Heart-Based Biometric Protocols: A look back over almost two decades
@article{OrtizMartin2022HeartBasedBP, title={Heart-Based Biometric Protocols: A look back over almost two decades}, author={Lara Ortiz-Martin and Pablo Picazo-Sanchez}, journal={ArXiv}, year={2022}, volume={abs/2202.02807} }
This article surveys the literature over the period 2003-2021 on heart-based biometric protocols. In particular, we focus on how the heart signal is transformed from a continuous wave to discrete values to be used afterwards in authentication protocols. We explain and classify the surveyed proposals according to three main parameters: i) the dataset they use for testing their results; ii) the delineation algorithms they use to extract the fiducial points, and; iii) the cryptographic tests they…
References
SHOWING 1-10 OF 205 REFERENCES
ECG Biometric Recognition Without Fiducial Detection
- Computer Science2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference
- 2006
An ECG biometric recognition method that does not require any waveform detections is introduced based on classification of coefficients from the discrete cosine transform (DCT) of the Autocorrelation sequence of ECG data segments.
ECG Biometric Authentication: A Comparative Analysis
- Computer ScienceIEEE Access
- 2020
This paper contributes to creating a new large gallery off-the-person ECG datasets that can provide new opportunities for the ECG biometric research community by exploring the impact of filtering type, segmentation, feature extraction, and health status on ECGBiometric by using the evaluation metrics.
Real Time Electrocardiogram Segmentation for Finger based ECG Biometrics
- Computer ScienceBIOSIGNALS
- 2012
This paper studies several QRS detection algorithms and proposes a method combining the adaptive characteristics of the algorithm by Christov, with the strategy of the widely adopted Engelse and Zeelenberg algorithm for real-time segmentation of ECG signals.
A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health
- Computer Science2010 Annual International Conference of the IEEE Engineering in Medicine and Biology
- 2010
The paper discusses the typical attacks faced by BSNs and proposes a fast biometric based approach to generate keys for ensuing confidentiality and authentication in BSN communications, which was tested on 900 segments of electrocardiogram.
Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals
- Computer ScienceEntropy
- 2018
Questions are raised about the use of IPI values as a good source of randomness for cryptographic purposes, both in the security of some of the protocols proposed up to now and also in the design of future IPI-based schemes.
Evolution, Current Challenges, and Future Possibilities in ECG Biometrics
- Computer ScienceIEEE Access
- 2018
A deep review and discussion of 93 state-of-the-art publications on their proposed methods, signal datasets, and publicly available ECG collections is conducted to present the fundamentals and the evolution of ECG biometrics, describe the current state of the art, and draw conclusions on prior art approaches and current challenges.
Analysis of Using Interpulse Intervals to Generate 128-Bit Biometric Random Binary Sequences for Securing Wireless Body Sensor Networks
- Computer ScienceIEEE Transactions on Information Technology in Biomedicine
- 2012
Results from five U.S. National Institute of Standards and Technology statistical tests suggest that random biometric BSs can be generated from both healthy subjects and cardiovascular patients and can potentially be used as authentication identifiers for securing WBSNs.
An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks
- Computer ScienceSensors
- 2015
A novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption.
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols
- Computer ScienceWISTP
- 2015
The results show that up to 70% of the information obtained by means of the contact-based method can be also obtained through contactless techniques, and one key finding is that quantization is a crucial step in the process.
Cryptographic Key Generation from Biometric Data Using Lattice Mapping
- Computer Science18th International Conference on Pattern Recognition (ICPR'06)
- 2006
The proposed lattice mapping based fuzzy commitment method not only outputs high entropy keys, but also conceals the original biometric data such that it is impossible to recover the biometrics even when the stored information in the system is open to an attacker.