Next Article in Journal
Machine Learning Based Identification of Microseismic Signals Using Characteristic Parameters
Next Article in Special Issue
Evaluation of Decision Fusion Methods for Multimodal Biometrics in the Banking Application
Previous Article in Journal
Quantitatively Recognizing Stimuli Intensity of Primary Taste Based on Surface Electromyography
Previous Article in Special Issue
Vascular Auscultation of Carotid Artery: Towards Biometric Identification and Verification of Individuals
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions

1
Department of Biomedical Engineering, Hanyang University, Seoul 04763, Korea
2
Information Security Research Division, Electronics and Telecommunications Research Institute (ETRI), Daejeon 34129, Korea
*
Authors to whom correspondence should be addressed.
Sensors 2021, 21(21), 6966; https://doi.org/10.3390/s21216966
Submission received: 17 September 2021 / Revised: 15 October 2021 / Accepted: 16 October 2021 / Published: 20 October 2021
(This article belongs to the Collection Biometric Sensing)

Abstract

:
The development and use of wearable devices require high levels of security and have sparked interest in biometric authentication research. Among the available approaches, electrocardiogram (ECG) technology is attracting attention because of its strengths in spoofing. However, morphological changes of ECG, which are affected by physical and psychological factors, can make authentication difficult. In this paper, we propose authentication using non-linear normalization of ECG beats that is robust to changes in ECG waveforms according to heart rate fluctuations in various daily activities. We performed a non-linear normalization method through the analysis of ECG alongside heart rate, evaluating similarities and authenticating the performance of our new method compared to existing methods. Compared with beats before normalization, the average similarity of the proposed method increased 23.7% in the resting state and 43% in the non-resting state. After learning in the resting state, authentication performance reached 99.05% accuracy for the resting state and 88.14% for the non-resting state. The proposed method can be applicable to an ECG-based authentication system under various physiological conditions.

1. Introduction

Security technology is essential for the function of common convenience facilities such as banks, airports, corporate buildings, and websites [1]. Authentication means accessing to use services that have security. The authentication methods we commonly use include passwords, tokens, and ID cards. These traditional methods may inconvenience users by requiring them to remember their passcodes. These methods are also vulnerable to spoofing caused by loss, theft, and squinting [2]. Many biometric authentication methods have been proposed to address this shortcoming.
Biometrics includes physiological and behavioral traits used to distinguish people statistically and is simpler and more secure than popular existing authentication methods [3]. Physiological traits include external information about the body, such as fingerprints, iris, face, and veins, and internal information, such as the electrocardiogram (ECG), electromyography (EMG), and brain wave (EEG) patterns. Behavioral traits include habit-based information such as voice, gait, and signature [4]. Besides that, the combination of biometrics has been studied in order to have the most robust information [5]. Although many biometrics are widely used in devices and services, they are vulnerable to spoofing attempts. For example, fingerprint and iris recognition can be disabled with artificial fingerprints made of rubber materials or special films and infrared photos [6,7]. Facial and vein recognition can also be misrecognized by the photos of enrolled subjects and replicas printed with special materials [8,9]. However, ECG is robust against spoofing attempts and can replace traditional biometrics due to the following characteristics: it is invisible externally, it can only be measured by physical contact, and it is unique to each individual [10]. In addition, ECG-based biometrics can be used in various devices with the development of devices capable of real-time measurement and the increase in research on protecting authentication information in devices [11,12].
The ECG is an electrical signal acquired through an electrode attached to the skin and consists of a P wave, QRS complex, and T wave [13]. There are three reasons why ECG patterns vary from person to person [14]. The first is a physiological factor that reflects heart size, mass, conductivity, and activity, all of which differ from person to person. The second is a geometrical factor reflecting the difference between the position and vector of the heart. Finally, DNA affects the detailed shape and composition of the heart individually. However, since ECG is an electrical signal, it is greatly affected by the measurement environment and changes in heart rate. The effect of heart rate negatively affects authentication performance. To eliminate this effect, many researchers are interested in normalization.
In the authentication system, it is preferred to acquire a signal in a short time. The number of ECG beats within a short time is limited, and one beat is critical. Therefore, correcting one beat to eliminate heart rate effects is an important task, but most of studies have not considered compensating for ECG changes with various heart rates [15,16,17,18,19]. Among the studies considering some heart rate, many previous investigations resampled the entire ECG waveform by substituting the RR-interval into a linear equation. Additionally, it is usually used to remove outlier beats by analyzing the correlation between a representative waveform and other waveforms [20,21,22,23,24]. Arteaga-Falconi et al. [21] derived a normalization technique that divides the duration of the P wave, QRS complex, and T wave of the ECG by the duration of the RR-interval. They obtained an 81.82% true acceptance rate (TAR) and 1.41% false acceptance rate (FAR) from 10 subjects with ECG sensors embedded in smartphones. These approaches considered only noise removal and morphological characteristics and did not compare results from ECGs taken under various conditions.
Other prior research normalized only a part of the ECG to improve biometric performance. Fatemian et al. [25] reconstructed only the T wave section to 120 msec based on the standard duration of an approximate T wave in the resting state and achieved a maximum recognition rate of 95% for 21 subjects. Choi et al. [26] proposed a method to match the P wave, QRS complex, and T wave, which are morphological characteristics of the ECG after stepper exercise, with the pre-exercise cycle to improve recognition performance. They obtained 96.4% accuracy and an improved mean similarity of 23.5% for 100 subjects by comparing ECG waveforms before and after exercise. Nobunaga et al. [27] designed an optimized band-pass filter and normalized the ECG measured after exercise. They used ECG data measured post-exercise in 10 subjects and obtained 99.7% accuracy.
Most of the mentioned studies did not consider various situations and did not focus on validating the normalization. Few studies have considered some situations, but only one of the physiological conditions and have missed heart rate information. This point makes it difficult to determine whether the proposed system is applicable in real life. On the other hand, our study acquired data that were confirmed heart rate changes in various states and quantitatively evaluated effectiveness and authentication performance according to normalization by comparing existing methods.
In real life, ECG-based authentication would usually be performed under various physiological and mental conditions. Even in such conditions, the variability of ECG within individuals should be minimized. Therefore, this paper aims to improve authentication performance under various conditions by minimizing variability in individuals. For this purpose, the main contributions of this work are as follows. First, we developed a non-linear normalization method. Our method improved the accuracy and robustness of an authentication system using ECG that changes morphologically according to various heart rates. Second, we constructed a database of measurements in various conditions that can be experienced in real life: rest, exercise, listening to music, and watching video clips. Through this database, the effectiveness of the proposed method was tested by comparing the similarity and authentication performance between the proposed method and the existing methods. Finally, we discussed the feasibility that the ECG-based authentication system can be applied in real life.
The contents after Section 1 are as follows. Section 2 presents our time normalization method and user recognition system, and Section 3 presents normalization performance and authentication results using ECG under various conditions. Section 4 discusses the results and limitations of this study. Section 5 summarizes the research and presents future research.

2. ECG Authentication Algorithm Based on Non-Linear Normalization

Biometric systems identify or authenticate the person based on one or more characteristics. Three blocks, a signal collection block that collects signals with sensors, a storage module that stores the registered subject’s data, and a biometric algorithm block, constitute a traditional biometric system.
We designed the framework of the proposed work based on the traditional frame. Figure 1 shows the workflow of the framework for ECG authentication system proposed in this study. The measured signal is transmitted to the authentication module through the data processing module. The enrollment process generates a trained user model with the extracted features, and the authentication process is performed by inputting the extracted features into the enrollment model. The framework is divided into a data processing module that minimizes individual data variability before authentication and a user authentication module that performs authentication with processed data. The data processing module consists of the following steps: a pre-processing module for denoising the ECG; ECG fiducial detection and segmentation module; Non-linear normalization module to minimize individual variability. The user authentication module consists of the following steps: extracting features from normalized ECG sequences; A model design module for user authentication with the extracted features and an authentication module for user evaluation. All stages of the proposed framework are explained in detail in the following.

2.1. Database

The database consisted of lead I ECG measurements obtained using a Biopac MP150 (Biopac System Inc., Goleta, CA, USA), AcqKnowledge 4.2, and an ECG100C ECG amplifier with the sampling rate set at 500Hz and the measurement gain to 1000. Subjects comprised of 15 healthy adults without heart disease, 13 males and 2 females (mean age 27.29 years, SD 2.58 years). Subjects completed ECG measurement experiments over periods of 2–11 months. The IRB of Hanyang University approved this study, and all subjects supplied informed consent before the experiment (HYI-16-030-1).
Table 1 describes the six measurement environments, such as resting, exercise, listening to music (calm and excited), and watching video clips (relaxed and scared). We measured ECG records for 20 s while the subject sat in a chair during each randomly assigned situation or immediately after exercise. The measurement time referred to the ECG-ID database that was applied in various studies [28]. We obtained 1969 records from 15 subjects, including a wide range of beats per minute (51–132 bpm) and six statuses that reflect normal daily life activities.

2.2. Pre-Processing

The acquisition of ECG through electrodes is hindered by noises, such as baseline drift, power line interference, motion artifacts, and electromyography. These noises compromise the original signal. If authentication is performed using noisy ECG data, performance will be degraded, so it is essential to remove noises.
We used a notch filter to suppress 60 Hz power line interference alongside a 3rd-order Butterworth high pass filter with a cutoff frequency of 0.5 Hz to filter Baseline wandering. Motion artifacts and electromyography were removed based on the Daubechies-6 wavelet function at decomposition level 4, the soft thresholding method, and a wavelet denoising algorithm applying the Bayes-Shrinkage rule [29,30].

2.3. Fiducial Points Detection and Segmentation

As shown in Figure 2, ECG has five types of fiducial points (P, Q, R, S, and T) in the normal state and three types each of intervals (PR interval, QT interval, ST interval) and segments (PR segment, ST segment, TP segment). In ECG, three main components, the P wave, QRS complex, T wave, are repeated periodically. Atrial depolarization causes the p wave, ventricular depolarization causes the QRS complex, and ventricular repolarization causes the T wave.
It is convenient to identify fiducial points to analyze ECG signals using the wavelet function at different scales. Many previous studies have employed an algorithm described previously by Martinez et al. [31]. This algorithm decomposes ECG at multiple scales and pinpoints P wave onset (Pon), QRS complex onset (QRSon), R peak (Rpeak), QRS complex offset (QRSon), and T wave offset (Toff) by finding modulus maxima, minima, and zero-crossing points. They decomposed the signal by selecting a quadratic spline as the mother wavelet and setting the scale to five, to capture the fiducial points. The results we obtained through this algorithm are shown in Figure 3a.
Subsequently, we defined one beat as a fixed interval from Pon to Pon, as shown in Figure 3b. Unlike cutting and using a fixed-length window, this method detected one beat and included the complete waveform between Pon and Pon.

2.4. Non-Linear Normalization Based on Heart Rate Analysis

Heart rate changes depending on physical activity or psychological state can cause heartbeat cycle changes in the electrocardiogram. Simoons et al. [32] found that ECG changes with non-linear characteristics through interval analysis of ECG alongside heart rate. Craig et al. [33] observed that the control and response of the cardiac cortex are asymmetrical because the asymmetrical autonomic nerves of the heart display asymmetric distributions. In other words, these distributions cause asymmetry in the ventricular and atrial functions and control. Therefore, we proposed non-linear normalization through segment-by-segment analysis according to heart rate (HR).
In this study, we analyzed the ECG-ID database of Physionet [28]. The ECG-ID database contains 310 ECG recordings of 44 males and 46 females between 13 to 75 years old. Each of the 90 subjects had at least two or more 20 sec records [34]. The ECG of the database was segmented into one defined beat and divided into four sections: PR interval (Pon-QRSon), QRS complex (QRSon-QRSoff), ST interval (QRSoff-Toff), and TP segment (Toff-Pon). We performed a regression analysis of heart rate for each section. Figure 4 shows the regression results and scatter plots for each section.
Consequently, the heart rate had little effect on the QRS complex (Coefficient of determination ( r 2 ) =   0 ), and the remaining sections showed high correlations with heart rate in the order of TP segment ( r 2 = 0.9 ), ST interval ( r 2 = 0.7 ), and PR interval ( r 2 = 0.4 ). To examine whether there are further non-linear changes with heart rate in the ST interval and TP segment, which have higher correlations with heart rate, we further segmented these intervals by piecewise non-linear regression and analyzed changes in duration according to heart rate [35]. This method performed normalization by dividing the number of segments in the ST interval and TP segment into 1, 2, and 3. Table 2 shows the analysis results with the average root mean square error (RMSE) value, and it shows similar results even if the number of segments is increased compared to the case of dividing into one.
As shown in Table 2, the normalization of ST interval shows an error of 0.0338 when the number of segments piecewise is 1 or 2 and an error of 0.0339 when the number of segments piecewise is 3. The normalization in the TP segment has an error of 0.0249 when the number of segments piecewise is 1, 2, and 3. Therefore, the piecewise average RMSE values confirmed that further segmentation of the ST interval and TP segment did not significantly affect normalization. Based on the regression equation analyzed above, normalization was performed by resampling each section as much as the standard duration at 70 bpm, the resting heart rate. To compensate for ECG amplitude, we applied z-score normalization [36].
Figure 5 shows the flowchart of the algorithm to correct each segment of ECG with the analysis result. As shown in Figure 5, the proposed normalization method is modified with time when HR is 70 bpm for a total of four sections. After correction, we stored the normalized ECG beat in a variable, and this process is repeated as many as the number of R peaks in the ECG data.
This flowchart leads to Algorithm 1. In the algorithm, PR interval, QRS complex, ST interval, and TP segments were replaced with PR, QS, ST, and TP. The input is NR, the number of R peaks, and X consists of ECG beats. The algorithm iterates NR times and copies four sections to the output array Seq’. In order to perform normalization for each beat, we extracted four sections from the i-th beat and checked if the time was at 70 bpm for each section. If it needs to be modified, it is interpolated with time at 70 bpm. When all sections are corrected, normalized beats are returned.
Algorithm 1: The proposed normalization algorithm
Sensors 21 06966 i001
Figure 6 shows the results of applying the conventional linear normalization method and the proposed non-linear normalization using 132 ECG data samples with the wide bpm range (57–120 bpm) from subject 11, who was measured over a period of 8 months in this study.

2.5. Similarity Measurement of Normalization

Even if normalization is performed, whether the normalized beat is similar to the ECG beat in the resting state is unknown. To evaluate this, we generated the representative beat in the resting state and extracted the similarity to beats of resting and non-resting states that were not used to generate this beat. This process was applied to the existing and proposed methods to compare differences in the similarity between methods.
For resting status, we randomly selected data for each subject to generate the representative beat, then grouped the remaining and non-resting status data as evaluation data. We gradually increased the number of generating data files from five to 20. To avoid deviating significantly from the general morphology of an ECG beat, the beats in this data were aligned, and the outlier beats were removed as proposed by Tan et al. [37]. The beats of the generating data overlapped with the median values of R peaks extracted from itself. Figure 7 shows the process of detecting outliers and generating representative beat. We compared the Pearson correlation coefficients beats of the generating data ( E C G a l l ) with the temporary beats ( E C G t m p ) constructed as the average of ECGall. These coefficients were produced as input to the conditions (Equation (1)), and the beats satisfying the condition were considered outliers. The outlier condition is as follows:
ρ E C G a l l ,   E C G t m p < μ ρ 0.5 × σ ρ ,
where ρ is the correlation coefficient, μ ρ is the mean of ρ , and σ ρ is the standard deviation of ρ .
Outlier beats were excluded when constructing the representative beats. To compare how many beats were properly modified, we extracted the proportion of outliers removed for each method. Then, the representative beat was constructed by calculating the average of the remaining beats. The similarity before and after normalization was evaluated through cross-correlation with representative beats and beats of evaluation data.

2.6. Authentication System

2.6.1. Feature Extraction

Feature extraction aims to enhance individual uniqueness from divided beats while minimizing the effects of noise and user variability. ECG studies generally grouped feature extraction methods into fiducial and non-fiducial approaches. Fiducial approaches are a combination and information of fiducial points such as differences in duration, amplitude, or slopes. Non-fiducial approaches use a specific model or transformation from the original signal to another domain. However, there are problems with non-fiducial approaches. These approaches increase the computational load when authentication uses transformation coefficients and depend on the signals, even for an ECG waveform containing much noise [38].
In this study, we performed authentication with fiducial features that express the heart’s unique anatomical structure and have robust noise properties. We extracted a total of 29 features through the combination of previously extracted P wave, QRS complex, and T wave [38]. Features 1 to 9 are amplitude features between fiducial points, 10 to 18 are duration on the time axis, 19 to 28 are slope and distance, and 29 is area. Figure 8 shows features extracted from the ECG beat with relative amplitude, temporal duration, slope, distance, and area through fiducial points and summarizes the extracted features.

2.6.2. Authentication

Although authentication and identification seem similar, they have different meanings, and accordingly, the classifier models used for each are different. Identification uses multiple classes to classify, whereas authentication uses binary classes for each subject. Therefore, we performed authentication by creating a single model for each class [39].
We used the support vector machine (SVM) based on Gaussian kernel (SVM-G), SVM based on quadratic kernel (SVM-Q), k-nearest neighbor (kNN), and decision tree (DT) as an authentication model. When designing the model, the parameters’ values for each model were set as follows: SVM-G and SVM-Q were used to optimize the gamma value for each individual, and the C value was fixed at 1. The K parameter in the kNN was set to 1. The DT parameters were min_samples_leaf = 3 and min_samples_split = 10. These models were applied with 10-fold cross-validation and were implemented in a one-vs-rest approach that allows us to classify multi-class labels as a binary classification problem for each class [39].
We designed two different authentication experiments and tested our proposed method. The first experiment selected an optimal model. The second experiment, based on the optimal model, evaluated the proposed method in various measurement environments. Figure 9 shows data partitioning for two experiments. Both experiments used the same train set, and in the first experiment, we randomly selected a data set in the resting state for each subject and split it according to an 80:20 ratio into the train set and the test set for model selection. The classifier with the best authentication performance was selected as the optimal model among the four classifiers using this train set and test set.
In the second experiment, we prepared a test set under several different statuses for evaluations of authentication performance. For each status, the test set consists of the registrant’s data and the other’s data, which is the same size as the registrant, using randomness control. We evaluated the authentication performance between the existing and proposed methods through this test set and the selected optimal model.
All the tests were run on standard lab equipment (Intel(R) Core(TM) i7-7700 CPU, 3.60 GHz, 32 GB of RAM, One RTX 2080Ti 11 GB) or in MATLAB’s Statistics and Machine Learning Toolbox.

3. Results

In this section, we described the quantitative analysis results of the proposed non-linear normalization and the performance of the proposed authentication method.

3.1. Evaluation of Normalization

3.1.1. Outlier Analysis

Figure 10 shows the results of comparing ratios of beats recognized as outliers depending on each normalization method to compare and evaluate the performance of existing methods. We used independent t-tests when the Shapiro-Wilk normality test confirmed normal distributions. Otherwise, the Mann–Whitney test was used. All statistical analyses were performed using IBM SPSS Statistics 24.0 for Windows (IBM, Armonk, NY, USA).
Our proposed method showed significant differences according to methods recommended by Arteaga-Falconi et al. [21] (t-test, *** p < 0.001), Fatermian et al. [25] (t-test, *** p < 0.001), and Nobunaga et al. [27] (t-test, *** p < 0.001) and Choi et al. [26] (Mann–Whitney test, ** p < 0.01). The existing methods discarded more beats than the presented method when generating the representative beat. Our proposed method did not detect as many outlier beats as existing methods and better maintained the number of beats than other methods. This result indicates that our proposed method corrected more beats to resemble the resting state waveform than existing methods.

3.1.2. Quantitative Similarity Analysis

Table 3 shows correlation coefficient values of ECG beats in the resting states. To confirm the performance of our proposed method, we compared the proposed method to existing methods. When generating the representative beat, differences may occur depending on the number of data files. Therefore, we compared results with the different numbers of data files to generate the representative beat. In Table 3, when the number of data files generating a representative beat is 5 and 20, the difference in correlation coefficient differs by 0.0098 on average. This result means that even if the data file increases, the correlation coefficient does not change significantly. Therefore, using the representative beat constructed with five files, we compared correlation coefficients between our proposed and existing normalizations methods.
When comparing the similarity of our method presented with existing methods, our method showed superior performance (ranging from 4.6% to 17.7%) compared to existing methods (Table 3). In addition, similarity increased by 23.7% for ECG beats without normalization. These results should be interpreted with caution because the method used by Choi et al. did not detect the clear difference in performance from the proposed method, compared to other methods, perhaps because beats were compared in the resting state.
Table 4 shows correlation coefficient values between the resting state and the non-resting state. The similarity was compared depending on the number of files in the same way as the resting state. There were no significant differences in the correlation coefficient according to how many files were included.
Compared to the existing methods, our method presented showed better performance (ranging from 2.6% to 22%) (Table 4). In addition, similarity increased 42.5% using the proposed method for beats of the ECG without normalization. This result is a more considerable performance difference than that observed between resting states. In particular, our method showed a difference of −0.3% compared to the Choi et al. method in the resting state but a better result by 3.1% in the non-resting state.

3.2. Authentication Performance

To evaluate the proposed method, we selected the optimal model by comparing the performance of authentication models. We used accuracy (ACC), False Acceptance Rate (FAR), False Rejection Rate (FRR), and an Equal Error Rate (EER) as performance indicators [40]. FAR evaluates results masquerading as a class other than the intended class, whereas FRR evaluates results erroneously rejected as members of a particular class. EER is an index that evaluates the reliability of the model with the location of the receiver operating characteristic (ROC) curve when FAR and FRR are the same.
We extracted the results by changing only the authentication model under the same conditions to select the most appropriate model. Figure 11 and Table 5 show the performance parameters of ACC, FAR, FRR, and EER for each authentication model in the resting state. The results were obtained using the train set in the resting state for each individual and the test set for model selection.
Figure 11 and Table 5 illustrate that the proposed method demonstrates better performance in SVM-G than other authentication models. SVM-G showed better average differences in accuracy, 1.1% to kNN, 0.5% to SVM-Q, and 3.3% to DT. This model led to better FAR and EER to all normalization methods, ranging from a minimum of 1.6% to a maximum of 7%. Although SVM-G showed 0.12% lower performance on average in FRR than the kNN model, it had better performance for indicators other than FRR. In addition, SVM-G is more efficient in terms of security due to a lower FAR. Our proposed method achieved 99.05% ACC, 0.85% FAR, 1.04% FRR, and 0.77% ERR in SVM-G and brings good performance for all four performance indicators when compared to other methods. In addition, the proposed method showed similar or higher performance than existing methods in other models.
We analyzed the percent change of heart rate to classify non-resting values according to heart rate. Figure 12 shows the percent change of heart rate for each status based on the heart rate in the resting state. Listening to the calm music and watching the scary videos resulted in the lowest heart rate change of 5–6%, while listening to the exciting music and watching the relaxed videos resulted in the second-highest heart rate change of 7–8%, and exercise resulted in the highest heart rate change of 48%.
Figure 13 and Table 6 illustrate the performance parameters of the SVM-G model in the non-resting state. The results were obtained using the train set in the resting state for each individual and the test set to compare authentication performances according to state. When all conditions were used as the test set, our method obtained 88.14% ACC, 2.6% FAR, 21% FRR, and 9.83% EER, resulting in superior results to existing methods. When authentication is divided into three stages, authentication performance deteriorates as the percent change of heart rate increases. For calm music and scary video, the proposed method showed better accuracy than existing methods at 93.55%. In the relaxed video and exciting music, the proposed method earned good results of accuracy 90.87%.
When the test set used only exercise status, the accuracy of the proposed method was higher than other methods, but the authentication performance was lower than other statuses. This result means that the high heart rate variability may significantly impair the signal, making heart rate corrections ineffective. Therefore, when the change in heart rate is 10% or more compared to the current heart rate, authentication performance is severely degraded, and authentication may not proceed normally.

4. Discussion

4.1. Non-Linear Normalization Based on Analysis with Heart Rate

The accuracy of ECG-based authentication systems was previously unconfirmed at different heart rates, but this study can serve as the precedent for using authentication systems in real life. We proposed the novel normalization method and used ECG data obtained in various states to evaluate our method’s performance and analyzed correlations with ECG beats extracted during different physiological states. This process yielded that our method improved the similarity of ECG beats before and after normalization compared to existing methods and showed good authentication performance.
Previous studies of ECG-based authentication systems have proposed various ideas to improve authentication systems’ accuracy. However, only a few studies employed corrections for heart rate variability in ECG. For example, Li et al. [20] implemented an algorithm to normalize the entire length of an ECG beat at a fixed length to test authentication models. However, they did not include conditions that affect physiological heart rate changes in ECG. Arteaga-Falconi et al. [21] designed and verified an authentication system by linearly performing time normalization. However, this approach has the disadvantage of not considering the non-linear characteristics of ECG. We addressed such shortcomings in this study. We performed non-linear normalization for each section, considering ECG nonlinearity. In addition, we performed the specific evaluation of our method compared to existing methods.
Some previous studies have attempted to correct ECG morphological information by performing time-normalization of only T wave, P wave, and T wave parts using partial normalization [25,26]. However, these studies conducted normalization based on commonly used physiological parameters rather than empirical analysis and did not perform experimental verification of heart rate changes.
The significant advantage of our study is that it presents scientific evidence from statistical analysis of the wide range of heart rate measurements. This evidence was obtained by modifying each section based on the section-by-section analysis of ECG according to heart rate. In addition, we performed experimental validation on the proposed method with the database that provided information on the percent change of heart rate. The following discussion describes that this database extracted at different states is valuable for evaluating its authentication performance.

4.2. Authentication Performance with Heart Rate Changes

As for the results of SVM-G, the proposed method in the resting state shows better FAR, FRR, and accuracy than existing methods (Table 5). However, authentication accuracy decreases as the percent change of heart rate increases (Table 6). The performance deteriorates the most in the exercise state, during which the heart rate increases significantly, and the change in FRR value becomes the greatest compared to other indicators. Nevertheless, the FAR value was 2.61% for the complete training process, indicating that the indicator is still highly resistant to the approach of others. The increase in the FRR value indicates the point where the individual waveform does not match the resting state even after time normalization.
We performed further analysis and confirmed the results through feature selection to find the reason. For the feature selection algorithm, we used the Relief-F algorithm. The Relief-F input consisted of resting and exercising state features for each individual. Since the number of resting state data and exercise state data is different, the resting state data were randomly selected to the number of exercise state data. We earned the feature weights that summed were summed for all subjects per feature after z-score normalization.
Figure 14 shows the summed feature weights per feature and that the amplitude features are in the Top 8: the amplitude of QT, PS, RS, PT, ST, RQ, and PR. A high ranking meaning is a dominant feature when distinguishing the resting state from the exercising state. In other words, the performance degradation in the exercising state comes from the difference in amplitude. In addition, the temporal domain features corrected by the proposed method are ranked low. A low ranking means that the feature is stable in any state. The feature selection result implies that specific normalization of amplitude is required along with non-linear normalization in the case of exercising. Several previous studies support these results. Previously published studies explored whether the amplitude values of the P wave, T wave, and QRS complex change during rapid heart rate changes [32,41,42]. Langley et al. [43] described that when amplitude increased due to the significant change in heart rate, it was restored to the relaxed heart rate after a recovery period of 300 sec. There are z-score and min-max normalization methods for amplitude normalization, but it is challenging to correct ECG waveforms due to the high degree of heart rate change, so it is not suitable for normalization of amplitude that changes according to heart rate [19].
We evaluated authentication performance in various situations, with results constituting interesting potential for the emergence of the new normalization method that considers amplitude rather than only the time axis during high heart rates. These insights could be applied to developing a new authentication system that can accommodate excessive increases in heart rate. In addition, our results can guide future research for application to real life.

4.3. ECG Based Authentication System Including Various Real-Life Conditions

Our study experimented with fewer subjects compared to other studies. However, we constructed the database with ECG data measured by performing various physiological statuses similar to real life. We observed variability in authentication performance over a wide range (53–132 bpm) of heart rates. Observation of authentication performance according to heart rate changes may provide a cornerstone for future study of ECG authentication.
Research using a large database with many subjects can increase the thoroughness of performance evaluation, as the diversity of subjects is guaranteed [19]. However, the inclusion of many subjects does not ensure diversity of health conditions. This shortcoming makes it difficult to evaluate whether a method tested in resting can be applied in real life. For example, Kim et al. [44] designed and tested a system using single-channel ECG signals measured from 11 males for 10 min over six days. However, they only performed experimental validation using data measured in the resting state and did not consider signals measured in real-life conditions. Choi et al. [26] studied 100 subjects engaging in stepper exercise and verified differences in authentication performance associated with an activity. Since this study does not specify heart rate after exercise, it is difficult to confirm heart rate changes due to exercise.
One of the significant advantages of our study is that we evaluated the practical use of the authentication system implemented as a database that was designed and measured for several situations. This evaluation method can minimize problems that may occur in the authentication system when implemented in real life. We considered more diverse situations compared with the studies mentioned above. This merit allows us to evaluate the feasibility of implementing an authentication system in a clinical setting. However, it was difficult to determine precisely when authentication performance is reduced due to sharp changes in heart rate, so this should be noted.

5. Conclusions

In this paper, we proposed normalization along a time axis to improve ECG authentication and evaluated a data set in various states. We artificially changed the heart rate by listening to music, watching a video, or exercising to authenticate users in various situations. Then, one ECG cycle composed of a P wave, QRS complex, and T wave, which are morphological characteristics of the ECG, was analyzed. Our non-linear normalization method was applied by analyzing the ECG cycle before the heart rate change.
We evaluated user authentication performance under various conditions in a sample of 15 subjects by using the proposed method. In the resting state, our proposed method improved the similarity before and after the heart rate change by 8% on average compared to existing methods, and our approach achieved 99.05% ACC, 0.77% ERR authentication performance. These indicators of performance are better than other methods in SVM-G. In the other state, our proposed method improved similarity 11% on average compared to existing methods and achieved 88.14% ACC, 9.83% ERR authentication performance across all states.
Future research needs to evaluate authentication performance in various conditions using a large sample. Performance should be maintained when used in any state. There is a need for an amplitude and time normalization method to avoid detrimental authentication performance even with significant changes in heart rate. In that respect, our results suggest directions for future studies. Deep learning can be a powerful alternative, but difficulty in the practical application has to be taken into account by the inconvenience of the increased computational load. Therefore, the normalization step seems to be more important and should be addressed more in future studies.

Author Contributions

Conceptualization, H.B.H., J.L. and H.K.; methodology, H.B.H., J.L., B.C. and H.K.; formal analysis, H.B.H. and B.C.; writing—original draft preparation, H.B.H., H.K. and J.L.; writing—review and editing, H.B.H., I.Y.K. and J.L.; supervision, I.Y.K. and J.L.; funding acquisition, J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No.2020-0-00447, Development of connected medical device anti-hacking technology for safe medical/healthcare services).

Institutional Review Board Statement

The study was conducted according to the guidelines of the Declaration of Helsinki, and approved by the Institutional Review Board of the Hanyang University (HYI-16-030-1).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jain, A.K.; Ross, A.A.; Nandakumar, K. Introduction to Biometrics; Springer Science & Business Media: New York, NY, USA, 2011. [Google Scholar]
  2. Abo-Zahhad, M.; Ahmed, S.M.; Abbas, S.N. Biometric authentication based on PCG and ECG signals: Present status and future directions. Signal Image Video Process. 2014, 8, 739–751. [Google Scholar] [CrossRef]
  3. Qinghan, X. Technology review—Biometrics-Technology, Application, Challenge, and Computational Intelligence Solutions. IEEE Comput. Intell. Mag. 2007, 2, 5–25. [Google Scholar] [CrossRef]
  4. Dantcheva, A.; Elia, P.; Ross, A. What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics. IEEE Trans. Inf. Forensics Secur. 2016, 11, 441–467. [Google Scholar] [CrossRef] [Green Version]
  5. Álvarez-Pato, V.M.; Sánchez, C.N.; Domínguez-Soberanes, J.; Méndoza-Pérez, D.E.; Velázquez, R. A Multisensor Data Fusion Approach for Predicting Consumer Acceptance of Food Products. Foods 2020, 9, 774. [Google Scholar] [CrossRef] [PubMed]
  6. Chugh, T.; Cao, K.; Jain, A.K. Fingerprint Spoof Buster: Use of Minutiae-Centered Patches. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2190–2202. [Google Scholar] [CrossRef]
  7. Gupta, P.; Behera, S.; Vatsa, M.; Singh, R. On Iris Spoofing Using Print Attack. In Proceedings of the 2014 22nd International Conference on Pattern Recognition, Stockholm, Sweden, 24–28 August 2014; pp. 1681–1686. [Google Scholar]
  8. Boulkenafet, Z.; Komulainen, J.; Hadid, A. Face Spoofing Detection Using Colour Texture Analysis. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1818–1830. [Google Scholar] [CrossRef]
  9. Tome, P.; Marcel, S. On the vulnerability of palm vein recognition to spoofing attacks. In Proceedings of the 2015 International Conference on Biometrics (ICB), Phuket, Thailand, 19–22 May 2015; pp. 319–325. [Google Scholar]
  10. Barros, A.; Resque, P.; Almeida, J.; Mota, R.; Oliveira, H.; Rosário, D.; Cerqueira, E. Data Improvement Model Based on ECG Biometric for User Authentication and Identification. Sensors 2020, 20, 2920. [Google Scholar] [CrossRef]
  11. Sodhro, A.H.; Sangaiah, A.K.; Sodhro, G.H.; Lohano, S.; Pirbhulal, S. An Energy-Efficient Algorithm for Wearable Electrocardiogram Signal Processing in Ubiquitous Healthcare Applications. Sensors 2018, 18, 923. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  12. Nykvist, C.; Larsson, M.; Sodhro, A.H.; Gurtov, A. A lightweight portable intrusion detection communication system for auditing applications. Int. J. Commun. Syst. 2020, 33, e4327. [Google Scholar] [CrossRef]
  13. Zhang, Y.; Gravina, R.; Lu, H.M.; Villari, M.; Fortino, G. PEA: Parallel electrocardiogram-based authentication for smart healthcare systems. J. Netw. Comput. Appl. 2018, 117, 10–16. [Google Scholar] [CrossRef]
  14. Diab, M.O.; Seif, A.; Sabbah, M.; El-Abed, M.; Aloulou, N. A review on ecg-based biometric authentication systems. In Hidden Biometrics; Springer: Berlin/Heidelberg, Germany, 2020; pp. 17–44. [Google Scholar]
  15. Camara, C.; Peris-Lopez, P.; Gonzalez-Manzano, L.; Tapiador, J. Real-time electrocardiogram streams for continuous authentication. Appl. Soft Comput. 2018, 68, 784–794. [Google Scholar] [CrossRef]
  16. Dong, X.; Si, W.; Huang, W. ECG-based identity recognition via deterministic learning. Biotechnol. Biotechnol. Equip. 2018, 32, 769–777. [Google Scholar] [CrossRef] [Green Version]
  17. Paiva, J.S.; Dias, D.; Cunha, J.P.S. Beat-ID: Towards a computationally low-cost single heartbeat biometric identity check system based on electrocardiogram wave morphology. PLoS ONE 2017, 12, e0180942. [Google Scholar] [CrossRef] [Green Version]
  18. Guven, G.; Gürkan, H.; Guz, U. Biometric identification using fingertip electrocardiogram signals. Signal Image Video Process. 2018, 12, 933–940. [Google Scholar] [CrossRef]
  19. Pinto, J.R.; Cardoso, J.S.; Lourenco, A. Evolution, Current Challenges, and Future Possibilities in ECG Biometrics. IEEE Access 2018, 6, 34746–34776. [Google Scholar] [CrossRef]
  20. Li, Y.; Pang, Y.; Wang, K.; Li, X. Toward improving ECG biometric identification using cascaded convolutional neural networks. Neurocomputing 2020, 391, 83–95. [Google Scholar] [CrossRef]
  21. Arteaga-Falconi, J.S.; Osman, H.A.; Saddik, A.E. ECG Authentication for Mobile Devices. IEEE Trans. Instrum. Meas. 2016, 65, 591–600. [Google Scholar] [CrossRef]
  22. Ibrahim, A.E.; Abdel-Mageid, S.; Nada, N.; Elshahed, M.A. ECG signals for human identification based on fiducial and non-fiducial approaches. Int. J. Adv. Comput. Res. 2020, 10, 89–95. [Google Scholar] [CrossRef]
  23. Kang, S.J.; Lee, S.Y.; Cho, H.I.; Park, H. ECG Authentication System Design Based on Signal Analysis in Mobile and Wearable Devices. IEEE Signal Process. Lett. 2016, 23, 805–808. [Google Scholar] [CrossRef]
  24. Choi, G.H.; Lim, K.; Pan, S.B. Driver Identification System Using Normalized Electrocardiogram Based on Adaptive Threshold Filter for Intelligent Vehicles. Sensors 2021, 21, 202. [Google Scholar] [CrossRef]
  25. Fatemian, S.Z.; Agrafioti, F.; Hatzinakos, D. HeartID: Cardiac biometric recognition. In Proceedings of the 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington, DC, USA, 27–29 September 2010; pp. 1–5. [Google Scholar]
  26. Choi, G.H.; Ko, H.; Pedrycz, W.; Singh, A.K.; Pan, S.B. Recognition System Using Fusion Normalization Based on Morphological Features of Post-Exercise ECG for Intelligent Biometrics. Sensors 2020, 20, 7130. [Google Scholar] [CrossRef]
  27. Nobunaga, T.; Tanaka, H.; Tanahashi, I.; Watanabe, T.; Hattori, Y. Optimised band-pass filter to ensure accurate ECG-based identification of exercising human subjects. Electron. Lett. 2017, 53, 222–224. [Google Scholar] [CrossRef]
  28. Goldberger, A.L.; Glass, L.; Hausdorff, J.M.; Ivanov, P.C.; Mark, R.G.; Mietus, J.E.; Moody, G.B.; Peng, C.-K.; Stanley, H.E. PhysioBank, PhysioToolkit, and PhysioNet: Components of a New Research Resource for Complex Physiologic Signals. Circulation 2000, 101, e215–e220. [Google Scholar] [CrossRef] [Green Version]
  29. Singh, B.N.; Tiwari, A.K. Optimal selection of wavelet basis function applied to ECG signal denoising. Digit. Signal Process. 2006, 16, 275–287. [Google Scholar] [CrossRef]
  30. Bayer, F.M.; Kozakevicius, A.J.; Cintra, R.J. An iterative wavelet threshold for signal denoising. Signal Process. 2019, 162, 10–20. [Google Scholar] [CrossRef]
  31. Martinez, J.P.; Almeida, R.; Olmos, S.; Rocha, A.P.; Laguna, P. A wavelet-based ECG delineator: Evaluation on standard databases. IEEE Trans. Biomed. Eng. 2004, 51, 570–581. [Google Scholar] [CrossRef] [PubMed]
  32. Simoons, M.L.; Hugenholtz, P.G. Gradual changes of ECG waveform during and after exercise in normal subjects. Circulation 1975, 52, 570–577. [Google Scholar] [CrossRef] [Green Version]
  33. Craig, A.D. Forebrain emotional asymmetry: A neuroanatomical basis? Trends Cogn. Sci. 2005, 9, 566–571. [Google Scholar] [CrossRef]
  34. Lugovaya, T.S. Biometric Human Identification Based on Electrocardiogram. Master’s Thesis, Faculty of Computing Technologies and Informatics, Electrotechnical University ‘LETI’, Saint-Petersburg, Russia, 2005. [Google Scholar]
  35. Hawkins, D.M. Point Estimation of the Parameters of Piecewise Regression Models. J. R. Stat. Soc. 1976, 25, 51–57. [Google Scholar] [CrossRef]
  36. Safie, S.I.; Soraghan, J.J.; Petropoulakis, L. Electrocardiogram (ECG) Biometric Authentication Using Pulse Active Ratio (PAR). IEEE Trans. Inf. Forensics Secur. 2011, 6, 1315–1322. [Google Scholar] [CrossRef]
  37. Tan, R.; Perkowski, M. Toward Improving Electrocardiogram (ECG) Biometric Verification using Mobile Sensors: A Two-Stage Classifier Approach. Sensors 2017, 17, 410. [Google Scholar] [CrossRef] [PubMed]
  38. Ingale, M.; Cordeiro, R.; Thentu, S.; Park, Y.; Karimian, N. ECG Biometric Authentication: A Comparative Analysis. IEEE Access 2020, 8, 117853–117866. [Google Scholar] [CrossRef]
  39. Anzai, Y. Pattern Recognition and Machine Learning; Elsevier: Amsterdam, The Netherlands, 2012. [Google Scholar]
  40. Pinto, J.R.; Cardoso, J.S.; Lourenço, A.; Carreiras, C. Towards a Continuous Biometric System Based on ECG Signals Acquired on the Steering Wheel. Sensors 2017, 17, 2228. [Google Scholar] [CrossRef] [Green Version]
  41. Kentala, E.; Heikkilä, J.; Pyörälä, K. Variation of QRS amplitude in exercise ECG as an index predicting result of physical training in patients with coronary heart disease. Acta Med. Scand. 1973, 1, 81–86. [Google Scholar] [PubMed]
  42. Irisawa, H.; Seyama, I. The configuration of the P wave during mild exercise. Am. Heart J. 1966, 71, 467–472. [Google Scholar] [CrossRef]
  43. Langley, P.; Bernardo, D.D.; Murray, A. Quantification of T Wave Shape Changes Following Exercise. Pacing Clin. Electrophysiol. 2002, 25, 1230–1234. [Google Scholar] [CrossRef]
  44. Kim, J.; Yang, G.; Kim, J.; Lee, S.; Kim, K.K.; Park, C. Efficiently Updating ECG-Based Biometric Authentication Based on Incremental Learning. Sensors 2021, 21, 1568. [Google Scholar]
Figure 1. Workflow of the proposed framework for ECG based user authentication.
Figure 1. Workflow of the proposed framework for ECG based user authentication.
Sensors 21 06966 g001
Figure 2. ECG waveform and morphological features.
Figure 2. ECG waveform and morphological features.
Sensors 21 06966 g002
Figure 3. Fiducial point detection and segmentation based on ECG: (a) Detection of fiducial points in ECG based on Wavelet transform; (b) Segmentation results based on Pon points.
Figure 3. Fiducial point detection and segmentation based on ECG: (a) Detection of fiducial points in ECG based on Wavelet transform; (b) Segmentation results based on Pon points.
Sensors 21 06966 g003
Figure 4. Regression plots for ECG segments and intervals at various heart rates: (a) PR interval; (b) QRS complex; (c) ST interval; (d) TP segment.
Figure 4. Regression plots for ECG segments and intervals at various heart rates: (a) PR interval; (b) QRS complex; (c) ST interval; (d) TP segment.
Sensors 21 06966 g004
Figure 5. Flowchart of the proposed normalization algorithm.
Figure 5. Flowchart of the proposed normalization algorithm.
Sensors 21 06966 g005
Figure 6. Normalization result for subject 11 with a 57–120 bpm heart rate: (a) with linear normalization; (b) with the proposed method.
Figure 6. Normalization result for subject 11 with a 57–120 bpm heart rate: (a) with linear normalization; (b) with the proposed method.
Sensors 21 06966 g006
Figure 7. The process of generating the representative beat after removing outlier beats.
Figure 7. The process of generating the representative beat after removing outlier beats.
Sensors 21 06966 g007
Figure 8. Fiducial features on the single ECG beat and the table that summarizes features.
Figure 8. Fiducial features on the single ECG beat and the table that summarizes features.
Sensors 21 06966 g008
Figure 9. Schematic diagram of data partitioning method for two experiments; Example of test set configuration for experiment 1 of subject 1 (left); Example of test set configuration using only calm and scary status for experiment 2 of subject 1 (right).
Figure 9. Schematic diagram of data partitioning method for two experiments; Example of test set configuration for experiment 1 of subject 1 (left); Example of test set configuration using only calm and scary status for experiment 2 of subject 1 (right).
Sensors 21 06966 g009
Figure 10. Ratios of beats recognized as outliers according to each method; Proposed method (mean: 14.84, SD: 6.65), Arteaga-Falconi et al. (mean: 33.30, SD: 6.84), Fatermian et al. (mean: 26.46, SD: 9.37), Choi et al. (median: 22.84, IQR: 1.00), and Nobunaga et al. (mean: 35.52, SD: 4.63); ***: p < 0.001, **: p < 0.01, ●: Outlier data.
Figure 10. Ratios of beats recognized as outliers according to each method; Proposed method (mean: 14.84, SD: 6.65), Arteaga-Falconi et al. (mean: 33.30, SD: 6.84), Fatermian et al. (mean: 26.46, SD: 9.37), Choi et al. (median: 22.84, IQR: 1.00), and Nobunaga et al. (mean: 35.52, SD: 4.63); ***: p < 0.001, **: p < 0.01, ●: Outlier data.
Sensors 21 06966 g010
Figure 11. Evaluation indicator of authentication for each machine learning model.
Figure 11. Evaluation indicator of authentication for each machine learning model.
Sensors 21 06966 g011
Figure 12. Percent change in heart rate for each status compared to the resting state.
Figure 12. Percent change in heart rate for each status compared to the resting state.
Sensors 21 06966 g012
Figure 13. Evaluation indicator of authentication for each status.
Figure 13. Evaluation indicator of authentication for each status.
Sensors 21 06966 g013
Figure 14. Sum of feature weight to all subjects.
Figure 14. Sum of feature weight to all subjects.
Sensors 21 06966 g014
Table 1. Detailed descriptions for each status.
Table 1. Detailed descriptions for each status.
StatusDescription
RestingFive-minute rest in sitting position
Listening to musicCalm: Listening to classical music wearing a headset
Excited: Listening to rock music wearing a headset
Watching videoRelaxed: Watching the animated video
Scared: Watching horror video
ExercisingFive times round trip at maximum speed, climbing stairs as high as the second floor
Table 2. Average RMSE value depending on piecewise regression divided by the number of each segment.
Table 2. Average RMSE value depending on piecewise regression divided by the number of each segment.
ST Interval ( Q R S o f f T o f f ) TP Segment ( T o f f P o f f )
One-segment piecewise regression0.03380.0249
Two-segment piecewise regression0.03380.0249
Three-segment piecewise regression0.03390.0249
Table 3. Comparisons of performance with the correlation coefficient between proposed method and existing methods in the resting state.
Table 3. Comparisons of performance with the correlation coefficient between proposed method and existing methods in the resting state.
StateResting State
FilesRawArteaga-
Falconi et al. [21]
Fatermian et al. [25] Choi et al.
[26]
Nobunaga et al. [27]Proposed
50.78680.87470.93000.97650.82670.9729
100.79310.87930.92700.97870.84010.9756
150.78950.86950.92680.97880.85400.9759
200.79340.87670.92890.97950.87110.9772
Relative error for similarity23.7%11.2%4.6%−0.3%17.7%
Table 4. Comparisons of performance between proposed method and existing methods in the non-resting state.
Table 4. Comparisons of performance between proposed method and existing methods in the non-resting state.
StateNon-Resting State
FilesRawArteaga-
Falconi et al. [21]
Fatermian et al. [25] Choi et al.
[26]
Nobunaga et al. [27]Proposed
50.66110.77170.91780.91360.78580.9418
100.67600.79480.91790.92230.80510.9464
150.67230.77690.91690.91800.80590.9460
200.66950.78790.91850.92100.82920.9465
Relative error for similarity42.5%22%2.6%3.1%19.9%
Table 5. The average values of accuracy, FAR, FRR, and EER for each machine learning model.
Table 5. The average values of accuracy, FAR, FRR, and EER for each machine learning model.
MethodSVM-GkNNSVM-QDT
AccuracyProposed99.0597.9797.7696.38
Arteaga-Falconi et al. [21]97.2096.2397.6294.72
Fatermian et al. [25]91.7790.3190.8886.02
Choi et al. [26]96.4795.7796.0795.07
Nobunaga et al. [27]95.193.8895.0090.84
FARProposed0.853.092.612.28
Arteaga-Falconi et al. [21]2.174.283.596.48
Fatermian et al. [25]7.7410.839.7114.62
Choi et al. [26]1.673.083.104.39
Nobunaga et al. [27]3.866.524.918.95
FRRProposed1.040.981.884.96
Arteaga-Falconi et al. [21]3.433.261.184.08
Fatermian et al. [25]8.738.548.5313.33
Choi et al. [26]5.395.384.775.47
Nobunaga et al. [27]5.935.725.099.36
EERProposed0.773.091.743.32
Arteaga-Falconi et al. [21]2.234.282.416.02
Fatermian et al. [25]7.6710.839.1214.33
Choi et al. [26]3.273.083.475.69
Nobunaga et al. [27]4.726.524.568.95
FAR (false acceptance rate); FRR (false rejection rate); EER (equal error rate).
Table 6. The average values of accuracy, FAR, FRR, and EER, for each status.
Table 6. The average values of accuracy, FAR, FRR, and EER, for each status.
MethodTotalCalm Music and Scary VideoExcited Music and Relaxed VideoExercise
AccuracyProposed88.1493.5590.8776.15
Arteaga-Falconi et al. [21]83.8891.6488.1060.28
Fatermian et al. [25]85.2389.7187.6374.46
Choi et al. [26]80.6688.8285.4063.14
Nobunaga et al. [27]82.1289.3886.8260.22
FARProposed2.662.332.792.61
Arteaga-Falconi et al. [21]2.883.903.171.92
Fatermian et al. [25]6.075.775.507.48
Choi et al. [26]5.124.274.905.15
Nobunaga et al. [27]4.454.695.042.37
FRRProposed21.0610.5715.4745.09
Arteaga-Falconi et al. [21]29.3612.8120.6377.53
Fatermian et al. [25]23.4614.8019.2543.61
Choi et al. [26]33.5518.0924.3168.58
Nobunaga et al. [27]31.3016.5621.3277.19
EERProposed9.836.236.6215.86
Arteaga-Falconi et al. [21]14.297.247.6528.13
Fatermian et al. [25]14.4011.0811.8119.82
Choi et al. [26]17.8212.113.6626.70
Nobunaga et al. [27]18.1010.5712.7636.15
FAR (false acceptance rate); FRR (false rejection rate); EER (equal error rate).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hwang, H.B.; Kwon, H.; Chung, B.; Lee, J.; Kim, I.Y. ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions. Sensors 2021, 21, 6966. https://doi.org/10.3390/s21216966

AMA Style

Hwang HB, Kwon H, Chung B, Lee J, Kim IY. ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions. Sensors. 2021; 21(21):6966. https://doi.org/10.3390/s21216966

Chicago/Turabian Style

Hwang, Ho Bin, Hyeokchan Kwon, Byungho Chung, Jongshill Lee, and In Young Kim. 2021. "ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions" Sensors 21, no. 21: 6966. https://doi.org/10.3390/s21216966

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop