Accurate authentication based on ECG using deep learning

Biometric-based authentication methods have been widely used, for example on portable devices (e.g., Android and iOS devices). However, there are several known limitations in existing authentication methods based on biometrics (e.g., those using facial, iris, and fingerprint). For example, in a heal...

Full description

Saved in:
Bibliographic Details
Published inJournal of computer security Vol. 32; no. 5; pp. 425 - 446
Main Authors Zhang, Liping, Chen, Shukai, Ren, Wei, Min, Geyong, Choo, Kim-Kwang Raymond
Format Journal Article
LanguageEnglish
Published London, England SAGE Publications 18.11.2024
Sage Publications Ltd
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Biometric-based authentication methods have been widely used, for example on portable devices (e.g., Android and iOS devices). However, there are several known limitations in existing authentication methods based on biometrics (e.g., those using facial, iris, and fingerprint). For example, in a healthcare context, a user may be physically incapable of completing the authentication due to his/her medical conditions. Hence, as a complementary authentication mechanism, there have been attempts to also utilize electrocardiogram (ECG). In this work, we propose an ECG authentication system that leverages deep learning. Specifically, to achieve generalization ability, complementary ensemble empirical decomposition (CEEMD) is introduced in our design. Moreover, a 1-D Multi-scale Convolutional Neural Network (1-D MCNN) is implemented to achieve accurate authentication. To evaluate the usability of our proposed approach, we have performed extensive experiments on eight databases, and the findings show that our proposed approach achieves good performance even on abnormal databases and can be adapted for different application environments. In addition, our adopted data from eight public databases requires theoretical statistical treatment for practical applications in real authentication scenarios.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0926-227X
1875-8924
DOI:10.3233/JCS-220137