• Corpus ID: 246634272

Heart-Based Biometric Protocols: A look back over almost two decades

  title={Heart-Based Biometric Protocols: A look back over almost two decades},
  author={Lara Ortiz-Martin and Pablo Picazo-Sanchez},
This article surveys the literature over the period 2003-2021 on heart-based biometric protocols. In particular, we focus on how the heart signal is transformed from a continuous wave to discrete values to be used afterwards in authentication protocols. We explain and classify the surveyed proposals according to three main parameters: i) the dataset they use for testing their results; ii) the delineation algorithms they use to extract the fiducial points, and; iii) the cryptographic tests they… 



ECG Biometric Recognition Without Fiducial Detection

An ECG biometric recognition method that does not require any waveform detections is introduced based on classification of coefficients from the discrete cosine transform (DCT) of the Autocorrelation sequence of ECG data segments.

ECG Biometric Authentication: A Comparative Analysis

This paper contributes to creating a new large gallery off-the-person ECG datasets that can provide new opportunities for the ECG biometric research community by exploring the impact of filtering type, segmentation, feature extraction, and health status on ECGBiometric by using the evaluation metrics.

Real Time Electrocardiogram Segmentation for Finger based ECG Biometrics

This paper studies several QRS detection algorithms and proposes a method combining the adaptive characteristics of the algorithm by Christov, with the strategy of the widely adopted Engelse and Zeelenberg algorithm for real-time segmentation of ECG signals.

A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health

The paper discusses the typical attacks faced by BSNs and proposes a fast biometric based approach to generate keys for ensuing confidentiality and authentication in BSN communications, which was tested on 900 segments of electrocardiogram.

Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals

Questions are raised about the use of IPI values as a good source of randomness for cryptographic purposes, both in the security of some of the protocols proposed up to now and also in the design of future IPI-based schemes.

Evolution, Current Challenges, and Future Possibilities in ECG Biometrics

A deep review and discussion of 93 state-of-the-art publications on their proposed methods, signal datasets, and publicly available ECG collections is conducted to present the fundamentals and the evolution of ECG biometrics, describe the current state of the art, and draw conclusions on prior art approaches and current challenges.

Analysis of Using Interpulse Intervals to Generate 128-Bit Biometric Random Binary Sequences for Securing Wireless Body Sensor Networks

Results from five U.S. National Institute of Standards and Technology statistical tests suggest that random biometric BSs can be generated from both healthy subjects and cardiovascular patients and can potentially be used as authentication identifiers for securing WBSNs.

An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks

A novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption.

Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols

The results show that up to 70% of the information obtained by means of the contact-based method can be also obtained through contactless techniques, and one key finding is that quantization is a crucial step in the process.

Cryptographic Key Generation from Biometric Data Using Lattice Mapping

The proposed lattice mapping based fuzzy commitment method not only outputs high entropy keys, but also conceals the original biometric data such that it is impossible to recover the biometrics even when the stored information in the system is open to an attacker.