Using deep learning neural networks for ECG based authentication
Data
2017Language
en
Soggetto
Abstract
Traditional password based authentication has been proven inadequate and the use of biometrics have provided multiple solutions through the past years. One of the most recent approaches to biometric authentication is using Electrocardiograms (ECG), as they are closely related to unique characteristics of the heart of each person. In this paper a framework for efficient and usable user authentication, based on ECG, is proposed. The ECG is pre-processed in order to remove any noise or distortions and then multiple set of features are extracted from it, through various transformations. These set of features are used as input to classification models and the results are compared in order to find the most effective transformation-classifier combination, which also sets a performance baseline. Additionally Deep Learning Neural Networks are used in order to create classification models that predicts whether an ECG belongs to a specific person or not, based on the combination of the feature sets produced in the transformation step. The results obtained have shown that deep learning neural networks can provide higher accuracy in comparison to most of other techniques used, if there are enough data to train them on. © 2017 IEEE.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
Ferrag M.A., Maglaras L., Argyriou A., Kosmanos D., Janicke H. (2018)This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular ... -
Security Revisited: Honeytokens meet Google Authenticator
Papaspirou V., Papathanasaki M., Maglaras L., Kantzavelou I., Douligeris C., Ferrag M.A., Janicke H. (2022)In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors ... -
A distributed biometric authentication scheme based on blockchain
Toutara F., Spathoulas G. (2020)Biometric authentication is the preferred authentication scheme in modern computing systems. While it offers enhanced usability, it also requires cautious handling of sensitive users' biometric templates. In this paper, a ...