• Laser & Optoelectronics Progress
  • Vol. 57, Issue 8, 081009 (2020)
Yichao Zhang1 and Ziwen Sun1、2、*
Author Affiliations
  • 1School of Internet of Things, Jiangnan University, Wuxi, Jiangsu 214122, China
  • 2Engineering Research Center of Internet of Things Technology Applications of Ministry of Education, Wuxi, Jiangsu 214122, China
  • show less
    DOI: 10.3788/LOP57.081009 Cite this Article Set citation alerts
    Yichao Zhang, Ziwen Sun. Identity Authentication for Smart Phones Based on an Optimized Convolutional Deep Belief Network[J]. Laser & Optoelectronics Progress, 2020, 57(8): 081009 Copy Citation Text show less
    Overall framework of gesture identity authentication
    Fig. 1. Overall framework of gesture identity authentication
    Different types of CDBN models structure. (a) General structure; (b) with pooling layer
    Fig. 2. Different types of CDBN models structure. (a) General structure; (b) with pooling layer
    Different model structures. (a) RBM structure; (b) CRBM structure
    Fig. 3. Different model structures. (a) RBM structure; (b) CRBM structure
    Maximum pooling operation
    Fig. 4. Maximum pooling operation
    Single step Gibbs sampling
    Fig. 5. Single step Gibbs sampling
    Structure diagram of the output authentication model
    Fig. 6. Structure diagram of the output authentication model
    User 1 original motion trajectory
    Fig. 7. User 1 original motion trajectory
    User 1 pre-processed trajectory
    Fig. 8. User 1 pre-processed trajectory
    Fake user's gesture recovery diagram
    Fig. 9. Fake user's gesture recovery diagram
    DepthACC /%FAR /%FRR /%Time /s
    193.5246.228.0060.90
    297.6672.223.33130.56
    392.3337.1110.67251.12
    Table 1. Simulation results of different network depths
    IndexACC /%FAR /%FRR /%Time /s
    0.01096.3332.808.00109.36
    0.01597.0002.008.00115.98
    0.02097.6672.223.33130.56
    0.02595.000030.00134.02
    0.20083.3330100.00139.88
    Table 2. Simulation results of different sparsity indices
    MethodACC /%FAR /%FRR /%Time /s
    None97.3332.006.00400.31
    Mean97.6522.333.35130.77
    Max97.6672.223.33130.56
    Table 3. Simulation results of different pooling methods
    EpochACC /%FAR /%FRR /%Time /s
    596.0000.8020.0070.33
    1097.6672.223.33130.56
    2596.0002.8010.00375.61
    5097.0002.008.00643.80
    Table 4. Simulation results of different iteration times
    LayerACC /%FAR /%FRR /%Time /s
    Fully97.3332.672.67367.44
    RMS97.6672.223.33130.56
    Table 5. Simulation results of different connection layers
    MethodACC /%FAR /%FRR /%Time /s
    BP92.6604.535.0156.84
    HMM93.2503.444.4685.69
    DBN96.6302.373.79119.31
    CDBN97.6672.223.33130.56
    Table 6. Performance comparison among CDBN algorithm, BP, HMM, and DBN algorithms
    Yichao Zhang, Ziwen Sun. Identity Authentication for Smart Phones Based on an Optimized Convolutional Deep Belief Network[J]. Laser & Optoelectronics Progress, 2020, 57(8): 081009
    Download Citation