全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Individual Identification Using Linear Projection of Heartbeat Features

DOI: 10.1155/2014/602813

Full-Text   Cite this paper   Add to My Lib

Abstract:

This paper presents a novel method to use the electrocardiogram (ECG) signal as biometrics for individual identification. The ECG characterization is performed using an automated approach consisting of analytical and appearance methods. The analytical method extracts the fiducial features from heartbeats while the appearance method extracts the morphological features from the ECG trace. We linearly project the extracted features into a subspace of lower dimension using an orthogonal basis that represent the most significant features for distinguishing heartbeats among the subjects. Result demonstrates that the proposed characterization of the ECG signal and subsequently derived eigenbeat features are insensitive to signal variations and nonsignal artifacts. The proposed system utilizing ECG biometric method achieves the best identification rates of 85.7% for the subjects of MIT-BIH arrhythmia database and 92.49% for the healthy subjects of our IIT (BHU) database. These results are significantly better than the classification accuracies of 79.55% and 84.9%, reported using support vector machine on the tested subjects of MIT-BIH arrhythmia database and our IIT (BHU) database, respectively. 1. Introduction Many body parts, signaling methods, and behavioral characteristics have been suggested and used for biometrics. It includes facial characteristics, digital fingerprints, retinal scans, gait, voice patterns, and handwritten signatures [1]. Biometric identifiers are distinctive to an individual and are considered more reliable and capable than the traditional possession or knowledge based technologies in differentiating between an authorized and a fraudulent person. The biometric technology is being increasingly popular, but the concerns of this technology include the reproduction of falsified credentials from an original biometric sample, removal of the biometric features for restricting the establishment of a true identity, and presentation of the original biometric sample from an illegitimate subject. The reasons that conventional biometrics are not robust enough against falsification due to their characteristics are that they are neither confidential nor secret to an individual. For example, faces are publically visible, irises pattern can be observed anywhere they look, fingerprints are left on everything they touch, voices are being recorded, and handwritten signature can be falsely replicated [2]. In order to compliance the need of a practical biometric system such as low error rate to achieve high security level and the detection of fake biometric

References

[1]  A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4–20, 2004.
[2]  Y. N. Singh and S. K. Singh, “A taxonomy of biometric system vulnerabilities and defences,” International Journal of Biometrics, vol. 5, no. 2, pp. 137–159, 2013.
[3]  J. Ortega-Garcia, J. Bigun, D. Reynolds, and J. Gonzalez-Rodriguez, “Authentication gest personal with biometrics,” IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 50–62, 2004.
[4]  L. Biel, O. Pettersson, L. Philipson, and P. Wide, “ECG analysis: a new approach in human identification,” IEEE Transactions on Instrumentation and Measurement, vol. 50, no. 3, pp. 808–812, 2001.
[5]  M. Kyoso and A. Uchiyama, “Development of an ECG identification system,” in Proceedings of the 23rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 3721–3723, Istanbul, Turkey, October 2001.
[6]  T. W. Shen, W. J. Tompkins, and Y. H. Hu, “One-lead ECG for identity verification,” in Proceedings of the 2nd Joint Engineering in Medicine and Biology, 24th Annual Conference and the Annual Fall Meeting of the Biomedical Engineering Society Conference (EMBS/BMES '02), pp. 62–63, Houston, Tex, USA, October 2002.
[7]  S. A. Israel, J. M. Irvine, A. Cheng, M. D. Wiederhold, and B. K. Wiederhold, “ECG to identify individuals,” Pattern Recognition, vol. 38, no. 1, pp. 133–142, 2005.
[8]  Y. Wang, F. Agrafioti, D. Hatzinakos, and K. N. Plataniotis, “Analysis of human electrocardiogram for biometric recognition,” EURASIP Journal of Advances Signal Processing, vol. 2008, article 19, Article ID 148658, 11 pages, 2008.
[9]  A. Louren?o, H. Silva, and A. Fred, “Unveiling the biometric potential of finger-based ECG signals,” Computational Intelligence and Neuroscience, vol. 2011, Article ID 720971, 8 pages, 2011.
[10]  Y. N. Singh and P. Gupta, “ECG to individual identification,” in Proceedings of the IEEE 2nd International Conference on Biometrics: Theory, Applications and Systems (BTAS '08), pp. 1–8, Washington, DC, USA, October 2008.
[11]  Y. N. Singh and P. Gupta, “Biometrics method for human identification using electrocardiogram,” in Advances in Biometrics, vol. 5558 of Lecture Notes in Computer Science, pp. 1270–1279, 2009.
[12]  Y. N. Singh and P. Gupta, “Correlation-based classification of heartbeats for individual identification,” Soft Computing, vol. 15, no. 3, pp. 449–460, 2011.
[13]  Y. N. Singh and S. K. Singh, “Identifying individuals using eigenbeat features of electrocardiogram,” Journal of Engineering, vol. 2013, Article ID 539284, 8 pages, 2013.
[14]  Y. N. Singh, “Discriminant analysis for identifying individuals of electrocardiogram,” in Pattern Recognition and Machine Intelligence, vol. 8251 of Lecture Notes of Computer Science, pp. 94–99, 2013.
[15]  I. Odinaka, P. H. Lai, A. D. Kaplan, J. A. O'Sullivan, E. J. Sirevaag, and J. W. Rohrbaugh, “ECG biometric recognition: a comparative analysis,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1812–1824, 2012.
[16]  Y. N. Singh, S. K. Singh, and P. Gupta, “Fusion of electrocardiogram with unobtrusive biometrics: an efficient individual authentication system,” Pattern Recognition Letters, vol. 33, no. 14, pp. 1932–1941, 2012.
[17]  Y. N. Singh and S. K. Singh, “Evaluation of electrocardiogram for biometric authentication,” Journal of Information Security, vol. 3, no. 1, pp. 39–48, 2012.
[18]  R. A. van den Berg, H. C. J. Hoefsloot, J. A. Westerhuis, A. K. Smilde, and M. J. van der Werf, “Centering, scaling, and transformations: improving the biological information content of metabolomics data,” BMC Genomics, vol. 7, article 142, pp. 1–11, 2006.
[19]  R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification, Wiley-Interscience, New Delhi, India, 2001.
[20]  Physionet, “Physiobank archives,” Massachusetts Institute of Technology Cambridge, January 2011, http://www.physionet.org/physiobank/database/#ecg.
[21]  K. Crammer and Y. Singer, “On the algorithmic implementation of multi-class SVMs,” Journal of Machine Learning Research, vol. 2, pp. 265–292, 2001.
[22]  P. Zarychta, F. E. Smith, S. T. King et al., “Body surface potential mapping for detection of myocardial infarct sites,” Computers in Cardiology, vol. 34, pp. 181–184, 2007.
[23]  P. de Chazal, M. O'Dwyer, and R. B. Reilly, “Automatic classification of heartbeats using ECG morphology and heartbeat interval features,” IEEE Transactions on Biomedical Engineering, vol. 51, no. 7, pp. 1196–1206, 2004.
[24]  J. Pan and W. J. Tompkins, “A real-time QRS detection algorithm,” IEEE Transactions on Biomedical Engineering, vol. 32, no. 3, pp. 230–236, 1985.
[25]  J. L. Urrusti and W. J. Tompkins, “Performance evaluation of an ecg QRS complex detection algorithm,” in Proceedings of the 15th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 800–801, San Diego, Calif, USA, October 1993.
[26]  Y. N. Singh and P. Gupta, “A robust delineation approach of electrocardiographic P waves,” in Proceedings of the IEEE Symposium on Industri al Electronics and Applications (ISIEA '2009), pp. 846–849, Kuala Lumpur , Malaysia, October 2009.
[27]  Y. N. Singh and P. Gupta, “An efficient and robust technique of T wave delineation in electrocardiogram,” in Proceedings of the 2nd International Conference on Bio-Inspired Systems and Signal Processing (BIOSIGNALS '09), pp. 146–154, Porto, Portugal, January 2009.
[28]  H. C. Bazett, “An analysis of the time-relations of electrocardiograms,” Heart, vol. 7, pp. 353–370, 1920.
[29]  I. T. Jolliffe, Principal Component Analysis, Springer, New York, NY, USA, 2002.
[30]  F. Castells, P. Laguna, L. S?rnmo, A. Bollmann, and J. M. Roig, “Principal component analysis in ECG signal processing,” EURASIP Journal on Advances in Signal Processing, vol. 2007, Article ID 74580, 2007.
[31]  S. Z. Li and A. K. Jain, Handbook of Face Recognition, Springer, 2nd edition, 2011.
[32]  D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, 2nd edition, 2009.
[33]  Y. T. Tsao, T. W. Shen, T. F. Ko, and T. H. Lin, “The morphology of the electrocardiogram for eevaluating ECG biometrics,” in Proceedings of the 9th International Conference on e-Health Networking, Application and Services (HEALTHCOM '07), pp. 233–235, Taipei, Taiwan, June 2007.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133