Morphological synthesis of ECG signals for person authentication

In this paper, we propose a novel approach using the morphological properties of the R-R segments in an ECG signal for biometric authentication. The authenticity of a given R-R segment is decided by comparing it to a matching R-R segment morphologically synthesized from a model characterizing the identity to be authenticated. The morphological synthesis process uses a set of R-R segments (templates), recorded during enrolment at different heart-rates, and a time alignment algorithm. This ensures the authentication to be independent of the, usually variable, heart-rate. The optimum average equal-error-rate obtained in our experiments is 2%.

[1]  R. Orglmeister,et al.  The principles of software QRS detection , 2002, IEEE Engineering in Medicine and Biology Magazine.

[2]  Brenda K. Wiederhold,et al.  ECG to identify individuals , 2005, Pattern Recognit..

[3]  P.E. Trahanias,et al.  An approach to QRS complex detection using mathematical morphology , 1993, IEEE Transactions on Biomedical Engineering.

[4]  Jianwen Luo,et al.  Properties of Savitzky-Golay digital differentiators , 2005, Digit. Signal Process..

[5]  Ola Pettersson,et al.  ECG analysis: a new approach in human identification , 2001, IEEE Trans. Instrum. Meas..

[6]  W. Todd Scruggs,et al.  Fusing face and ECG for personal identification , 2003, 32nd Applied Imagery Pattern Recognition Workshop, 2003. Proceedings..

[7]  Yu Hen Hu,et al.  One-lead ECG for identity verification , 2002, Proceedings of the Second Joint 24th Annual Conference and the Annual Fall Meeting of the Biomedical Engineering Society] [Engineering in Medicine and Biology.

[8]  David Chandler,et al.  Biometric Product Testing Final Report , 2001 .

[9]  A.J. Nimunkar,et al.  ECG synthesis based on morphing , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[10]  S. Chiba,et al.  Dynamic programming algorithm optimization for spoken word recognition , 1978 .

[11]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.