Biometric Authentication System Based on Electrocardiogram (ECG)

Author(s):  
Muhammad Umar Khan ◽  
Sumair Aziz ◽  
Khushbakht Iqtidar ◽  
Abdullah Saud ◽  
Zohaib Azhar
Author(s):  
Jagannath Mohan ◽  
Adalarasu Kanagasabai ◽  
Vetrivelan Pandu

Security plays an important role in present day situation where identity fraud and terrorism pose a great threat. Recognizing human using computers or any artificial systems not only affords some efficient security outcomes but also facilitates human services, especially in the zone of conflict. In the recent decade, the demand for improvement in security for personal data storage has grown rapidly, and among the potential alternatives, it is one that employs innovative biometric identification techniques. Amongst these behavioral biometric techniques, the electrocardiogram (ECG) is being chosen as a physiological modality due to the uniqueness of its characteristics which integrates liveness detection, significantly preventing spoof attacks. The chapter discusses the overview of existing preprocessing, feature extraction, and classification methods for ECG-based biometric authentication. The proposed system is intended to develop applications for real-time authentication.


2021 ◽  
Author(s):  
Fatin Atiqah Rosli ◽  
Saidatul Ardeenawatie Awang ◽  
Azian Azamimi Abdullah ◽  
Mohammad Shahril Salim

2021 ◽  
Vol 11 (3) ◽  
pp. 1125
Author(s):  
Htet Myet Lynn ◽  
Pankoo Kim ◽  
Sung Bum Pan

In this report, the study of non-fiducial based approaches for Electrocardiogram(ECG) biometric authentication is examined, and several excessive techniques are proposed to perform comparative experiments for evaluating the best possible approach for all the classification tasks. Non-fiducial methods are designed to extract the discriminative information of a signal without annotating fiducial points. However, this process requires peak detection to identify a heartbeat signal. Based on recent studies that usually rely on heartbeat segmentation, QRS detection is required, and the process can be complicated for ECG signals for which the QRS complex is absent. Thus, many studies only conduct biometric authentication tasks on ECG signals with QRS complexes, and are hindered by similar limitations. To overcome this issue, we proposed a data-independent acquisition method to facilitate highly generalizable signal processing and feature learning processes. This is achieved by enhancing random segmentation to avoid complicated fiducial feature extraction, along with auto-correlation to eliminate the phase difference due to random segmentation. Subsequently, a bidirectional recurrent neural network (RNN) with long short-term memory (LSTM) deep networks is utilized to automatically learn the features associated with the signal and to perform an authentication task. The experimental results suggest that the proposed data-independent approach using a BLSTM network achieves a relatively high classification accuracy for every dataset relative to the compared techniques. Moreover, it exhibited a significantly higher accuracy rate in experiments using ECG signals without the QRS complex. The results also revealed that data-dependent methods can only perform well for specified data types and amendments of data variations, whereas the presented approach can also be considered for generalization to other quasi-periodical biometric signal-based classification tasks in future studies.


2021 ◽  
Vol 17 (1) ◽  
pp. 287-292
Author(s):  
Adriana-Meda UDROIU ◽  
Ștefan-Antonio DAN-ȘUTEU

Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.


Sign in / Sign up

Export Citation Format

Share Document