Abstract

The electrocardiogram (ECG) signal used for diagnosis and patient monitoring, has recently emerged as a biometric recognition tool. Indeed, ECG signal changes from one person to another according to health status, heart geometry and anatomy among other factors. This paper forms a comparative study between different identification techniques and their performances. Previous works in this field referred to methodologies implementing either set of fiducial or set non-fiducial features. In this study we show a comparison of the same data using a fiducial feature set and a non-fiducial feature set based on statistical calculation of wavelet coefficient. High identification rates were measured in both cases, non-fiducial using Discrete Meyer (dmey) wavelet outperformed the rest at 98.65.

Highlights

  • Biometric recognition systems identify or verify individuals according to unique physiological or behavioral characteristics

  • Even though physiological characteristics are more unique than behavioral characteristics, there is a possibility of falsification

  • In this work we looked into mother wavelets that have high energy and/or low entropy with respect to the ECG signal

Read more

Summary

Introduction

Biometric recognition systems identify or verify individuals according to unique physiological or behavioral characteristics. Physiological characteristics are based on intrinsic morphological qualities such as fingerprint, face and iris recognition [1]. Behavioral characteristics are based on learnt qualities such as signatures, gait analysis and keystroke dynamics [1]. A major drawback for the use of physiological characteristics is the ability of copying by intruders. For example fingerprints could be lifted and masked into an artificial print. Even though physiological characteristics are more unique than behavioral characteristics, there is a possibility of falsification. There is a need of physiological characteristic that cannot be falsified or captured. ECG signals fulfill this need as they are confidential for each individual and cannot be lifted for masking [2].

Objectives
Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.