Abstract

Traditional authentication systems use alphanumeric or graphical passwords, or token-based techniques that require "something you know and something you have". The disadvantages of these systems include the risks of forgetfulness, loss, and theft. To address these shortcomings, biometric authentication is rapidly replacing traditional authentication methods and is becoming a part of everyday life. The electrocardiogram (ECG) is one of the most recent traits considered for biometric purposes. In this work we describe an ECG-based authentication system suitable for security checks and hospital environments. The proposed system will help investigators studying ECG-based biometric authentication techniques to define dataset boundaries and to acquire high-quality training data. We evaluated the performance of the proposed system and found that it could achieve up to the 92 percent identification accuracy. In addition, by applying the Amang ECG (amgecg) toolbox within MATLAB, we investigated the two parameters that directly affect the accuracy of authentication: the ECG slicing time (sliding window) and the sampling time period, and found their optimal values.

Highlights

  • Biometric authentication is replacing typical identification and access control systems to become a part of everyday life [1], [2]

  • The electrocardiogram (ECG) is one of the most recent traits to be explored for biometric purposes [3], [4]

  • SECURITY CHECK CASE: EXPERIMENTAL SETUPS Several machine learning (ML) approaches could be used to develop a regression model, our previous studies showed that the decision tree (DT) method achieves the best performance with time-sliced ECG data [22]

Read more

Summary

SPECIAL SECTION ON ARTIFICIAL INTELLIGENCE IN CYBERSECURITY

Received July 29, 2019, accepted August 19, 2019, date of publication August 26, 2019, date of current version September 12, 2019. An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning. EBRAHIM AL ALKEEM1, SONG-KYOO KIM 2, CHAN YEOB YEUN 1,2, MOHAMED JAMAL ZEMERLY1, KIN FAI POON3, GABRIELE GIANINI3,4, AND PAUL D.

INTRODUCTION
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call