SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 3, June 2020, pp. 3007~3013
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i3.pp3007-3013  3007
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Personal identity verification based ECG biometric using
non-fiducial features
Marwa A. Elshahed
Physics department, Faculty of Women for Arts, Sciences and Education, Ain Shams University, Egypt
Article Info ABSTRACT
Article history:
Received Aug 29, 2019
Revised Jan 5, 2020
Accepted Jan 12, 2020
Biometrics was used as an automated and fast acceptable technology for
human identification and it may be behavioral or physiological traits.
Any biometric system based on identification or verification modes for
human identity. The electrocardiogram (ECG) is considered as one of
the physiological biometrics which impossible to mimic or stole. ECG
feature extraction methods were performed using fiducial or non-fiducial
approaches. This research presents an authentication ECG biometric system
using non-fiducial features obtained by Discrete Wavelet Decomposition and
the Euclidean Distance technique was used to implement the identity
verification. From the obtained results, the proposed system accuracy is
96.66% also, using the verification system is preferred for a large number of
individuals as it takes less time to get the decision.
Keywords:
Biometric
ECG
Fiducial
Non-fiducial
Verification Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Marwa A. Elshahed,
Departement of Physcis, Faculty of Women for Arts, Sciences and Education,
Ain Shams University,
Cairo, Egypt.
Email: lsntl@ccu.edu.tw
1. INTRODUCTION
Biometrics is a biological and unique characteristics that identify individuals. Biometrics may be
physiological as DNA, Iris, and Fingerprint or behavioral traits as keystroke, gait, and signature. All traits
which can be used as biometric should be characterized by Universality, Exclusivity, Permanence,
Collectability, Performance, Acceptability and Circumvention [1-3]. The electrocardiogram (ECG)
is biological biometric it measures the change of electrical activity of the human heart over time as shown in
Figure 1 [4]. The ECG signal consists of three waves start with the electrical P-wave generates from
the upper chambers followed by straight-line generates when the blood flows from top chambers to lower
chambers. The QRS complex is the next wave which generates from bottom chambers while the last wave is
the T wave from electrical recovery [2, 5, 6].
ECG features are fiducial and non-fiducial features. Figure 2 shows all fiducial features from
the waves which are in the time domain. Non-fiducial features are obtained by using several methods from
the transformed domain. These features needless computation time than the fiducial features also it doesn't
require to find boundaries of the ECG waveforms which change constantly [7-9]. Two ECG approaches are
available based on the used features which are fiducial and non-fiducial approaches as shown in Figure 3.
There is no general rule to get the exact locations of ECG signal boundaries because it has continuously
variations, so using non-fiducial features is solved this problem [1].
A biometric system may operate as identification or verification schemes. In all systems, the first
stage is data collection and preparing the database for the system this process is called the enrollment
process as shown in Figure 4. The enrollment process starts with ECG signals collecting from individuals and
PIN for each one. ECS signals preprocessing is performed to get more suitable signals then applying
one of feature extraction techniques then storing the obtained features in the system database with a PIN
for each individual.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013
3008
Figure 1. One heartbeat cycle Figure 2. ECG fiducial features [10]
Figure 3. ECG biometric approaches
Figure 4. Enrollment process
In an identification system, it starts with the signal acquisition from individual and the same steps
used before in the enrollment stage repeated exactly in preprocessing and feature extraction process then
comparing between the obtained features with that stores in the database to get the individual identity.
it doesn't need identity claimed and considered as one to many matching because it searches on all
the database and gets who the user's identity or non-identified as shown in Figure 5. In the verification
system, the same as in the enrollment process in ECG signal preprocessing and feature extraction techniques
is exactly repeated. The verification system needs identity claimed and considered as one to one matching
then getting the decision yes if the features are matching and no for not matching so its result is performed
quickly and accurate as shown in Figure 6.
Most of the biometric systems used identification schemes with fiducial and non-fiducial features,
while most of verification biometric systems used fiducial features [11-13]. In [2], the Multimodal Biometric
Authentication system is proposed using a combination of ECG and Fingerprint together. Fiducial features
were extracted from ECG signals after preprocessing also converting the extracted fingerprint to
the transformed domain using DWT then extract only two features. The decision was getting from the final
score which calculated from matching ECG and fingerprint traits. A lot of parameters were calculated for
the system efficiency moreover, the number of subjects is not clear.
Int J Elec & Comp Eng ISSN: 2088-8708 
Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed)
3009
Figure 5. Identification biometric system
Figure 6. Verification biometric system
The authors in [14], Proposed an Authentication Biometric system which based on the fiducial
features directly after preprocessing, they used 73 subjects in their experiment. The Euclidean distance was
used for matching. Then they extended their unimodal framework based on ECG trait only to be
a multimodal biometric system based on ECG and Face or ECG and fingerprint using score fusion technique.
A verification biometric system was proposed in [15], they used only 15 subjects, RR intervals were detected
from ECG signals then applying DCT to get the required features. The obtained accuracy is 97.78% after
using the correlation to get the decision.
In [16], ECG Biometric Verification system was proposed by using PCA, they used 8 subjects only
in their experiment. They used fiducial features using PCA and DWT for non-fiducial features.
The authors in [17], they get the signal features using the Hjorth Descriptor and Sample Entropy (SampEn).
Support Vector Machine (SVM) classifier was used for authentication. The obtained accuracy is 93.8% from
Hjorth Descriptor Compared to SampEn. In [18], ECG based biometric system was designed. ECG dataset of
55 users was created during four months to study the ECG-based biometrics stability. He studied
the performance of ECG as a biometric trait in short and long terms and found that more needing studies
towards improving the long-term ECG biometric systems performance.
The authors in [19] proposed ECG biometric algorithm using 184 subjects from different datasets.
They obtained 98.33% accuracy using a random forest classifier and 96.31% accuracy using the wavelet
distance measure algorithm while the two classifiers together give accuracy 99.52%. In [20], a non-fiducial
ECG biometric verification system was proposed using kernel methods for 52 subjects with Discrete Wavelet
Transform (DWT) for denoising. They studied the performance of using Support Vector Machine (SVM)
and the Linear Discriminant Analysis (LDA). A two-lead ECG signals biometric verification was proposed
in [21], autocorrelation feature extraction method was used in conjunction with different techniques for
reduction with different window lengths from short and long-term recordings. The results show that
the recognition rates affected by the recording and the window lengths. The objective of this research is to
apply a verification biometric system using non-fiducial features with Euclidean distance matching
methodology.
2. RESEARCH METHOD
The proposed biometric authentication system consists of three main steps pre-processing,
feature extraction and reduction using DWT, and matching process, as shown in Figure 7.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013
3010
Figure 7. Block diagram of the proposed system
2.1. Datasets description
In this research, 90 subjects are used from two datasets. The first dataset is ECG-ID Database while
the second is the MIT-BIH Arrhythmia Database [22]. The number of test subjects used in the proposed
system is 72 subjects includes 11 unauthorized subjects.
2.2. Pre-processing
The first dataset has filtered signals so it used directly while the Butterworth filter was applied on
signals from the second dataset. The Pan and Tompkins algorithm was applied for R peak detection [23].
The cycle length was fixed at 200 samples because features vectors must have an equal length for all
subjects. A normalization process into the range from 0 to 1 is applied to the amplitude of all points for
each R-R cycle.
2.3. Feature extraction
Discrete Wavelet Decomposition was applied as a feature extraction method in each R-R cycle by
using Daubechies wavelets (db8) with five-level decomposition as shown in Figure 8. Selecting
the Daubechies family in this work depending on its shape and energy spectrum which close to the ECG
signal while selecting db8 from previous work which gets good results than others. The total coefficients
number after decomposition is 272 as shown in Figure 8. Figure 9. Shows the selected R-R interval and
Figure 10 shows that the wavelet coefficients after 100 are approximately closed to zero so those coefficients
are neglected (d1 and d2) and the other coefficients (104) were taken in our experiment.
Figure 8. The 5-level discrete wavelet decomposition using Daubechies wavelets 'db8'
Int J Elec & Comp Eng ISSN: 2088-8708 
Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed)
3011
Figure 9. The selected R-R interval Figure 10. Wavelet coefficients of the selected
R-R interval
2.4. Authentication strategy
The Euclidean distance algorithm is used for verification decisions. Euclidean distance calculations
are performed exactly as follows:
Let P (i) is the stored pattern feature matrix of size:𝑚 × 𝑑:
𝑃(𝑖)
= [
𝑓1,1 ⋯ 𝑓1,𝑑
⋮ ⋱ ⋮
𝑓 𝑚,1 ⋯ 𝑓 𝑚,𝑑
] (1)
If N is the number of subjects so there where N stored pattern matrices P (i). P'(i) is the sample features
matrix defined as:
𝑃′(𝑖)
= [
𝑓′1,1 ⋯ 𝑓′1,𝑑
⋮ ⋱ ⋮
𝑓′ 𝑚,1 ⋯ 𝑓′ 𝑚,𝑑
] (2)
The distance between the attributes of a sample and features matrix of an individual i is statistically
computed using:
𝑑(𝑖)
= [
|𝑓1,1 − 𝑓′1,1| ⋯ |𝑓1,𝑑 − 𝑓′1,𝑑|
⋮ ⋱ ⋮
|𝑓 𝑚,1 − 𝑓′ 𝑚,1| ⋯ |𝑓 𝑚,𝑑 − 𝑓′ 𝑚,𝑑|
] (3)
The distance score for an individual is calculated from the sum of Euclidean distances between feature
attributes as:
𝑠 𝑑
𝑖
= ∑ |𝑓𝑘,𝑑− 𝑓′
𝑘,𝑑
|𝑚
𝑘=1 (4)
The mean of distance score for an individual (i) should be calculated due to the variations in ECG data set
signals as follows:
𝑠 𝑖
=
1
𝑑
∑ 𝑠𝑗
𝑖𝑚
𝑗=1 (5)
Small distance score value indicates good matching while large distance score value indicates poor
matching [14]. To get an accurate decision a threshold is calculated from the distances of the database and
the sample feature matrix for each tested individual.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013
3012
3. EXPERIMENT AND RESULTS
90 subjects are used in the enrolment process to create the system database. Daubechies wavelet
'db8' as a feature extraction method is used. The Euclidean distance algorithm is used as a matching
algorithm. The performance of the proposed ECG verification system is estimated by calculating some
metrics as the accuracy or verification rate.
v𝑒𝑟𝑖𝑓𝑖𝑐𝑎𝑡𝑖𝑜𝑛 𝑟𝑎𝑡𝑒(%) =
𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑐𝑜𝑟𝑟𝑒𝑐𝑡𝑙𝑦 𝑠𝑎𝑚𝑝𝑙𝑒𝑠 𝑁𝑐
𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑡𝑒𝑠𝑡 𝑠𝑎𝑚𝑝𝑙𝑒𝑠 𝑁𝑡
(6)
Besides, some metrics are used such as recall, precision, and F-score to evaluate the proposed
system performance (6).
Sensitivity (%) =
TP
TP + FN
× 100 (7)
Specificity(%) =
TN
FP + TN
× 100 (8)
𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 (%) =
𝑇𝑃
𝑇𝑃+𝐹𝑝
∗ 100 (9)
𝐹 − 𝑠𝑐𝑜𝑟𝑒 =
2∗𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦∗𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛
(𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦+𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛)
(10)
Where, TP denotes the number of true positive samples, TN denotes the number of true negative samples,
FP denotes the number of false-positive samples and FN denotes the number of false-negative
samples [24, 25]. The number of test subjects used in the proposed system is 72 subjects includes
11 unauthorized subjects. The following Table 1 summarizes the performance of the system.
Table 1. The Performance of the proposed system
Parameters Percent (%)
Verification Rate 94.44
Sensitivity 95.08
Specificity 90.9
Precision 98.3
F- Score 96.66
4. CONCLUSION
Some biometric traits could be imitated but the ECG signal is considered as a real-time trait that
indicates that the person is alive and present by himself. A verification biometric system based ECG signal is
proposed in this research. Daubechies wavelet 'db8' as a feature extraction method is used and the Euclidean
distance algorithm for verification decision. 90 subjects are used to build the system database, 72 subjects for
testing our verification biometric system. The system performance is evaluated by calculating some metrics.
The obtained f- Score is 96.66 %. The proposed system is more suitable for a large number of subjects which
gives its decision in a very short time with good accuracy due to using the verification approach based on
non-fiducial features.
REFERENCES
[1] Zeeshan Hassan, Syed Omer Gilani and Mohsin Jamil, “Review of Fiducial and Non-Fiducial Techniques of
Feature Extraction in ECG based Biometric Systems,” Indian Journal of Science and Technology, vol. 9, no. 21,
Jun. 2016. DOI: 10.17485/ijst/2016/v9i21/94841
[2] Manjunathswamy B. E., Appaji M Abhishek, Thriveni J, Venugopal K R, and L. M. Patnaik, “Multimodal
Biometric Authentication using ECG and Fingerprint,” International Journal of Computer Applications
(0975-8887), vol. 111, no. 13, Feb. 2015
[3] Ian McAteer, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang and Craig Valli, “Integration of Biometrics and
Steganography: A Comprehensive Review,” Technologies, vol. 7, no. 34, 2019. DOI:10.3390/technologies7020034
[4] VPS G4, “Principles of ECG,” Vascular Positioning System G4, Vascular Positioning Technology Education,
[Online]. Available: http://www.arrowvascular.com/vpseducation/pre-trial/principles-of-ecg.html.
Int J Elec & Comp Eng ISSN: 2088-8708 
Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed)
3013
[5] Ahmed Younes Shdefat, Moon-Il Joo, Sung-Hoon Choi, Hee-Cheol Kim, “Utilizing ECG Waveform Features as
New Biometric Authentication Method,” International Journal of Electrical and Computer Engineering (IJECE),
vol. 8, no. 2, pp. 658~665, Apr. 2018. DOI: 10.11591/ijece.v8i2.pp658-665.
[6] Vanessa Novaes Barros, “The heart cycle: review,” MOJ Women’s Health, vol. 8, no. 1, 2019.
[7] Woo-Hyuk Jung 1 and Sang-Goog Lee, “ECG Identification Based on Non-Fiducial Feature Extraction Using
Window Removal Method,” MDPI journal, vol. 7, no. 11, Nov. 2017. DOI: 10.3390/app7111205.
[8] Mohamad O. Diab, Alaa Seif, Mohamad El-Abed and Maher Sabbah, “Individual Identification Using ECG
Signals,” Journal of Computer and Communications, vol. 8, pp. 74-80, 2018. DOI: 10.4236/jcc.2018.61008.
[9] Di Wang, Yujuan Si, Weiyi Yang, Gong Zhang and Jia Li, “A Novel Electrocardiogram Biometric Identification
Method Based on Temporal-Frequency Autoencoding,” Electronics, 2019. DOI: 10.3390/electronics8060667.
[10] Ţarălungă Dragoș Daniel and Mihaela Neagu, “Cancelling Harmonic Power Line Interference in Biopotentials,”
book chapter, Intech Open, 2018. DOI: 10.5772/intechopen.74579.
[11] Pankaj Sareen, “Biometrics-Introduction, Characteristics, Basic technique, its Types and Various Performance
Measures,” International Journal of Emerging Research in Management & Technology, vol. 3, no. 4, 2014.
[12] Sushma Jaiswal, Sarita Singh Bhadauria and Rakesh Singh Jadon, “Biometric: Case Study,” Journal of Global
Research in Computer Science, vol. 2, no. 10, Oct. 2011.
[13] Ahmed M. Hamad, Rasha Salah Elhadary, Ahmed Omar Elkhateeb, “Multimodal Biometric Identification Using
Fingerprint, Face and Iris Recognition,” International Journal of Information Science and Intelligent System, 2014.
[14] Yogendra Narain Singh, S. K. Singh, “Evaluation of Electrocardiogram for Biometric Authentication,” Journal of
Information Security, vol. 3, no. pp. 39-48, 2012.
[15] Ahmed F. Hussein, Abbas K. AlZubaidi, Ali Al-Bayaty and Qais A. Habash, “An IoT Real-Time Biometric
Authentication System Based on ECG Fiducial Extracted Features Using Discrete Cosine Transform,”
arXiv: 1708.08189, 2017.
[16] Jameel Kadhim Abed and Nahrain N. Abd, “ECG Biometric Verification by using PCA,” International Journal of
Engineering Trends and Technology (IJETT), vol. 65, no. 1, Nov. 2018.
[17] Sugondo Hadiyoso, Suci Aulia and Achmad Rizal, “One-Lead Electrocardiogram for Biometric Authentication
using Time Series Analysis and Support Vector Machine,” (IJACSA) International Journal of Advanced Computer
Science and Applications, vol. 10, no. 2, 2019.
[18] Nikita Samarin, “A Key to Your Heart: Biometric Authentication Based on ECG Signals,” Project Report
Computer Science School of Informatics University of Edinburgh, 2018.
[19] Robin Tan and Marek Perkowski, “Toward Improving Electrocardiogram (ECG) Biometric Verification using
Mobile Sensors: A Two-Stage Classifier Approach,” Sensors, vol. 17, no. 2 2017. DOI: 10.3390/s 17020410.
[20] M Hejazi, SAR Al-Haddad, YP Singh, SJ Hashim and AFA Aziz, “ECG biometric authentication based on non-
fiducial approach using kernel methods,” Digital Signal Processing, vol. 52, pp. 72-86, May 2016.
[21] M Hejazi, SAR Al-Haddad, SJ Hashim, AFA Aziz and YP Singh, “Feature level fusion for biometric verification
with two-lead ECG signals,” IEEE 12th International Colloquium on Signal Processing & Its Applications(CSPA),
pp. 54-59, 2016.
[22] “PhysioBank ATM,” PhysioNet, [Online] Available: https://archive.physionet.org/cgi-bin/atm/ATM
[23] Jiapu Pan and Willis j. Tompkins, “A Real-Time Qrs Detection Algorithm,” IEEE Transactions on Biomedical
Engineering, vol. 32, no. 3, Mar. 1985.
[24] Renuka Joshi, “Accuracy, Precision, Recall & F1 Score: Interpretation of Performance Measures,” 2016. [Online].
Available: https://blog.exsilio.com/all/accuracy-precision-recall-f1-score-interpretation-of-performance-measures/
[Accessed 5/8/2019].
[25] Afzal Godil, Roger Bostelman, Will Shackleford, Tsai Hong and Michael Shneier, “Performance Metrics for
Evaluating Object and Human Detection and Tracking Systems,” National Institute of Standards and Technology,
Jul. 2014.

More Related Content

What's hot

BIOSIGNALS_2016_28_CR
BIOSIGNALS_2016_28_CRBIOSIGNALS_2016_28_CR
BIOSIGNALS_2016_28_CRSara Casaccia
 
1-s2.0-S1877050915004561-main
1-s2.0-S1877050915004561-main1-s2.0-S1877050915004561-main
1-s2.0-S1877050915004561-mainAneesh Kumar
 
Wireless Body Area Networks for Healthcare: A Survey
Wireless Body Area Networks for Healthcare: A SurveyWireless Body Area Networks for Healthcare: A Survey
Wireless Body Area Networks for Healthcare: A Survey
ijasuc
 
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
IRJET Journal
 
Towards development of a low cost and
Towards development of a low cost andTowards development of a low cost and
Towards development of a low cost and
ArhamSheikh1
 
Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...
TELKOMNIKA JOURNAL
 
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app68917e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
Rajarshee Dhar
 
1804.06812
1804.068121804.06812
1804.06812
maicu1
 
683 690,tesma412,ijeast
683 690,tesma412,ijeast683 690,tesma412,ijeast
683 690,tesma412,ijeast
ArhamSheikh1
 
Embedded system for upper-limb exoskeleton based on electromyography control
Embedded system for upper-limb exoskeleton based on electromyography controlEmbedded system for upper-limb exoskeleton based on electromyography control
Embedded system for upper-limb exoskeleton based on electromyography control
TELKOMNIKA JOURNAL
 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
Alpana Ingale
 
Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...
eSAT Publishing House
 
A comparative study of wavelet families for electromyography signal classific...
A comparative study of wavelet families for electromyography signal classific...A comparative study of wavelet families for electromyography signal classific...
A comparative study of wavelet families for electromyography signal classific...
journalBEEI
 
Mecta ppt product overview
Mecta ppt product overviewMecta ppt product overview
Mecta ppt product overview
odojam
 
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural Network
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural NetworkIRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural Network
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural Network
IRJET Journal
 
IRJET- Acute Ischemic Stroke Detection and Classification
IRJET-  	  Acute Ischemic Stroke Detection and ClassificationIRJET-  	  Acute Ischemic Stroke Detection and Classification
IRJET- Acute Ischemic Stroke Detection and Classification
IRJET Journal
 
1475 925 x-13-160
1475 925 x-13-1601475 925 x-13-160
1475 925 x-13-160
ArhamSheikh1
 
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural Network
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural NetworkIRJET- Arrhythmia Detection using One Dimensional Convolutional Neural Network
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural Network
IRJET Journal
 

What's hot (19)

BIOSIGNALS_2016_28_CR
BIOSIGNALS_2016_28_CRBIOSIGNALS_2016_28_CR
BIOSIGNALS_2016_28_CR
 
1-s2.0-S1877050915004561-main
1-s2.0-S1877050915004561-main1-s2.0-S1877050915004561-main
1-s2.0-S1877050915004561-main
 
Wireless Body Area Networks for Healthcare: A Survey
Wireless Body Area Networks for Healthcare: A SurveyWireless Body Area Networks for Healthcare: A Survey
Wireless Body Area Networks for Healthcare: A Survey
 
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
 
Towards development of a low cost and
Towards development of a low cost andTowards development of a low cost and
Towards development of a low cost and
 
Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...Training feedforward neural network using genetic algorithm to diagnose left ...
Training feedforward neural network using genetic algorithm to diagnose left ...
 
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app68917e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
 
1804.06812
1804.068121804.06812
1804.06812
 
683 690,tesma412,ijeast
683 690,tesma412,ijeast683 690,tesma412,ijeast
683 690,tesma412,ijeast
 
Embedded system for upper-limb exoskeleton based on electromyography control
Embedded system for upper-limb exoskeleton based on electromyography controlEmbedded system for upper-limb exoskeleton based on electromyography control
Embedded system for upper-limb exoskeleton based on electromyography control
 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
 
Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...
 
A comparative study of wavelet families for electromyography signal classific...
A comparative study of wavelet families for electromyography signal classific...A comparative study of wavelet families for electromyography signal classific...
A comparative study of wavelet families for electromyography signal classific...
 
40120140504003
4012014050400340120140504003
40120140504003
 
Mecta ppt product overview
Mecta ppt product overviewMecta ppt product overview
Mecta ppt product overview
 
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural Network
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural NetworkIRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural Network
IRJET - ECG based Cardiac Arrhythmia Detection using a Deep Neural Network
 
IRJET- Acute Ischemic Stroke Detection and Classification
IRJET-  	  Acute Ischemic Stroke Detection and ClassificationIRJET-  	  Acute Ischemic Stroke Detection and Classification
IRJET- Acute Ischemic Stroke Detection and Classification
 
1475 925 x-13-160
1475 925 x-13-1601475 925 x-13-160
1475 925 x-13-160
 
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural Network
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural NetworkIRJET- Arrhythmia Detection using One Dimensional Convolutional Neural Network
IRJET- Arrhythmia Detection using One Dimensional Convolutional Neural Network
 

Similar to Personal identity verification based ECG biometric using non-fiducial features

Medical system based on thermal optical system and neural network
Medical system based on thermal optical system and neural  networkMedical system based on thermal optical system and neural  network
Medical system based on thermal optical system and neural network
IJECEIAES
 
Transmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patientTransmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patient
eSAT Publishing House
 
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...
IRJET Journal
 
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdf
Whitney Anderson
 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection Techniques
IRJET Journal
 
Automatic ECG signal denoising and arrhythmia classification using deep learning
Automatic ECG signal denoising and arrhythmia classification using deep learningAutomatic ECG signal denoising and arrhythmia classification using deep learning
Automatic ECG signal denoising and arrhythmia classification using deep learning
IRJET Journal
 
Deep learning Review
Deep learning  ReviewDeep learning  Review
Deep learning Review
sherinmm
 
Less computational approach to detect QRS complexes in ECG rhythms
Less computational approach to detect QRS complexes in ECG rhythmsLess computational approach to detect QRS complexes in ECG rhythms
Less computational approach to detect QRS complexes in ECG rhythms
CSITiaesprime
 
Swarm algorithm based adaptive filter design to remove power line interferenc...
Swarm algorithm based adaptive filter design to remove power line interferenc...Swarm algorithm based adaptive filter design to remove power line interferenc...
Swarm algorithm based adaptive filter design to remove power line interferenc...
eSAT Journals
 
C04611318
C04611318C04611318
C04611318
IOSR-JEN
 
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...
ijtsrd
 
Classification of cardiac vascular disease from ecg signals for enhancing mod...
Classification of cardiac vascular disease from ecg signals for enhancing mod...Classification of cardiac vascular disease from ecg signals for enhancing mod...
Classification of cardiac vascular disease from ecg signals for enhancing mod...
hiij
 
Electrocardiograph signal recognition using wavelet transform based on optim...
Electrocardiograph signal recognition using wavelet transform  based on optim...Electrocardiograph signal recognition using wavelet transform  based on optim...
Electrocardiograph signal recognition using wavelet transform based on optim...
IJECEIAES
 
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...
AthulBS5
 
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...
IRJET Journal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Feature extraction of electrocardiogram signal using machine learning classif...
Feature extraction of electrocardiogram signal using machine learning classif...Feature extraction of electrocardiogram signal using machine learning classif...
Feature extraction of electrocardiogram signal using machine learning classif...
IJECEIAES
 
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LAB
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LABPRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LAB
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LAB
Nurhasanah Shafei
 
Robust System for Patient Specific Classification of ECG Signal using PCA and...
Robust System for Patient Specific Classification of ECG Signal using PCA and...Robust System for Patient Specific Classification of ECG Signal using PCA and...
Robust System for Patient Specific Classification of ECG Signal using PCA and...
IRJET Journal
 
1-dimensional convolutional neural networks for predicting sudden cardiac
1-dimensional convolutional neural networks for predicting sudden cardiac1-dimensional convolutional neural networks for predicting sudden cardiac
1-dimensional convolutional neural networks for predicting sudden cardiac
IAESIJAI
 

Similar to Personal identity verification based ECG biometric using non-fiducial features (20)

Medical system based on thermal optical system and neural network
Medical system based on thermal optical system and neural  networkMedical system based on thermal optical system and neural  network
Medical system based on thermal optical system and neural network
 
Transmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patientTransmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patient
 
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...
Neural Network-Based Automatic Classification of ECG Signals with Wavelet Sta...
 
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdf
 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection Techniques
 
Automatic ECG signal denoising and arrhythmia classification using deep learning
Automatic ECG signal denoising and arrhythmia classification using deep learningAutomatic ECG signal denoising and arrhythmia classification using deep learning
Automatic ECG signal denoising and arrhythmia classification using deep learning
 
Deep learning Review
Deep learning  ReviewDeep learning  Review
Deep learning Review
 
Less computational approach to detect QRS complexes in ECG rhythms
Less computational approach to detect QRS complexes in ECG rhythmsLess computational approach to detect QRS complexes in ECG rhythms
Less computational approach to detect QRS complexes in ECG rhythms
 
Swarm algorithm based adaptive filter design to remove power line interferenc...
Swarm algorithm based adaptive filter design to remove power line interferenc...Swarm algorithm based adaptive filter design to remove power line interferenc...
Swarm algorithm based adaptive filter design to remove power line interferenc...
 
C04611318
C04611318C04611318
C04611318
 
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...
 
Classification of cardiac vascular disease from ecg signals for enhancing mod...
Classification of cardiac vascular disease from ecg signals for enhancing mod...Classification of cardiac vascular disease from ecg signals for enhancing mod...
Classification of cardiac vascular disease from ecg signals for enhancing mod...
 
Electrocardiograph signal recognition using wavelet transform based on optim...
Electrocardiograph signal recognition using wavelet transform  based on optim...Electrocardiograph signal recognition using wavelet transform  based on optim...
Electrocardiograph signal recognition using wavelet transform based on optim...
 
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...
MEDICAL REMOTE MONITORING OF MULTIPLE PHYSIOLOGICAL PARAMETERS BASED ON WIREL...
 
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...
Analysis of Various Signals Acquired from Uterine Contraction to Determine Tr...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Feature extraction of electrocardiogram signal using machine learning classif...
Feature extraction of electrocardiogram signal using machine learning classif...Feature extraction of electrocardiogram signal using machine learning classif...
Feature extraction of electrocardiogram signal using machine learning classif...
 
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LAB
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LABPRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LAB
PRESENTATION LAB DSP.Analysis & classification of EMG signal - DSP LAB
 
Robust System for Patient Specific Classification of ECG Signal using PCA and...
Robust System for Patient Specific Classification of ECG Signal using PCA and...Robust System for Patient Specific Classification of ECG Signal using PCA and...
Robust System for Patient Specific Classification of ECG Signal using PCA and...
 
1-dimensional convolutional neural networks for predicting sudden cardiac
1-dimensional convolutional neural networks for predicting sudden cardiac1-dimensional convolutional neural networks for predicting sudden cardiac
1-dimensional convolutional neural networks for predicting sudden cardiac
 

More from IJECEIAES

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
IJECEIAES
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
IJECEIAES
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
IJECEIAES
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
IJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
IJECEIAES
 

More from IJECEIAES (20)

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 

Recently uploaded

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 

Recently uploaded (20)

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 

Personal identity verification based ECG biometric using non-fiducial features

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 3, June 2020, pp. 3007~3013 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i3.pp3007-3013  3007 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Personal identity verification based ECG biometric using non-fiducial features Marwa A. Elshahed Physics department, Faculty of Women for Arts, Sciences and Education, Ain Shams University, Egypt Article Info ABSTRACT Article history: Received Aug 29, 2019 Revised Jan 5, 2020 Accepted Jan 12, 2020 Biometrics was used as an automated and fast acceptable technology for human identification and it may be behavioral or physiological traits. Any biometric system based on identification or verification modes for human identity. The electrocardiogram (ECG) is considered as one of the physiological biometrics which impossible to mimic or stole. ECG feature extraction methods were performed using fiducial or non-fiducial approaches. This research presents an authentication ECG biometric system using non-fiducial features obtained by Discrete Wavelet Decomposition and the Euclidean Distance technique was used to implement the identity verification. From the obtained results, the proposed system accuracy is 96.66% also, using the verification system is preferred for a large number of individuals as it takes less time to get the decision. Keywords: Biometric ECG Fiducial Non-fiducial Verification Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Marwa A. Elshahed, Departement of Physcis, Faculty of Women for Arts, Sciences and Education, Ain Shams University, Cairo, Egypt. Email: lsntl@ccu.edu.tw 1. INTRODUCTION Biometrics is a biological and unique characteristics that identify individuals. Biometrics may be physiological as DNA, Iris, and Fingerprint or behavioral traits as keystroke, gait, and signature. All traits which can be used as biometric should be characterized by Universality, Exclusivity, Permanence, Collectability, Performance, Acceptability and Circumvention [1-3]. The electrocardiogram (ECG) is biological biometric it measures the change of electrical activity of the human heart over time as shown in Figure 1 [4]. The ECG signal consists of three waves start with the electrical P-wave generates from the upper chambers followed by straight-line generates when the blood flows from top chambers to lower chambers. The QRS complex is the next wave which generates from bottom chambers while the last wave is the T wave from electrical recovery [2, 5, 6]. ECG features are fiducial and non-fiducial features. Figure 2 shows all fiducial features from the waves which are in the time domain. Non-fiducial features are obtained by using several methods from the transformed domain. These features needless computation time than the fiducial features also it doesn't require to find boundaries of the ECG waveforms which change constantly [7-9]. Two ECG approaches are available based on the used features which are fiducial and non-fiducial approaches as shown in Figure 3. There is no general rule to get the exact locations of ECG signal boundaries because it has continuously variations, so using non-fiducial features is solved this problem [1]. A biometric system may operate as identification or verification schemes. In all systems, the first stage is data collection and preparing the database for the system this process is called the enrollment process as shown in Figure 4. The enrollment process starts with ECG signals collecting from individuals and PIN for each one. ECS signals preprocessing is performed to get more suitable signals then applying one of feature extraction techniques then storing the obtained features in the system database with a PIN for each individual.
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013 3008 Figure 1. One heartbeat cycle Figure 2. ECG fiducial features [10] Figure 3. ECG biometric approaches Figure 4. Enrollment process In an identification system, it starts with the signal acquisition from individual and the same steps used before in the enrollment stage repeated exactly in preprocessing and feature extraction process then comparing between the obtained features with that stores in the database to get the individual identity. it doesn't need identity claimed and considered as one to many matching because it searches on all the database and gets who the user's identity or non-identified as shown in Figure 5. In the verification system, the same as in the enrollment process in ECG signal preprocessing and feature extraction techniques is exactly repeated. The verification system needs identity claimed and considered as one to one matching then getting the decision yes if the features are matching and no for not matching so its result is performed quickly and accurate as shown in Figure 6. Most of the biometric systems used identification schemes with fiducial and non-fiducial features, while most of verification biometric systems used fiducial features [11-13]. In [2], the Multimodal Biometric Authentication system is proposed using a combination of ECG and Fingerprint together. Fiducial features were extracted from ECG signals after preprocessing also converting the extracted fingerprint to the transformed domain using DWT then extract only two features. The decision was getting from the final score which calculated from matching ECG and fingerprint traits. A lot of parameters were calculated for the system efficiency moreover, the number of subjects is not clear.
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed) 3009 Figure 5. Identification biometric system Figure 6. Verification biometric system The authors in [14], Proposed an Authentication Biometric system which based on the fiducial features directly after preprocessing, they used 73 subjects in their experiment. The Euclidean distance was used for matching. Then they extended their unimodal framework based on ECG trait only to be a multimodal biometric system based on ECG and Face or ECG and fingerprint using score fusion technique. A verification biometric system was proposed in [15], they used only 15 subjects, RR intervals were detected from ECG signals then applying DCT to get the required features. The obtained accuracy is 97.78% after using the correlation to get the decision. In [16], ECG Biometric Verification system was proposed by using PCA, they used 8 subjects only in their experiment. They used fiducial features using PCA and DWT for non-fiducial features. The authors in [17], they get the signal features using the Hjorth Descriptor and Sample Entropy (SampEn). Support Vector Machine (SVM) classifier was used for authentication. The obtained accuracy is 93.8% from Hjorth Descriptor Compared to SampEn. In [18], ECG based biometric system was designed. ECG dataset of 55 users was created during four months to study the ECG-based biometrics stability. He studied the performance of ECG as a biometric trait in short and long terms and found that more needing studies towards improving the long-term ECG biometric systems performance. The authors in [19] proposed ECG biometric algorithm using 184 subjects from different datasets. They obtained 98.33% accuracy using a random forest classifier and 96.31% accuracy using the wavelet distance measure algorithm while the two classifiers together give accuracy 99.52%. In [20], a non-fiducial ECG biometric verification system was proposed using kernel methods for 52 subjects with Discrete Wavelet Transform (DWT) for denoising. They studied the performance of using Support Vector Machine (SVM) and the Linear Discriminant Analysis (LDA). A two-lead ECG signals biometric verification was proposed in [21], autocorrelation feature extraction method was used in conjunction with different techniques for reduction with different window lengths from short and long-term recordings. The results show that the recognition rates affected by the recording and the window lengths. The objective of this research is to apply a verification biometric system using non-fiducial features with Euclidean distance matching methodology. 2. RESEARCH METHOD The proposed biometric authentication system consists of three main steps pre-processing, feature extraction and reduction using DWT, and matching process, as shown in Figure 7.
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013 3010 Figure 7. Block diagram of the proposed system 2.1. Datasets description In this research, 90 subjects are used from two datasets. The first dataset is ECG-ID Database while the second is the MIT-BIH Arrhythmia Database [22]. The number of test subjects used in the proposed system is 72 subjects includes 11 unauthorized subjects. 2.2. Pre-processing The first dataset has filtered signals so it used directly while the Butterworth filter was applied on signals from the second dataset. The Pan and Tompkins algorithm was applied for R peak detection [23]. The cycle length was fixed at 200 samples because features vectors must have an equal length for all subjects. A normalization process into the range from 0 to 1 is applied to the amplitude of all points for each R-R cycle. 2.3. Feature extraction Discrete Wavelet Decomposition was applied as a feature extraction method in each R-R cycle by using Daubechies wavelets (db8) with five-level decomposition as shown in Figure 8. Selecting the Daubechies family in this work depending on its shape and energy spectrum which close to the ECG signal while selecting db8 from previous work which gets good results than others. The total coefficients number after decomposition is 272 as shown in Figure 8. Figure 9. Shows the selected R-R interval and Figure 10 shows that the wavelet coefficients after 100 are approximately closed to zero so those coefficients are neglected (d1 and d2) and the other coefficients (104) were taken in our experiment. Figure 8. The 5-level discrete wavelet decomposition using Daubechies wavelets 'db8'
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed) 3011 Figure 9. The selected R-R interval Figure 10. Wavelet coefficients of the selected R-R interval 2.4. Authentication strategy The Euclidean distance algorithm is used for verification decisions. Euclidean distance calculations are performed exactly as follows: Let P (i) is the stored pattern feature matrix of size:𝑚 × 𝑑: 𝑃(𝑖) = [ 𝑓1,1 ⋯ 𝑓1,𝑑 ⋮ ⋱ ⋮ 𝑓 𝑚,1 ⋯ 𝑓 𝑚,𝑑 ] (1) If N is the number of subjects so there where N stored pattern matrices P (i). P'(i) is the sample features matrix defined as: 𝑃′(𝑖) = [ 𝑓′1,1 ⋯ 𝑓′1,𝑑 ⋮ ⋱ ⋮ 𝑓′ 𝑚,1 ⋯ 𝑓′ 𝑚,𝑑 ] (2) The distance between the attributes of a sample and features matrix of an individual i is statistically computed using: 𝑑(𝑖) = [ |𝑓1,1 − 𝑓′1,1| ⋯ |𝑓1,𝑑 − 𝑓′1,𝑑| ⋮ ⋱ ⋮ |𝑓 𝑚,1 − 𝑓′ 𝑚,1| ⋯ |𝑓 𝑚,𝑑 − 𝑓′ 𝑚,𝑑| ] (3) The distance score for an individual is calculated from the sum of Euclidean distances between feature attributes as: 𝑠 𝑑 𝑖 = ∑ |𝑓𝑘,𝑑− 𝑓′ 𝑘,𝑑 |𝑚 𝑘=1 (4) The mean of distance score for an individual (i) should be calculated due to the variations in ECG data set signals as follows: 𝑠 𝑖 = 1 𝑑 ∑ 𝑠𝑗 𝑖𝑚 𝑗=1 (5) Small distance score value indicates good matching while large distance score value indicates poor matching [14]. To get an accurate decision a threshold is calculated from the distances of the database and the sample feature matrix for each tested individual.
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013 3012 3. EXPERIMENT AND RESULTS 90 subjects are used in the enrolment process to create the system database. Daubechies wavelet 'db8' as a feature extraction method is used. The Euclidean distance algorithm is used as a matching algorithm. The performance of the proposed ECG verification system is estimated by calculating some metrics as the accuracy or verification rate. v𝑒𝑟𝑖𝑓𝑖𝑐𝑎𝑡𝑖𝑜𝑛 𝑟𝑎𝑡𝑒(%) = 𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑐𝑜𝑟𝑟𝑒𝑐𝑡𝑙𝑦 𝑠𝑎𝑚𝑝𝑙𝑒𝑠 𝑁𝑐 𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑡𝑒𝑠𝑡 𝑠𝑎𝑚𝑝𝑙𝑒𝑠 𝑁𝑡 (6) Besides, some metrics are used such as recall, precision, and F-score to evaluate the proposed system performance (6). Sensitivity (%) = TP TP + FN × 100 (7) Specificity(%) = TN FP + TN × 100 (8) 𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 (%) = 𝑇𝑃 𝑇𝑃+𝐹𝑝 ∗ 100 (9) 𝐹 − 𝑠𝑐𝑜𝑟𝑒 = 2∗𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦∗𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 (𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦+𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛) (10) Where, TP denotes the number of true positive samples, TN denotes the number of true negative samples, FP denotes the number of false-positive samples and FN denotes the number of false-negative samples [24, 25]. The number of test subjects used in the proposed system is 72 subjects includes 11 unauthorized subjects. The following Table 1 summarizes the performance of the system. Table 1. The Performance of the proposed system Parameters Percent (%) Verification Rate 94.44 Sensitivity 95.08 Specificity 90.9 Precision 98.3 F- Score 96.66 4. CONCLUSION Some biometric traits could be imitated but the ECG signal is considered as a real-time trait that indicates that the person is alive and present by himself. A verification biometric system based ECG signal is proposed in this research. Daubechies wavelet 'db8' as a feature extraction method is used and the Euclidean distance algorithm for verification decision. 90 subjects are used to build the system database, 72 subjects for testing our verification biometric system. The system performance is evaluated by calculating some metrics. The obtained f- Score is 96.66 %. The proposed system is more suitable for a large number of subjects which gives its decision in a very short time with good accuracy due to using the verification approach based on non-fiducial features. REFERENCES [1] Zeeshan Hassan, Syed Omer Gilani and Mohsin Jamil, “Review of Fiducial and Non-Fiducial Techniques of Feature Extraction in ECG based Biometric Systems,” Indian Journal of Science and Technology, vol. 9, no. 21, Jun. 2016. DOI: 10.17485/ijst/2016/v9i21/94841 [2] Manjunathswamy B. E., Appaji M Abhishek, Thriveni J, Venugopal K R, and L. M. Patnaik, “Multimodal Biometric Authentication using ECG and Fingerprint,” International Journal of Computer Applications (0975-8887), vol. 111, no. 13, Feb. 2015 [3] Ian McAteer, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang and Craig Valli, “Integration of Biometrics and Steganography: A Comprehensive Review,” Technologies, vol. 7, no. 34, 2019. DOI:10.3390/technologies7020034 [4] VPS G4, “Principles of ECG,” Vascular Positioning System G4, Vascular Positioning Technology Education, [Online]. Available: http://www.arrowvascular.com/vpseducation/pre-trial/principles-of-ecg.html.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed) 3013 [5] Ahmed Younes Shdefat, Moon-Il Joo, Sung-Hoon Choi, Hee-Cheol Kim, “Utilizing ECG Waveform Features as New Biometric Authentication Method,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 2, pp. 658~665, Apr. 2018. DOI: 10.11591/ijece.v8i2.pp658-665. [6] Vanessa Novaes Barros, “The heart cycle: review,” MOJ Women’s Health, vol. 8, no. 1, 2019. [7] Woo-Hyuk Jung 1 and Sang-Goog Lee, “ECG Identification Based on Non-Fiducial Feature Extraction Using Window Removal Method,” MDPI journal, vol. 7, no. 11, Nov. 2017. DOI: 10.3390/app7111205. [8] Mohamad O. Diab, Alaa Seif, Mohamad El-Abed and Maher Sabbah, “Individual Identification Using ECG Signals,” Journal of Computer and Communications, vol. 8, pp. 74-80, 2018. DOI: 10.4236/jcc.2018.61008. [9] Di Wang, Yujuan Si, Weiyi Yang, Gong Zhang and Jia Li, “A Novel Electrocardiogram Biometric Identification Method Based on Temporal-Frequency Autoencoding,” Electronics, 2019. DOI: 10.3390/electronics8060667. [10] Ţarălungă Dragoș Daniel and Mihaela Neagu, “Cancelling Harmonic Power Line Interference in Biopotentials,” book chapter, Intech Open, 2018. DOI: 10.5772/intechopen.74579. [11] Pankaj Sareen, “Biometrics-Introduction, Characteristics, Basic technique, its Types and Various Performance Measures,” International Journal of Emerging Research in Management & Technology, vol. 3, no. 4, 2014. [12] Sushma Jaiswal, Sarita Singh Bhadauria and Rakesh Singh Jadon, “Biometric: Case Study,” Journal of Global Research in Computer Science, vol. 2, no. 10, Oct. 2011. [13] Ahmed M. Hamad, Rasha Salah Elhadary, Ahmed Omar Elkhateeb, “Multimodal Biometric Identification Using Fingerprint, Face and Iris Recognition,” International Journal of Information Science and Intelligent System, 2014. [14] Yogendra Narain Singh, S. K. Singh, “Evaluation of Electrocardiogram for Biometric Authentication,” Journal of Information Security, vol. 3, no. pp. 39-48, 2012. [15] Ahmed F. Hussein, Abbas K. AlZubaidi, Ali Al-Bayaty and Qais A. Habash, “An IoT Real-Time Biometric Authentication System Based on ECG Fiducial Extracted Features Using Discrete Cosine Transform,” arXiv: 1708.08189, 2017. [16] Jameel Kadhim Abed and Nahrain N. Abd, “ECG Biometric Verification by using PCA,” International Journal of Engineering Trends and Technology (IJETT), vol. 65, no. 1, Nov. 2018. [17] Sugondo Hadiyoso, Suci Aulia and Achmad Rizal, “One-Lead Electrocardiogram for Biometric Authentication using Time Series Analysis and Support Vector Machine,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 10, no. 2, 2019. [18] Nikita Samarin, “A Key to Your Heart: Biometric Authentication Based on ECG Signals,” Project Report Computer Science School of Informatics University of Edinburgh, 2018. [19] Robin Tan and Marek Perkowski, “Toward Improving Electrocardiogram (ECG) Biometric Verification using Mobile Sensors: A Two-Stage Classifier Approach,” Sensors, vol. 17, no. 2 2017. DOI: 10.3390/s 17020410. [20] M Hejazi, SAR Al-Haddad, YP Singh, SJ Hashim and AFA Aziz, “ECG biometric authentication based on non- fiducial approach using kernel methods,” Digital Signal Processing, vol. 52, pp. 72-86, May 2016. [21] M Hejazi, SAR Al-Haddad, SJ Hashim, AFA Aziz and YP Singh, “Feature level fusion for biometric verification with two-lead ECG signals,” IEEE 12th International Colloquium on Signal Processing & Its Applications(CSPA), pp. 54-59, 2016. [22] “PhysioBank ATM,” PhysioNet, [Online] Available: https://archive.physionet.org/cgi-bin/atm/ATM [23] Jiapu Pan and Willis j. Tompkins, “A Real-Time Qrs Detection Algorithm,” IEEE Transactions on Biomedical Engineering, vol. 32, no. 3, Mar. 1985. [24] Renuka Joshi, “Accuracy, Precision, Recall & F1 Score: Interpretation of Performance Measures,” 2016. [Online]. Available: https://blog.exsilio.com/all/accuracy-precision-recall-f1-score-interpretation-of-performance-measures/ [Accessed 5/8/2019]. [25] Afzal Godil, Roger Bostelman, Will Shackleford, Tsai Hong and Michael Shneier, “Performance Metrics for Evaluating Object and Human Detection and Tracking Systems,” National Institute of Standards and Technology, Jul. 2014.