by : adham suwan mohammed zaza ahmed mafarjeh
DESCRIPTION
By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh. Achieving Security through Kinect using Skeleton Analysis (ASKSA). Outline. Introduction About the Kinect Contribution State Diagram & Software Security Algorithm Demo Future Work Conclusion. ASKSA Project. - PowerPoint PPT PresentationTRANSCRIPT
![Page 3: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/3.jpg)
OutlineIntroductionAbout the KinectContributionState Diagram & SoftwareSecurity AlgorithmDemoFuture WorkConclusion
![Page 4: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/4.jpg)
ASKSA ProjectOur project is a hardware / software solution
that provides a more accurate security system.
Detects humans and differentiates the home owner from an ill-intentioned intruder.
Compares the skeleton dimensions of a person to those stored in the database.
Works well in all lighting situations specially in the dark.
Alerts the home owner in intrusion cases and reduces the false alarms as much as possible.
![Page 5: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/5.jpg)
Cont…
![Page 6: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/6.jpg)
About the KinectMotion sensing input device.Invented by Microsoft.Based around a webcam style.Users interact with the Xbox360need no
touch a game controller through a (NUI).Not actually hacked, but someone wrote
an open-source driver for PCs that essentially opens the USB connection and read the sensor inputs
![Page 7: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/7.jpg)
Cont…The maximum depth range is 4 meters and
the minimum range is 0.5 meter. On 16-6-2011, Microsoft announced its
official release of its SDK for non–commercial use.
![Page 8: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/8.jpg)
Kinect Components RGB camera.
Tow 3D depth sensors.
Multi-array microphone that is capable of separate the voices that are in front of the device from the others sounds of the environment to use voice commands.
![Page 9: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/9.jpg)
Cont…Use an infrared laser to project a matrix of dots and then
the camera detects the distortion of each respective dot, enabling the Kinect to calculate the distance of each dot at 30 frames per second.
A depth matrix produces, which is the distance of each pixel.
![Page 10: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/10.jpg)
Kinect FeaturesDevelopers use the Kinect to build interesting
applications C++, C# or VB.NET.Raw sensor stream: access to low-level
streams from the depth sensor.Skeletal tracking: track the skeleton image of
a person moving within the Kinect field.Advance audio capabilities: supports the
voice recognition technique.
![Page 11: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/11.jpg)
Contribution• Biometric Authentication: ASKSA to
automatically differentiate between a known person and an unknown person based on skeletal recognition technology.
• Enhancement of security cameras’ utility and minimization of false alarms.
• ASKSA works in various lighting conditions and in the dark.
• ASKSA security algorithm is an efficient lookup against an in-memory biometric database.
• ASKSA is inexpensive compared with current security solutions.
![Page 12: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/12.jpg)
State Diagram
![Page 13: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/13.jpg)
Software ModulesKinect Manager
Alarm Manager
Authentication Manager
Mail Manager
Twillio Manager
![Page 14: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/14.jpg)
Security AlgorithmKinect provides a collection of 20 joint
positions, each with an x, y, and zOur system relies on the distances between
the joints of the skeleton of the human9 distances are taken into account (12 joints)All the 12 joints must be detected when
authenticating, undetected joint get ∞ position
It is almost impossible to match the 9 distances between two different persons Secure Algorithm
![Page 15: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/15.jpg)
Cont… In order for a seen person to pass
authentication, the sum of the differences of the lengths from a known person must be within a specific threshold
![Page 16: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/16.jpg)
Authentication ProcessMeasurements for the seen person joints are
takenASKSA starts searching for the closest known
person in the databaseIf the sum of the differences of the lengths
for the seen person from a known person is less than 12 cm the authentication success, otherwise the authentication fails
ASKSA give the person 10 seconds to pass/fail the authentication
What if the person get close/far from the Kinect ?!
![Page 17: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/17.jpg)
Equations Useddelta: total differencesepsilon: max allow deltaSo, if delta < epsilon authentication
successful !delta = Where
d1 is the distance between 2 joints of the detected person
d2 is the distance between 2 joints of the known person
Euclidian distance
![Page 18: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/18.jpg)
Numerical NotesThe average lengths for the 9 segments we
took for ordinary people is approximately 327 cm
12/327 = 3.7% ASKSA is able to differentiate two persons who have at least 3.7% difference in their skeletal dimensions
12 cm was taken as threshold after several experiments on many persons
Kinect operates @ 30 FPS 10 sec = 300 frame
If delta < epsilon in one of the 300 frames the authentication immediately success
Any ∞ position joint make the authentication fails
![Page 19: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/19.jpg)
Snapshots & Demo
![Page 20: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/20.jpg)
Future Work• Adding a new skeleton to the known person
database via voice commands.
• Adding a filter to smooth the fluctuations of Kinect’s measurements , which would prevent false matches.
• Adding face recognition and more skeleton joints
![Page 21: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/21.jpg)
ConclusionSkeletal recognition technology is predicted
have a bright future.
Play Station 4 uses a built-in Kinect that uses facial recognition and skeletal dimensions to differentiate players.
ASKSA provides a security system, which has fewer false alarms, is more secure, and inexpensive compared with current security solutions.
![Page 22: By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh](https://reader031.vdocuments.mx/reader031/viewer/2022020717/56813034550346895d95c9d2/html5/thumbnails/22.jpg)