Designing A Novel Biometric Authentication System Based on ECG Signals Using Deep Learning

Authors

  • K. R. Surendra  Assistant Professor, Department of Electronics and Communication Engineering, SV College of Engineering (SVCE), Tirupati, Andhra Pradesh, India
  • K. E. Sai Sravya  Department of Electronics and Communication Engineering, SV College of Engineering (SVCE), Tirupati, Andhra Pradesh, India
  • Kora Sai Ruchitha  Department of Electronics and Communication Engineering, SV College of Engineering (SVCE), Tirupati, Andhra Pradesh, India
  • Guvvala Charishma  Department of Electronics and Communication Engineering, SV College of Engineering (SVCE), Tirupati, Andhra Pradesh, India
  • Peddinti Aravind5  Department of Electronics and Communication Engineering, SV College of Engineering (SVCE), Tirupati, Andhra Pradesh, India
  • Cheenepalli Leela Vinod  Department of Electronics and Communication Engineering, SV College of Engineering (SVCE), Tirupati, Andhra Pradesh, India

Keywords:

Deep learning, ECG Signal, ANN Classifier, Security, Biometric Authentication

Abstract

Biometric authentication systems play a crucial role in securing sensitive information and resources. This paper proposes a novel approach to biometric authentication by leveraging Electrocardiogram (ECG) signals. The proposed system employs a comprehensive methodology that includes signal processing, feature extraction, wavelet decomposition; QRS wave detection, internal calculation, wave modelling, distance and deviation calculation, averaging threshold, and an Artificial Neural Network (ANN) classifier. The entire system is implemented and evaluated using the MATLAB tool. The process begins with the acquisition of input ECG signals, followed by pre-processing to enhance signal quality. Feature extraction is then performed to capture the unique characteristics of the ECG waveform. Wavelet decomposition is employed to analyse the signal in both time and frequency domains. QRS wave detection identifies the specific components crucial for biometric authentication. Internally, the system calculates various parameters and models the ECG waves to establish a robust representation. Distance and deviation calculations further refine the feature set. An averaging threshold is applied to enhance the system's resilience to noise and variability. The final classification is accomplished through an ANN classifier trained on the extracted features. The proposed system outputs the authentication result, displaying whether the individual is identified as female or male. The system's performance is evaluated through extensive testing using a dataset of ECG signals. Results indicate high accuracy, demonstrating the effectiveness of the proposed biometric authentication system. This research contributes to the field of biometrics by introducing a novel approach based on ECG signals, offering a secure and reliable means of personal identification. The integration of deep learning techniques enhances the system's ability to adapt to variations in ECG patterns, making it suitable for real-world applications in security and access control.

References

  1. N. Erdogmus and S. Marcel, ``Spoo_ng face recognition with 3D masks,''IEEE Trans. Inf. Forensics Security, vol. 9, no. 7, pp. 1084_1097, Jul. 2014.
  2. A. Hadid, N. Evans, S. Marcel, and J. Fierrez, ``Biometrics systems underspoo_ng attack: An evaluation methodology and lessons learned,'' IEEE Signal Process. Mag., vol. 32, no. 5, pp. 20_30, Sep. 2015.
  3. N. Kose and J.-L. Dugelay, ``On the vulnerability of face recognitionsystems to spoo_ng mask attacks,'' in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., May 2013, pp. 2357_2361.
  4. J. Galbally, R. Cappelli, A. Lumini, G. Gonzalez-de-Rivera, D. Maltoni,J. Fierrez, J. Ortega-Garcia, and D. Maio, ``An evaluation of direct attacksusing fake _ngers generated from ISO templates,'' Pattern Recognit. Lett.,vol. 31, no. 8, pp. 725_732, Jun. 2010.
  5. Z. Akhtar, C. Micheloni, and G. L. Foresti, ``Biometric liveness detection:Challenges and research opportunities,'' IEEE Secur. Privacy, vol. 13,no. 5, pp. 63_72, Sep. 2015.
  6. M. Komeili, N. Armanfard, and D. Hatzinakos, ``Liveness detection andautomatic template updating using fusion of ECG and _ngerprint,'' IEEE Trans. Inf. Forensics Security, vol. 13, no. 7, pp. 1810_1822, Jul. 2018.
  7. P. P. K. Chan, W. Liu, D. Chen, D. S. Yeung, F. Zhang, X. Wang, andC.-C. Hsu, ``Face liveness detection using a _ash against 2D spoofingattack,'' IEEE Trans. Inf. Forensics Security, vol. 13, no. 2, pp. 521_534, Feb. 2018.
  8. N. Karimian, Z. Guo, M. Tehranipoor, and D. Forte, ``Highly reliable keygeneration from electrocardiogram (ECG),'' IEEE Trans. Biomed. Eng.,vol. 64, no. 6, pp. 1400_1411, Jun. 2017.
  9. Rekha VS, Siddaraju., “An Ephemeral Analysis on Network Lifetime Improvement Techniques for Wireless Sensor Networks”, International Journal of Innovative Technology and Exploring Engineering, vol. 8, issue 9, 2278-3075, pp. 810–814, 2019.
  10. Prof. Barry Wiling. (2017). Monitoring of Sona Massori Paddy Crop and its Pests Using Image Processing. International Journal of New Practices in Management and Engineering, 6(02), 01 - 06. https://doi.org/10.17762/ijnpme.v6i02.54
  11. L.-L. Chen, Y. Zhao, P.-F. Ye, J. Zhang, and J.-Z. Zou, ``Detecting drivingstress in physiological signals based on multimodal feature analysis and kernel classifiers,'' Expert Syst. Appl., vol. 85, pp. 279_291, Nov. 2017.
  12. Goldberger, A.; Goldberger, Z.; Shvilkin, A. Clinical Electrocardiography: A Simplified Approach E- Book; Elsevier Health Sciences:Amsterdam, The Netherlands, 2017.
  13. Hoekema, R.; Uijen, G.J.H.; van Oosterom, A. Geometrical aspects of the interindividual variability of multilead ECG recordings.IEEE Trans. Biomed. Eng. 2001, 48, 551–559.
  14. R. V S and Siddaraju, "Defective Motes Uncovering and Retrieval for Optimized Network," 2022 6th International Conference on Computing Methodologies and Communication (ICCMC), 2022, pp. 303-313, doi: 10.1109/ICCMC53470.2022.9754109.
  15. Qureshi, D. I. ., & Patil, M. S. S. . (2022). Secure Sensor Node-Based Fusion by Authentication Protocol Using Internet of Things and Rfid. Research Journal of Computer Systems and Engineering, 3(1), 48–55. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/articl e/view/41
  16. P. N and C. D. Guruprakash, "A Relay Node Scheme for Energy Redeemable and Network Lifespan Enhancement," 2018 4th International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Mangalore, India, 2018, pp. 266-274.

Downloads

Published

2024-02-29

Issue

Section

Research Articles

How to Cite

[1]
K. R. Surendra, K. E. Sai Sravya, Kora Sai Ruchitha, Guvvala Charishma, Peddinti Aravind5, Cheenepalli Leela Vinod "Designing A Novel Biometric Authentication System Based on ECG Signals Using Deep Learning " International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 11, Issue 1, pp.251-259, January-February-2024.