SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 3, June 2020, pp. 3007~3013
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i3.pp3007-3013 ๏ฒ 3007
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Personal identity verification based ECG biometric using
non-fiducial features
Marwa A. Elshahed
Physics department, Faculty of Women for Arts, Sciences and Education, Ain Shams University, Egypt
Article Info ABSTRACT
Article history:
Received Aug 29, 2019
Revised Jan 5, 2020
Accepted Jan 12, 2020
Biometrics was used as an automated and fast acceptable technology for
human identification and it may be behavioral or physiological traits.
Any biometric system based on identification or verification modes for
human identity. The electrocardiogram (ECG) is considered as one of
the physiological biometrics which impossible to mimic or stole. ECG
feature extraction methods were performed using fiducial or non-fiducial
approaches. This research presents an authentication ECG biometric system
using non-fiducial features obtained by Discrete Wavelet Decomposition and
the Euclidean Distance technique was used to implement the identity
verification. From the obtained results, the proposed system accuracy is
96.66% also, using the verification system is preferred for a large number of
individuals as it takes less time to get the decision.
Keywords:
Biometric
ECG
Fiducial
Non-fiducial
Verification Copyright ยฉ 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Marwa A. Elshahed,
Departement of Physcis, Faculty of Women for Arts, Sciences and Education,
Ain Shams University,
Cairo, Egypt.
Email: lsntl@ccu.edu.tw
1. INTRODUCTION
Biometrics is a biological and unique characteristics that identify individuals. Biometrics may be
physiological as DNA, Iris, and Fingerprint or behavioral traits as keystroke, gait, and signature. All traits
which can be used as biometric should be characterized by Universality, Exclusivity, Permanence,
Collectability, Performance, Acceptability and Circumvention [1-3]. The electrocardiogram (ECG)
is biological biometric it measures the change of electrical activity of the human heart over time as shown in
Figure 1 [4]. The ECG signal consists of three waves start with the electrical P-wave generates from
the upper chambers followed by straight-line generates when the blood flows from top chambers to lower
chambers. The QRS complex is the next wave which generates from bottom chambers while the last wave is
the T wave from electrical recovery [2, 5, 6].
ECG features are fiducial and non-fiducial features. Figure 2 shows all fiducial features from
the waves which are in the time domain. Non-fiducial features are obtained by using several methods from
the transformed domain. These features needless computation time than the fiducial features also it doesn't
require to find boundaries of the ECG waveforms which change constantly [7-9]. Two ECG approaches are
available based on the used features which are fiducial and non-fiducial approaches as shown in Figure 3.
There is no general rule to get the exact locations of ECG signal boundaries because it has continuously
variations, so using non-fiducial features is solved this problem [1].
A biometric system may operate as identification or verification schemes. In all systems, the first
stage is data collection and preparing the database for the system this process is called the enrollment
process as shown in Figure 4. The enrollment process starts with ECG signals collecting from individuals and
PIN for each one. ECS signals preprocessing is performed to get more suitable signals then applying
one of feature extraction techniques then storing the obtained features in the system database with a PIN
for each individual.
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013
3008
Figure 1. One heartbeat cycle Figure 2. ECG fiducial features [10]
Figure 3. ECG biometric approaches
Figure 4. Enrollment process
In an identification system, it starts with the signal acquisition from individual and the same steps
used before in the enrollment stage repeated exactly in preprocessing and feature extraction process then
comparing between the obtained features with that stores in the database to get the individual identity.
it doesn't need identity claimed and considered as one to many matching because it searches on all
the database and gets who the user's identity or non-identified as shown in Figure 5. In the verification
system, the same as in the enrollment process in ECG signal preprocessing and feature extraction techniques
is exactly repeated. The verification system needs identity claimed and considered as one to one matching
then getting the decision yes if the features are matching and no for not matching so its result is performed
quickly and accurate as shown in Figure 6.
Most of the biometric systems used identification schemes with fiducial and non-fiducial features,
while most of verification biometric systems used fiducial features [11-13]. In [2], the Multimodal Biometric
Authentication system is proposed using a combination of ECG and Fingerprint together. Fiducial features
were extracted from ECG signals after preprocessing also converting the extracted fingerprint to
the transformed domain using DWT then extract only two features. The decision was getting from the final
score which calculated from matching ECG and fingerprint traits. A lot of parameters were calculated for
the system efficiency moreover, the number of subjects is not clear.
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed)
3009
Figure 5. Identification biometric system
Figure 6. Verification biometric system
The authors in [14], Proposed an Authentication Biometric system which based on the fiducial
features directly after preprocessing, they used 73 subjects in their experiment. The Euclidean distance was
used for matching. Then they extended their unimodal framework based on ECG trait only to be
a multimodal biometric system based on ECG and Face or ECG and fingerprint using score fusion technique.
A verification biometric system was proposed in [15], they used only 15 subjects, RR intervals were detected
from ECG signals then applying DCT to get the required features. The obtained accuracy is 97.78% after
using the correlation to get the decision.
In [16], ECG Biometric Verification system was proposed by using PCA, they used 8 subjects only
in their experiment. They used fiducial features using PCA and DWT for non-fiducial features.
The authors in [17], they get the signal features using the Hjorth Descriptor and Sample Entropy (SampEn).
Support Vector Machine (SVM) classifier was used for authentication. The obtained accuracy is 93.8% from
Hjorth Descriptor Compared to SampEn. In [18], ECG based biometric system was designed. ECG dataset of
55 users was created during four months to study the ECG-based biometrics stability. He studied
the performance of ECG as a biometric trait in short and long terms and found that more needing studies
towards improving the long-term ECG biometric systems performance.
The authors in [19] proposed ECG biometric algorithm using 184 subjects from different datasets.
They obtained 98.33% accuracy using a random forest classifier and 96.31% accuracy using the wavelet
distance measure algorithm while the two classifiers together give accuracy 99.52%. In [20], a non-fiducial
ECG biometric verification system was proposed using kernel methods for 52 subjects with Discrete Wavelet
Transform (DWT) for denoising. They studied the performance of using Support Vector Machine (SVM)
and the Linear Discriminant Analysis (LDA). A two-lead ECG signals biometric verification was proposed
in [21], autocorrelation feature extraction method was used in conjunction with different techniques for
reduction with different window lengths from short and long-term recordings. The results show that
the recognition rates affected by the recording and the window lengths. The objective of this research is to
apply a verification biometric system using non-fiducial features with Euclidean distance matching
methodology.
2. RESEARCH METHOD
The proposed biometric authentication system consists of three main steps pre-processing,
feature extraction and reduction using DWT, and matching process, as shown in Figure 7.
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013
3010
Figure 7. Block diagram of the proposed system
2.1. Datasets description
In this research, 90 subjects are used from two datasets. The first dataset is ECG-ID Database while
the second is the MIT-BIH Arrhythmia Database [22]. The number of test subjects used in the proposed
system is 72 subjects includes 11 unauthorized subjects.
2.2. Pre-processing
The first dataset has filtered signals so it used directly while the Butterworth filter was applied on
signals from the second dataset. The Pan and Tompkins algorithm was applied for R peak detection [23].
The cycle length was fixed at 200 samples because features vectors must have an equal length for all
subjects. A normalization process into the range from 0 to 1 is applied to the amplitude of all points for
each R-R cycle.
2.3. Feature extraction
Discrete Wavelet Decomposition was applied as a feature extraction method in each R-R cycle by
using Daubechies wavelets (db8) with five-level decomposition as shown in Figure 8. Selecting
the Daubechies family in this work depending on its shape and energy spectrum which close to the ECG
signal while selecting db8 from previous work which gets good results than others. The total coefficients
number after decomposition is 272 as shown in Figure 8. Figure 9. Shows the selected R-R interval and
Figure 10 shows that the wavelet coefficients after 100 are approximately closed to zero so those coefficients
are neglected (d1 and d2) and the other coefficients (104) were taken in our experiment.
Figure 8. The 5-level discrete wavelet decomposition using Daubechies wavelets 'db8'
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed)
3011
Figure 9. The selected R-R interval Figure 10. Wavelet coefficients of the selected
R-R interval
2.4. Authentication strategy
The Euclidean distance algorithm is used for verification decisions. Euclidean distance calculations
are performed exactly as follows:
Let P (i) is the stored pattern feature matrix of size:๐‘š ร— ๐‘‘:
๐‘ƒ(๐‘–)
= [
๐‘“1,1 โ‹ฏ ๐‘“1,๐‘‘
โ‹ฎ โ‹ฑ โ‹ฎ
๐‘“ ๐‘š,1 โ‹ฏ ๐‘“ ๐‘š,๐‘‘
] (1)
If N is the number of subjects so there where N stored pattern matrices P (i). P'(i) is the sample features
matrix defined as:
๐‘ƒโ€ฒ(๐‘–)
= [
๐‘“โ€ฒ1,1 โ‹ฏ ๐‘“โ€ฒ1,๐‘‘
โ‹ฎ โ‹ฑ โ‹ฎ
๐‘“โ€ฒ ๐‘š,1 โ‹ฏ ๐‘“โ€ฒ ๐‘š,๐‘‘
] (2)
The distance between the attributes of a sample and features matrix of an individual i is statistically
computed using:
๐‘‘(๐‘–)
= [
|๐‘“1,1 โˆ’ ๐‘“โ€ฒ1,1| โ‹ฏ |๐‘“1,๐‘‘ โˆ’ ๐‘“โ€ฒ1,๐‘‘|
โ‹ฎ โ‹ฑ โ‹ฎ
|๐‘“ ๐‘š,1 โˆ’ ๐‘“โ€ฒ ๐‘š,1| โ‹ฏ |๐‘“ ๐‘š,๐‘‘ โˆ’ ๐‘“โ€ฒ ๐‘š,๐‘‘|
] (3)
The distance score for an individual is calculated from the sum of Euclidean distances between feature
attributes as:
๐‘  ๐‘‘
๐‘–
= โˆ‘ |๐‘“๐‘˜,๐‘‘โˆ’ ๐‘“โ€ฒ
๐‘˜,๐‘‘
|๐‘š
๐‘˜=1 (4)
The mean of distance score for an individual (i) should be calculated due to the variations in ECG data set
signals as follows:
๐‘  ๐‘–
=
1
๐‘‘
โˆ‘ ๐‘ ๐‘—
๐‘–๐‘š
๐‘—=1 (5)
Small distance score value indicates good matching while large distance score value indicates poor
matching [14]. To get an accurate decision a threshold is calculated from the distances of the database and
the sample feature matrix for each tested individual.
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013
3012
3. EXPERIMENT AND RESULTS
90 subjects are used in the enrolment process to create the system database. Daubechies wavelet
'db8' as a feature extraction method is used. The Euclidean distance algorithm is used as a matching
algorithm. The performance of the proposed ECG verification system is estimated by calculating some
metrics as the accuracy or verification rate.
v๐‘’๐‘Ÿ๐‘–๐‘“๐‘–๐‘๐‘Ž๐‘ก๐‘–๐‘œ๐‘› ๐‘Ÿ๐‘Ž๐‘ก๐‘’(%) =
๐‘‡๐‘œ๐‘ก๐‘Ž๐‘™ ๐‘›๐‘ข๐‘š๐‘๐‘’๐‘Ÿ ๐‘œ๐‘“ ๐‘๐‘œ๐‘Ÿ๐‘Ÿ๐‘’๐‘๐‘ก๐‘™๐‘ฆ ๐‘ ๐‘Ž๐‘š๐‘๐‘™๐‘’๐‘  ๐‘๐‘
๐‘‡๐‘œ๐‘ก๐‘Ž๐‘™ ๐‘›๐‘ข๐‘š๐‘๐‘’๐‘Ÿ ๐‘œ๐‘“ ๐‘ก๐‘’๐‘ ๐‘ก ๐‘ ๐‘Ž๐‘š๐‘๐‘™๐‘’๐‘  ๐‘๐‘ก
(6)
Besides, some metrics are used such as recall, precision, and F-score to evaluate the proposed
system performance (6).
Sensitivity (%) =
TP
TP + FN
ร— 100 (7)
Specificity(%) =
TN
FP + TN
ร— 100 (8)
๐‘ƒ๐‘Ÿ๐‘’๐‘๐‘–๐‘ ๐‘–๐‘œ๐‘› (%) =
๐‘‡๐‘ƒ
๐‘‡๐‘ƒ+๐น๐‘
โˆ— 100 (9)
๐น โˆ’ ๐‘ ๐‘๐‘œ๐‘Ÿ๐‘’ =
2โˆ—๐‘†๐‘’๐‘›๐‘ ๐‘–๐‘ก๐‘–๐‘ฃ๐‘–๐‘ก๐‘ฆโˆ—๐‘ƒ๐‘Ÿ๐‘’๐‘๐‘–๐‘ ๐‘–๐‘œ๐‘›
(๐‘†๐‘’๐‘›๐‘ ๐‘–๐‘ก๐‘–๐‘ฃ๐‘–๐‘ก๐‘ฆ+๐‘ƒ๐‘Ÿ๐‘’๐‘๐‘–๐‘ ๐‘–๐‘œ๐‘›)
(10)
Where, TP denotes the number of true positive samples, TN denotes the number of true negative samples,
FP denotes the number of false-positive samples and FN denotes the number of false-negative
samples [24, 25]. The number of test subjects used in the proposed system is 72 subjects includes
11 unauthorized subjects. The following Table 1 summarizes the performance of the system.
Table 1. The Performance of the proposed system
Parameters Percent (%)
Verification Rate 94.44
Sensitivity 95.08
Specificity 90.9
Precision 98.3
F- Score 96.66
4. CONCLUSION
Some biometric traits could be imitated but the ECG signal is considered as a real-time trait that
indicates that the person is alive and present by himself. A verification biometric system based ECG signal is
proposed in this research. Daubechies wavelet 'db8' as a feature extraction method is used and the Euclidean
distance algorithm for verification decision. 90 subjects are used to build the system database, 72 subjects for
testing our verification biometric system. The system performance is evaluated by calculating some metrics.
The obtained f- Score is 96.66 %. The proposed system is more suitable for a large number of subjects which
gives its decision in a very short time with good accuracy due to using the verification approach based on
non-fiducial features.
REFERENCES
[1] Zeeshan Hassan, Syed Omer Gilani and Mohsin Jamil, โ€œReview of Fiducial and Non-Fiducial Techniques of
Feature Extraction in ECG based Biometric Systems,โ€ Indian Journal of Science and Technology, vol. 9, no. 21,
Jun. 2016. DOI: 10.17485/ijst/2016/v9i21/94841
[2] Manjunathswamy B. E., Appaji M Abhishek, Thriveni J, Venugopal K R, and L. M. Patnaik, โ€œMultimodal
Biometric Authentication using ECG and Fingerprint,โ€ International Journal of Computer Applications
(0975-8887), vol. 111, no. 13, Feb. 2015
[3] Ian McAteer, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang and Craig Valli, โ€œIntegration of Biometrics and
Steganography: A Comprehensive Review,โ€ Technologies, vol. 7, no. 34, 2019. DOI:10.3390/technologies7020034
[4] VPS G4, โ€œPrinciples of ECG,โ€ Vascular Positioning System G4, Vascular Positioning Technology Education,
[Online]. Available: http://www.arrowvascular.com/vpseducation/pre-trial/principles-of-ecg.html.
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed)
3013
[5] Ahmed Younes Shdefat, Moon-Il Joo, Sung-Hoon Choi, Hee-Cheol Kim, โ€œUtilizing ECG Waveform Features as
New Biometric Authentication Method,โ€ International Journal of Electrical and Computer Engineering (IJECE),
vol. 8, no. 2, pp. 658~665, Apr. 2018. DOI: 10.11591/ijece.v8i2.pp658-665.
[6] Vanessa Novaes Barros, โ€œThe heart cycle: review,โ€ MOJ Womenโ€™s Health, vol. 8, no. 1, 2019.
[7] Woo-Hyuk Jung 1 and Sang-Goog Lee, โ€œECG Identification Based on Non-Fiducial Feature Extraction Using
Window Removal Method,โ€ MDPI journal, vol. 7, no. 11, Nov. 2017. DOI: 10.3390/app7111205.
[8] Mohamad O. Diab, Alaa Seif, Mohamad El-Abed and Maher Sabbah, โ€œIndividual Identification Using ECG
Signals,โ€ Journal of Computer and Communications, vol. 8, pp. 74-80, 2018. DOI: 10.4236/jcc.2018.61008.
[9] Di Wang, Yujuan Si, Weiyi Yang, Gong Zhang and Jia Li, โ€œA Novel Electrocardiogram Biometric Identification
Method Based on Temporal-Frequency Autoencoding,โ€ Electronics, 2019. DOI: 10.3390/electronics8060667.
[10] ลขarฤƒlungฤƒ Dragoศ™ Daniel and Mihaela Neagu, โ€œCancelling Harmonic Power Line Interference in Biopotentials,โ€
book chapter, Intech Open, 2018. DOI: 10.5772/intechopen.74579.
[11] Pankaj Sareen, โ€œBiometrics-Introduction, Characteristics, Basic technique, its Types and Various Performance
Measures,โ€ International Journal of Emerging Research in Management & Technology, vol. 3, no. 4, 2014.
[12] Sushma Jaiswal, Sarita Singh Bhadauria and Rakesh Singh Jadon, โ€œBiometric: Case Study,โ€ Journal of Global
Research in Computer Science, vol. 2, no. 10, Oct. 2011.
[13] Ahmed M. Hamad, Rasha Salah Elhadary, Ahmed Omar Elkhateeb, โ€œMultimodal Biometric Identification Using
Fingerprint, Face and Iris Recognition,โ€ International Journal of Information Science and Intelligent System, 2014.
[14] Yogendra Narain Singh, S. K. Singh, โ€œEvaluation of Electrocardiogram for Biometric Authentication,โ€ Journal of
Information Security, vol. 3, no. pp. 39-48, 2012.
[15] Ahmed F. Hussein, Abbas K. AlZubaidi, Ali Al-Bayaty and Qais A. Habash, โ€œAn IoT Real-Time Biometric
Authentication System Based on ECG Fiducial Extracted Features Using Discrete Cosine Transform,โ€
arXiv: 1708.08189, 2017.
[16] Jameel Kadhim Abed and Nahrain N. Abd, โ€œECG Biometric Verification by using PCA,โ€ International Journal of
Engineering Trends and Technology (IJETT), vol. 65, no. 1, Nov. 2018.
[17] Sugondo Hadiyoso, Suci Aulia and Achmad Rizal, โ€œOne-Lead Electrocardiogram for Biometric Authentication
using Time Series Analysis and Support Vector Machine,โ€ (IJACSA) International Journal of Advanced Computer
Science and Applications, vol. 10, no. 2, 2019.
[18] Nikita Samarin, โ€œA Key to Your Heart: Biometric Authentication Based on ECG Signals,โ€ Project Report
Computer Science School of Informatics University of Edinburgh, 2018.
[19] Robin Tan and Marek Perkowski, โ€œToward Improving Electrocardiogram (ECG) Biometric Verification using
Mobile Sensors: A Two-Stage Classifier Approach,โ€ Sensors, vol. 17, no. 2 2017. DOI: 10.3390/s 17020410.
[20] M Hejazi, SAR Al-Haddad, YP Singh, SJ Hashim and AFA Aziz, โ€œECG biometric authentication based on non-
fiducial approach using kernel methods,โ€ Digital Signal Processing, vol. 52, pp. 72-86, May 2016.
[21] M Hejazi, SAR Al-Haddad, SJ Hashim, AFA Aziz and YP Singh, โ€œFeature level fusion for biometric verification
with two-lead ECG signals,โ€ IEEE 12th International Colloquium on Signal Processing & Its Applications(CSPA),
pp. 54-59, 2016.
[22] โ€œPhysioBank ATM,โ€ PhysioNet, [Online] Available: https://archive.physionet.org/cgi-bin/atm/ATM
[23] Jiapu Pan and Willis j. Tompkins, โ€œA Real-Time Qrs Detection Algorithm,โ€ IEEE Transactions on Biomedical
Engineering, vol. 32, no. 3, Mar. 1985.
[24] Renuka Joshi, โ€œAccuracy, Precision, Recall & F1 Score: Interpretation of Performance Measures,โ€ 2016. [Online].
Available: https://blog.exsilio.com/all/accuracy-precision-recall-f1-score-interpretation-of-performance-measures/
[Accessed 5/8/2019].
[25] Afzal Godil, Roger Bostelman, Will Shackleford, Tsai Hong and Michael Shneier, โ€œPerformance Metrics for
Evaluating Object and Human Detection and Tracking Systems,โ€ National Institute of Standards and Technology,
Jul. 2014.

More Related Content

What's hot

BIOSIGNALS_2016_28_CR
BIOSIGNALS_2016_28_CRBIOSIGNALS_2016_28_CR
BIOSIGNALS_2016_28_CRSara Casaccia
ย 
1-s2.0-S1877050915004561-main
1-s2.0-S1877050915004561-main1-s2.0-S1877050915004561-main
1-s2.0-S1877050915004561-mainAneesh Kumar
ย 
Wireless Body Area Networks for Healthcare: A Survey
Wireless Body Area Networks for Healthcare: A SurveyWireless Body Area Networks for Healthcare: A Survey
Wireless Body Area Networks for Healthcare: A Surveyijasuc
ย 
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...IRJET Journal
ย 
Towards development of a low cost and
Towards development of a low cost andTowards development of a low cost and
Towards development of a low cost andArhamSheikh1
ย 
Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...TELKOMNIKA JOURNAL
ย 
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app68917e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891Rajarshee Dhar
ย 
1804.06812
1804.068121804.06812
1804.06812maicu1
ย 
683 690,tesma412,ijeast
683 690,tesma412,ijeast683 690,tesma412,ijeast
683 690,tesma412,ijeastArhamSheikh1
ย 
Embedded system for upper-limb exoskeleton based on electromyography control
Embedded system for upper-limb exoskeleton based on electromyography controlEmbedded system for upper-limb exoskeleton based on electromyography control
Embedded system for upper-limb exoskeleton based on electromyography controlTELKOMNIKA JOURNAL
ย 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICSAlpana Ingale
ย 
Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...eSAT Publishing House
ย 
A comparative study of wavelet families for electromyography signal classific...
A comparative study of wavelet families for electromyography signal classific...A comparative study of wavelet families for electromyography signal classific...
A comparative study of wavelet families for electromyography signal classific...journalBEEI
ย 
Mecta ppt product overview
Mecta ppt product overviewMecta ppt product overview
Mecta ppt product overviewodojam
ย 
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural Network
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural NetworkIRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural Network
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural NetworkIRJET Journal
ย 
IRJET- Acute Ischemic Stroke Detection and Classification
IRJET-  	  Acute Ischemic Stroke Detection and ClassificationIRJET-  	  Acute Ischemic Stroke Detection and Classification
IRJET- Acute Ischemic Stroke Detection and ClassificationIRJET Journal
ย 
1475 925 x-13-160
1475 925 x-13-1601475 925 x-13-160
1475 925 x-13-160ArhamSheikh1
ย 
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural Network
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural NetworkIRJET- Arrhythmia Detection using One Dimensional Convolutional Neural Network
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural NetworkIRJET Journal
ย 

What's hot (19)

BIOSIGNALS_2016_28_CR
BIOSIGNALS_2016_28_CRBIOSIGNALS_2016_28_CR
BIOSIGNALS_2016_28_CR
ย 
1-s2.0-S1877050915004561-main
1-s2.0-S1877050915004561-main1-s2.0-S1877050915004561-main
1-s2.0-S1877050915004561-main
ย 
Wireless Body Area Networks for Healthcare: A Survey
Wireless Body Area Networks for Healthcare: A SurveyWireless Body Area Networks for Healthcare: A Survey
Wireless Body Area Networks for Healthcare: A Survey
ย 
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
ย 
Towards development of a low cost and
Towards development of a low cost andTowards development of a low cost and
Towards development of a low cost and
ย 
Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...
ย 
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app68917e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
ย 
1804.06812
1804.068121804.06812
1804.06812
ย 
683 690,tesma412,ijeast
683 690,tesma412,ijeast683 690,tesma412,ijeast
683 690,tesma412,ijeast
ย 
Embedded system for upper-limb exoskeleton based on electromyography control
Embedded system for upper-limb exoskeleton based on electromyography controlEmbedded system for upper-limb exoskeleton based on electromyography control
Embedded system for upper-limb exoskeleton based on electromyography control
ย 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
ย 
Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...
ย 
A comparative study of wavelet families for electromyography signal classific...
A comparative study of wavelet families for electromyography signal classific...A comparative study of wavelet families for electromyography signal classific...
A comparative study of wavelet families for electromyography signal classific...
ย 
40120140504003
4012014050400340120140504003
40120140504003
ย 
Mecta ppt product overview
Mecta ppt product overviewMecta ppt product overview
Mecta ppt product overview
ย 
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural Network
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural NetworkIRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural Network
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural Network
ย 
IRJET- Acute Ischemic Stroke Detection and Classification
IRJET-  	  Acute Ischemic Stroke Detection and ClassificationIRJET-  	  Acute Ischemic Stroke Detection and Classification
IRJET- Acute Ischemic Stroke Detection and Classification
ย 
1475 925 x-13-160
1475 925 x-13-1601475 925 x-13-160
1475 925 x-13-160
ย 
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural Network
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural NetworkIRJET- Arrhythmia Detection using One Dimensional Convolutional Neural Network
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural Network
ย 

Similar to Personal identity verification based ECG biometric using non-fiducial features

Medical system based on thermal optical system and neural network
Medical system based on thermal optical system and neural  networkMedical system based on thermal optical system and neural  network
Medical system based on thermal optical system and neural networkIJECEIAES
ย 
Transmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patientTransmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patienteSAT Publishing House
ย 
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...IRJET Journal
ย 
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfWhitney Anderson
ย 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection TechniquesIRJET Journal
ย 
Automatic ECG signal denoising and arrhythmia classification using deep learning
Automatic ECG signal denoising and arrhythmia classification using deep learningAutomatic ECG signal denoising and arrhythmia classification using deep learning
Automatic ECG signal denoising and arrhythmia classification using deep learningIRJET Journal
ย 
Deep learning Review
Deep learning  ReviewDeep learning  Review
Deep learning Reviewsherinmm
ย 
Less computational approach to detect QRS complexes in ECG rhythms
Less computational approach to detect QRS complexes in ECG rhythmsLess computational approach to detect QRS complexes in ECG rhythms
Less computational approach to detect QRS complexes in ECG rhythmsCSITiaesprime
ย 
Swarm algorithm based adaptive filter design to remove power line interferenc...
Swarm algorithm based adaptive filter design to remove power line interferenc...Swarm algorithm based adaptive filter design to remove power line interferenc...
Swarm algorithm based adaptive filter design to remove power line interferenc...eSAT Journals
ย 
C04611318
C04611318C04611318
C04611318IOSR-JEN
ย 
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...ijtsrd
ย 
Classification of cardiac vascular disease from ecg signals for enhancing mod...
Classification of cardiac vascular disease from ecg signals for enhancing mod...Classification of cardiac vascular disease from ecg signals for enhancing mod...
Classification of cardiac vascular disease from ecg signals for enhancing mod...hiij
ย 
Electrocardiograph signal recognition using wavelet transform based on optim...
Electrocardiograph signal recognition using wavelet transform  based on optim...Electrocardiograph signal recognition using wavelet transform  based on optim...
Electrocardiograph signal recognition using wavelet transform based on optim...IJECEIAES
ย 
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...AthulBS5
ย 
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...IRJET Journal
ย 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
ย 
Feature extraction of electrocardiogram signal using machine learning classif...
Feature extraction of electrocardiogram signal using machine learning classif...Feature extraction of electrocardiogram signal using machine learning classif...
Feature extraction of electrocardiogram signal using machine learning classif...IJECEIAES
ย 
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LAB
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LABPRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LAB
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LABNurhasanah Shafei
ย 
Robust System for Patient Specific Classification of ECG Signal using PCA and...
Robust System for Patient Specific Classification of ECG Signal using PCA and...Robust System for Patient Specific Classification of ECG Signal using PCA and...
Robust System for Patient Specific Classification of ECG Signal using PCA and...IRJET Journal
ย 
1-dimensional convolutional neural networks for predicting sudden cardiac
1-dimensional convolutional neural networks for predicting sudden cardiac1-dimensional convolutional neural networks for predicting sudden cardiac
1-dimensional convolutional neural networks for predicting sudden cardiacIAESIJAI
ย 

Similar to Personal identity verification based ECG biometric using non-fiducial features (20)

Medical system based on thermal optical system and neural network
Medical system based on thermal optical system and neural  networkMedical system based on thermal optical system and neural  network
Medical system based on thermal optical system and neural network
ย 
Transmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patientTransmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patient
ย 
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...
ย 
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdf
ย 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection Techniques
ย 
Automatic ECG signal denoising and arrhythmia classification using deep learning
Automatic ECG signal denoising and arrhythmia classification using deep learningAutomatic ECG signal denoising and arrhythmia classification using deep learning
Automatic ECG signal denoising and arrhythmia classification using deep learning
ย 
Deep learning Review
Deep learning  ReviewDeep learning  Review
Deep learning Review
ย 
Less computational approach to detect QRS complexes in ECG rhythms
Less computational approach to detect QRS complexes in ECG rhythmsLess computational approach to detect QRS complexes in ECG rhythms
Less computational approach to detect QRS complexes in ECG rhythms
ย 
Swarm algorithm based adaptive filter design to remove power line interferenc...
Swarm algorithm based adaptive filter design to remove power line interferenc...Swarm algorithm based adaptive filter design to remove power line interferenc...
Swarm algorithm based adaptive filter design to remove power line interferenc...
ย 
C04611318
C04611318C04611318
C04611318
ย 
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...
ย 
Classification of cardiac vascular disease from ecg signals for enhancing mod...
Classification of cardiac vascular disease from ecg signals for enhancing mod...Classification of cardiac vascular disease from ecg signals for enhancing mod...
Classification of cardiac vascular disease from ecg signals for enhancing mod...
ย 
Electrocardiograph signal recognition using wavelet transform based on optim...
Electrocardiograph signal recognition using wavelet transform  based on optim...Electrocardiograph signal recognition using wavelet transform  based on optim...
Electrocardiograph signal recognition using wavelet transform based on optim...
ย 
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...
ย 
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...
ย 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
ย 
Feature extraction of electrocardiogram signal using machine learning classif...
Feature extraction of electrocardiogram signal using machine learning classif...Feature extraction of electrocardiogram signal using machine learning classif...
Feature extraction of electrocardiogram signal using machine learning classif...
ย 
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LAB
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LABPRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LAB
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LAB
ย 
Robust System for Patient Specific Classification of ECG Signal using PCA and...
Robust System for Patient Specific Classification of ECG Signal using PCA and...Robust System for Patient Specific Classification of ECG Signal using PCA and...
Robust System for Patient Specific Classification of ECG Signal using PCA and...
ย 
1-dimensional convolutional neural networks for predicting sudden cardiac
1-dimensional convolutional neural networks for predicting sudden cardiac1-dimensional convolutional neural networks for predicting sudden cardiac
1-dimensional convolutional neural networks for predicting sudden cardiac
ย 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
ย 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
ย 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
ย 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
ย 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
ย 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
ย 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
ย 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
ย 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
ย 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
ย 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
ย 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
ย 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
ย 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
ย 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
ย 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
ย 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
ย 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
ย 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
ย 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
ย 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
ย 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
ย 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
ย 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
ย 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
ย 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
ย 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
ย 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
ย 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
ย 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
ย 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
ย 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
ย 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
ย 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
ย 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
ย 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
ย 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
ย 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
ย 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
ย 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
ย 

Recently uploaded

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
ย 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
ย 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
ย 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
ย 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
ย 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoรฃo Esperancinha
ย 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
ย 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
ย 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
ย 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
ย 
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
ย 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
ย 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
ย 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
ย 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
ย 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
ย 

Recently uploaded (20)

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
ย 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
ย 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
ย 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
ย 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
ย 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
ย 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
ย 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
ย 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
ย 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
ย 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ย 
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
ย 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
ย 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
ย 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
ย 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
ย 

Personal identity verification based ECG biometric using non-fiducial features

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 3, June 2020, pp. 3007~3013 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i3.pp3007-3013 ๏ฒ 3007 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Personal identity verification based ECG biometric using non-fiducial features Marwa A. Elshahed Physics department, Faculty of Women for Arts, Sciences and Education, Ain Shams University, Egypt Article Info ABSTRACT Article history: Received Aug 29, 2019 Revised Jan 5, 2020 Accepted Jan 12, 2020 Biometrics was used as an automated and fast acceptable technology for human identification and it may be behavioral or physiological traits. Any biometric system based on identification or verification modes for human identity. The electrocardiogram (ECG) is considered as one of the physiological biometrics which impossible to mimic or stole. ECG feature extraction methods were performed using fiducial or non-fiducial approaches. This research presents an authentication ECG biometric system using non-fiducial features obtained by Discrete Wavelet Decomposition and the Euclidean Distance technique was used to implement the identity verification. From the obtained results, the proposed system accuracy is 96.66% also, using the verification system is preferred for a large number of individuals as it takes less time to get the decision. Keywords: Biometric ECG Fiducial Non-fiducial Verification Copyright ยฉ 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Marwa A. Elshahed, Departement of Physcis, Faculty of Women for Arts, Sciences and Education, Ain Shams University, Cairo, Egypt. Email: lsntl@ccu.edu.tw 1. INTRODUCTION Biometrics is a biological and unique characteristics that identify individuals. Biometrics may be physiological as DNA, Iris, and Fingerprint or behavioral traits as keystroke, gait, and signature. All traits which can be used as biometric should be characterized by Universality, Exclusivity, Permanence, Collectability, Performance, Acceptability and Circumvention [1-3]. The electrocardiogram (ECG) is biological biometric it measures the change of electrical activity of the human heart over time as shown in Figure 1 [4]. The ECG signal consists of three waves start with the electrical P-wave generates from the upper chambers followed by straight-line generates when the blood flows from top chambers to lower chambers. The QRS complex is the next wave which generates from bottom chambers while the last wave is the T wave from electrical recovery [2, 5, 6]. ECG features are fiducial and non-fiducial features. Figure 2 shows all fiducial features from the waves which are in the time domain. Non-fiducial features are obtained by using several methods from the transformed domain. These features needless computation time than the fiducial features also it doesn't require to find boundaries of the ECG waveforms which change constantly [7-9]. Two ECG approaches are available based on the used features which are fiducial and non-fiducial approaches as shown in Figure 3. There is no general rule to get the exact locations of ECG signal boundaries because it has continuously variations, so using non-fiducial features is solved this problem [1]. A biometric system may operate as identification or verification schemes. In all systems, the first stage is data collection and preparing the database for the system this process is called the enrollment process as shown in Figure 4. The enrollment process starts with ECG signals collecting from individuals and PIN for each one. ECS signals preprocessing is performed to get more suitable signals then applying one of feature extraction techniques then storing the obtained features in the system database with a PIN for each individual.
  • 2. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013 3008 Figure 1. One heartbeat cycle Figure 2. ECG fiducial features [10] Figure 3. ECG biometric approaches Figure 4. Enrollment process In an identification system, it starts with the signal acquisition from individual and the same steps used before in the enrollment stage repeated exactly in preprocessing and feature extraction process then comparing between the obtained features with that stores in the database to get the individual identity. it doesn't need identity claimed and considered as one to many matching because it searches on all the database and gets who the user's identity or non-identified as shown in Figure 5. In the verification system, the same as in the enrollment process in ECG signal preprocessing and feature extraction techniques is exactly repeated. The verification system needs identity claimed and considered as one to one matching then getting the decision yes if the features are matching and no for not matching so its result is performed quickly and accurate as shown in Figure 6. Most of the biometric systems used identification schemes with fiducial and non-fiducial features, while most of verification biometric systems used fiducial features [11-13]. In [2], the Multimodal Biometric Authentication system is proposed using a combination of ECG and Fingerprint together. Fiducial features were extracted from ECG signals after preprocessing also converting the extracted fingerprint to the transformed domain using DWT then extract only two features. The decision was getting from the final score which calculated from matching ECG and fingerprint traits. A lot of parameters were calculated for the system efficiency moreover, the number of subjects is not clear.
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed) 3009 Figure 5. Identification biometric system Figure 6. Verification biometric system The authors in [14], Proposed an Authentication Biometric system which based on the fiducial features directly after preprocessing, they used 73 subjects in their experiment. The Euclidean distance was used for matching. Then they extended their unimodal framework based on ECG trait only to be a multimodal biometric system based on ECG and Face or ECG and fingerprint using score fusion technique. A verification biometric system was proposed in [15], they used only 15 subjects, RR intervals were detected from ECG signals then applying DCT to get the required features. The obtained accuracy is 97.78% after using the correlation to get the decision. In [16], ECG Biometric Verification system was proposed by using PCA, they used 8 subjects only in their experiment. They used fiducial features using PCA and DWT for non-fiducial features. The authors in [17], they get the signal features using the Hjorth Descriptor and Sample Entropy (SampEn). Support Vector Machine (SVM) classifier was used for authentication. The obtained accuracy is 93.8% from Hjorth Descriptor Compared to SampEn. In [18], ECG based biometric system was designed. ECG dataset of 55 users was created during four months to study the ECG-based biometrics stability. He studied the performance of ECG as a biometric trait in short and long terms and found that more needing studies towards improving the long-term ECG biometric systems performance. The authors in [19] proposed ECG biometric algorithm using 184 subjects from different datasets. They obtained 98.33% accuracy using a random forest classifier and 96.31% accuracy using the wavelet distance measure algorithm while the two classifiers together give accuracy 99.52%. In [20], a non-fiducial ECG biometric verification system was proposed using kernel methods for 52 subjects with Discrete Wavelet Transform (DWT) for denoising. They studied the performance of using Support Vector Machine (SVM) and the Linear Discriminant Analysis (LDA). A two-lead ECG signals biometric verification was proposed in [21], autocorrelation feature extraction method was used in conjunction with different techniques for reduction with different window lengths from short and long-term recordings. The results show that the recognition rates affected by the recording and the window lengths. The objective of this research is to apply a verification biometric system using non-fiducial features with Euclidean distance matching methodology. 2. RESEARCH METHOD The proposed biometric authentication system consists of three main steps pre-processing, feature extraction and reduction using DWT, and matching process, as shown in Figure 7.
  • 4. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013 3010 Figure 7. Block diagram of the proposed system 2.1. Datasets description In this research, 90 subjects are used from two datasets. The first dataset is ECG-ID Database while the second is the MIT-BIH Arrhythmia Database [22]. The number of test subjects used in the proposed system is 72 subjects includes 11 unauthorized subjects. 2.2. Pre-processing The first dataset has filtered signals so it used directly while the Butterworth filter was applied on signals from the second dataset. The Pan and Tompkins algorithm was applied for R peak detection [23]. The cycle length was fixed at 200 samples because features vectors must have an equal length for all subjects. A normalization process into the range from 0 to 1 is applied to the amplitude of all points for each R-R cycle. 2.3. Feature extraction Discrete Wavelet Decomposition was applied as a feature extraction method in each R-R cycle by using Daubechies wavelets (db8) with five-level decomposition as shown in Figure 8. Selecting the Daubechies family in this work depending on its shape and energy spectrum which close to the ECG signal while selecting db8 from previous work which gets good results than others. The total coefficients number after decomposition is 272 as shown in Figure 8. Figure 9. Shows the selected R-R interval and Figure 10 shows that the wavelet coefficients after 100 are approximately closed to zero so those coefficients are neglected (d1 and d2) and the other coefficients (104) were taken in our experiment. Figure 8. The 5-level discrete wavelet decomposition using Daubechies wavelets 'db8'
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed) 3011 Figure 9. The selected R-R interval Figure 10. Wavelet coefficients of the selected R-R interval 2.4. Authentication strategy The Euclidean distance algorithm is used for verification decisions. Euclidean distance calculations are performed exactly as follows: Let P (i) is the stored pattern feature matrix of size:๐‘š ร— ๐‘‘: ๐‘ƒ(๐‘–) = [ ๐‘“1,1 โ‹ฏ ๐‘“1,๐‘‘ โ‹ฎ โ‹ฑ โ‹ฎ ๐‘“ ๐‘š,1 โ‹ฏ ๐‘“ ๐‘š,๐‘‘ ] (1) If N is the number of subjects so there where N stored pattern matrices P (i). P'(i) is the sample features matrix defined as: ๐‘ƒโ€ฒ(๐‘–) = [ ๐‘“โ€ฒ1,1 โ‹ฏ ๐‘“โ€ฒ1,๐‘‘ โ‹ฎ โ‹ฑ โ‹ฎ ๐‘“โ€ฒ ๐‘š,1 โ‹ฏ ๐‘“โ€ฒ ๐‘š,๐‘‘ ] (2) The distance between the attributes of a sample and features matrix of an individual i is statistically computed using: ๐‘‘(๐‘–) = [ |๐‘“1,1 โˆ’ ๐‘“โ€ฒ1,1| โ‹ฏ |๐‘“1,๐‘‘ โˆ’ ๐‘“โ€ฒ1,๐‘‘| โ‹ฎ โ‹ฑ โ‹ฎ |๐‘“ ๐‘š,1 โˆ’ ๐‘“โ€ฒ ๐‘š,1| โ‹ฏ |๐‘“ ๐‘š,๐‘‘ โˆ’ ๐‘“โ€ฒ ๐‘š,๐‘‘| ] (3) The distance score for an individual is calculated from the sum of Euclidean distances between feature attributes as: ๐‘  ๐‘‘ ๐‘– = โˆ‘ |๐‘“๐‘˜,๐‘‘โˆ’ ๐‘“โ€ฒ ๐‘˜,๐‘‘ |๐‘š ๐‘˜=1 (4) The mean of distance score for an individual (i) should be calculated due to the variations in ECG data set signals as follows: ๐‘  ๐‘– = 1 ๐‘‘ โˆ‘ ๐‘ ๐‘— ๐‘–๐‘š ๐‘—=1 (5) Small distance score value indicates good matching while large distance score value indicates poor matching [14]. To get an accurate decision a threshold is calculated from the distances of the database and the sample feature matrix for each tested individual.
  • 6. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013 3012 3. EXPERIMENT AND RESULTS 90 subjects are used in the enrolment process to create the system database. Daubechies wavelet 'db8' as a feature extraction method is used. The Euclidean distance algorithm is used as a matching algorithm. The performance of the proposed ECG verification system is estimated by calculating some metrics as the accuracy or verification rate. v๐‘’๐‘Ÿ๐‘–๐‘“๐‘–๐‘๐‘Ž๐‘ก๐‘–๐‘œ๐‘› ๐‘Ÿ๐‘Ž๐‘ก๐‘’(%) = ๐‘‡๐‘œ๐‘ก๐‘Ž๐‘™ ๐‘›๐‘ข๐‘š๐‘๐‘’๐‘Ÿ ๐‘œ๐‘“ ๐‘๐‘œ๐‘Ÿ๐‘Ÿ๐‘’๐‘๐‘ก๐‘™๐‘ฆ ๐‘ ๐‘Ž๐‘š๐‘๐‘™๐‘’๐‘  ๐‘๐‘ ๐‘‡๐‘œ๐‘ก๐‘Ž๐‘™ ๐‘›๐‘ข๐‘š๐‘๐‘’๐‘Ÿ ๐‘œ๐‘“ ๐‘ก๐‘’๐‘ ๐‘ก ๐‘ ๐‘Ž๐‘š๐‘๐‘™๐‘’๐‘  ๐‘๐‘ก (6) Besides, some metrics are used such as recall, precision, and F-score to evaluate the proposed system performance (6). Sensitivity (%) = TP TP + FN ร— 100 (7) Specificity(%) = TN FP + TN ร— 100 (8) ๐‘ƒ๐‘Ÿ๐‘’๐‘๐‘–๐‘ ๐‘–๐‘œ๐‘› (%) = ๐‘‡๐‘ƒ ๐‘‡๐‘ƒ+๐น๐‘ โˆ— 100 (9) ๐น โˆ’ ๐‘ ๐‘๐‘œ๐‘Ÿ๐‘’ = 2โˆ—๐‘†๐‘’๐‘›๐‘ ๐‘–๐‘ก๐‘–๐‘ฃ๐‘–๐‘ก๐‘ฆโˆ—๐‘ƒ๐‘Ÿ๐‘’๐‘๐‘–๐‘ ๐‘–๐‘œ๐‘› (๐‘†๐‘’๐‘›๐‘ ๐‘–๐‘ก๐‘–๐‘ฃ๐‘–๐‘ก๐‘ฆ+๐‘ƒ๐‘Ÿ๐‘’๐‘๐‘–๐‘ ๐‘–๐‘œ๐‘›) (10) Where, TP denotes the number of true positive samples, TN denotes the number of true negative samples, FP denotes the number of false-positive samples and FN denotes the number of false-negative samples [24, 25]. The number of test subjects used in the proposed system is 72 subjects includes 11 unauthorized subjects. The following Table 1 summarizes the performance of the system. Table 1. The Performance of the proposed system Parameters Percent (%) Verification Rate 94.44 Sensitivity 95.08 Specificity 90.9 Precision 98.3 F- Score 96.66 4. CONCLUSION Some biometric traits could be imitated but the ECG signal is considered as a real-time trait that indicates that the person is alive and present by himself. A verification biometric system based ECG signal is proposed in this research. Daubechies wavelet 'db8' as a feature extraction method is used and the Euclidean distance algorithm for verification decision. 90 subjects are used to build the system database, 72 subjects for testing our verification biometric system. The system performance is evaluated by calculating some metrics. The obtained f- Score is 96.66 %. The proposed system is more suitable for a large number of subjects which gives its decision in a very short time with good accuracy due to using the verification approach based on non-fiducial features. REFERENCES [1] Zeeshan Hassan, Syed Omer Gilani and Mohsin Jamil, โ€œReview of Fiducial and Non-Fiducial Techniques of Feature Extraction in ECG based Biometric Systems,โ€ Indian Journal of Science and Technology, vol. 9, no. 21, Jun. 2016. DOI: 10.17485/ijst/2016/v9i21/94841 [2] Manjunathswamy B. E., Appaji M Abhishek, Thriveni J, Venugopal K R, and L. M. Patnaik, โ€œMultimodal Biometric Authentication using ECG and Fingerprint,โ€ International Journal of Computer Applications (0975-8887), vol. 111, no. 13, Feb. 2015 [3] Ian McAteer, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang and Craig Valli, โ€œIntegration of Biometrics and Steganography: A Comprehensive Review,โ€ Technologies, vol. 7, no. 34, 2019. DOI:10.3390/technologies7020034 [4] VPS G4, โ€œPrinciples of ECG,โ€ Vascular Positioning System G4, Vascular Positioning Technology Education, [Online]. Available: http://www.arrowvascular.com/vpseducation/pre-trial/principles-of-ecg.html.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed) 3013 [5] Ahmed Younes Shdefat, Moon-Il Joo, Sung-Hoon Choi, Hee-Cheol Kim, โ€œUtilizing ECG Waveform Features as New Biometric Authentication Method,โ€ International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 2, pp. 658~665, Apr. 2018. DOI: 10.11591/ijece.v8i2.pp658-665. [6] Vanessa Novaes Barros, โ€œThe heart cycle: review,โ€ MOJ Womenโ€™s Health, vol. 8, no. 1, 2019. [7] Woo-Hyuk Jung 1 and Sang-Goog Lee, โ€œECG Identification Based on Non-Fiducial Feature Extraction Using Window Removal Method,โ€ MDPI journal, vol. 7, no. 11, Nov. 2017. DOI: 10.3390/app7111205. [8] Mohamad O. Diab, Alaa Seif, Mohamad El-Abed and Maher Sabbah, โ€œIndividual Identification Using ECG Signals,โ€ Journal of Computer and Communications, vol. 8, pp. 74-80, 2018. DOI: 10.4236/jcc.2018.61008. [9] Di Wang, Yujuan Si, Weiyi Yang, Gong Zhang and Jia Li, โ€œA Novel Electrocardiogram Biometric Identification Method Based on Temporal-Frequency Autoencoding,โ€ Electronics, 2019. DOI: 10.3390/electronics8060667. [10] ลขarฤƒlungฤƒ Dragoศ™ Daniel and Mihaela Neagu, โ€œCancelling Harmonic Power Line Interference in Biopotentials,โ€ book chapter, Intech Open, 2018. DOI: 10.5772/intechopen.74579. [11] Pankaj Sareen, โ€œBiometrics-Introduction, Characteristics, Basic technique, its Types and Various Performance Measures,โ€ International Journal of Emerging Research in Management & Technology, vol. 3, no. 4, 2014. [12] Sushma Jaiswal, Sarita Singh Bhadauria and Rakesh Singh Jadon, โ€œBiometric: Case Study,โ€ Journal of Global Research in Computer Science, vol. 2, no. 10, Oct. 2011. [13] Ahmed M. Hamad, Rasha Salah Elhadary, Ahmed Omar Elkhateeb, โ€œMultimodal Biometric Identification Using Fingerprint, Face and Iris Recognition,โ€ International Journal of Information Science and Intelligent System, 2014. [14] Yogendra Narain Singh, S. K. Singh, โ€œEvaluation of Electrocardiogram for Biometric Authentication,โ€ Journal of Information Security, vol. 3, no. pp. 39-48, 2012. [15] Ahmed F. Hussein, Abbas K. AlZubaidi, Ali Al-Bayaty and Qais A. Habash, โ€œAn IoT Real-Time Biometric Authentication System Based on ECG Fiducial Extracted Features Using Discrete Cosine Transform,โ€ arXiv: 1708.08189, 2017. [16] Jameel Kadhim Abed and Nahrain N. Abd, โ€œECG Biometric Verification by using PCA,โ€ International Journal of Engineering Trends and Technology (IJETT), vol. 65, no. 1, Nov. 2018. [17] Sugondo Hadiyoso, Suci Aulia and Achmad Rizal, โ€œOne-Lead Electrocardiogram for Biometric Authentication using Time Series Analysis and Support Vector Machine,โ€ (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 10, no. 2, 2019. [18] Nikita Samarin, โ€œA Key to Your Heart: Biometric Authentication Based on ECG Signals,โ€ Project Report Computer Science School of Informatics University of Edinburgh, 2018. [19] Robin Tan and Marek Perkowski, โ€œToward Improving Electrocardiogram (ECG) Biometric Verification using Mobile Sensors: A Two-Stage Classifier Approach,โ€ Sensors, vol. 17, no. 2 2017. DOI: 10.3390/s 17020410. [20] M Hejazi, SAR Al-Haddad, YP Singh, SJ Hashim and AFA Aziz, โ€œECG biometric authentication based on non- fiducial approach using kernel methods,โ€ Digital Signal Processing, vol. 52, pp. 72-86, May 2016. [21] M Hejazi, SAR Al-Haddad, SJ Hashim, AFA Aziz and YP Singh, โ€œFeature level fusion for biometric verification with two-lead ECG signals,โ€ IEEE 12th International Colloquium on Signal Processing & Its Applications(CSPA), pp. 54-59, 2016. [22] โ€œPhysioBank ATM,โ€ PhysioNet, [Online] Available: https://archive.physionet.org/cgi-bin/atm/ATM [23] Jiapu Pan and Willis j. Tompkins, โ€œA Real-Time Qrs Detection Algorithm,โ€ IEEE Transactions on Biomedical Engineering, vol. 32, no. 3, Mar. 1985. [24] Renuka Joshi, โ€œAccuracy, Precision, Recall & F1 Score: Interpretation of Performance Measures,โ€ 2016. [Online]. Available: https://blog.exsilio.com/all/accuracy-precision-recall-f1-score-interpretation-of-performance-measures/ [Accessed 5/8/2019]. [25] Afzal Godil, Roger Bostelman, Will Shackleford, Tsai Hong and Michael Shneier, โ€œPerformance Metrics for Evaluating Object and Human Detection and Tracking Systems,โ€ National Institute of Standards and Technology, Jul. 2014.