometrics, vol.
5, no. 2, pp. 7682, 2016.
We have presentedfor the first timea concept and a working proto- [3] A. Ungureanu and C. Costache, Palm Print as a smartphone biometric: Another
option for digital privacy and security, IEEE Consum. Electron. Mag., vol. 5, no. 3,
type for a mm-wave biometric individual identification system. Com- pp. 7178, Jul. 2016.
pared to other biometric identification methods, this sensor technology [4] F. Topfer and J. Oberhammer, Millimeter-wave tissue diagnosis: The most promising
promises to be of a much higher level of security and immunity against fields for medical applications, IEEE Microw. Mag., vol. 16, no. 4, pp. 97113, May
2015.
identity thefts and hacking attempts. The presented technology has a [5] P. Burasa, T. Djerafi, N. G. Constantin, and K. Wu, High-data-rate single-chip
multitude of potential real-world applications, ranging from the up- battery-free active millimeter-wave identification tag in 65-nm CMOS technology,
grade of many household door locks to the enhancement of many IEEE Trans. Microw. Theory Techn., vol. 64, no. 7, pp. 22942303, Jul. 2016.
[6] J. Lien et al., Soli: Ubiquitous gesture sensing with millimeter wave radar, ACM
border security systems. Trans. Graphics, vol. 35, no. 4, Jul. 2016, Art. no. 142.

Potrebbero piacerti anche