Dictionary Attack on IMU-based Gait Authentication.
Rajesh KumarCan IsikChilukuri K. MohanPublished in: CoRR (2023)
Keyphrases
- authentication mechanism
- authentication protocol
- gait recognition
- sparse representation
- gait analysis
- authentication scheme
- secret key
- biometric authentication
- absolute position
- countermeasures
- encryption decryption
- data encryption
- smart card
- trust relationships
- human gait
- human identification
- digital watermarking
- image authentication
- human recognition
- human motion
- human gait recognition
- key agreement
- motion capture
- key exchange protocol
- information security
- gait patterns
- motion analysis
- biped robot
- security mechanisms
- security protocols
- ddos attacks
- person identification