0% found this document useful (0 votes)
88 views19 pages

ECG Biometric Identification via Deep Learning

Uploaded by

stagnesadastra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views19 pages

ECG Biometric Identification via Deep Learning

Uploaded by

stagnesadastra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

debbis

Deep Electrocardiogram Based Biometric Identification System


Axel Mukwena, DB727501, Group 20 | Supervised by Prof. Liming Zhang
2021 FYP, Computer Science, Faculty of Science and Technology
Overview
● Objectives
● Background
● System Structure
● Data Processing
● Neural Network Architectures
● Results
● Challenges
● Conclusions
Objectives
● Explore ECG biometrics using Deep Learning: CNN
and Siamese NN.
Why ECGs?

● Universal, unique and guarantees liveness


detection
● Harder to replicate*
● Passwords, pins etc. can get lost, stolen or can be
guessed
● Fingerprints [1], iris [2] and facial features [3] can
be falsified or reverse engineered from templates
Figure 1: Steps during fingerprint reverse engineering from ISO
templates. Source [1]
Background
What is Biometric Recognition (BR)?

● Establishing an identity based on physiological or


physical data.
● Current works use [4]:
○ Fiducial method i.e P, Q, R, S and T
○ Non-fiducial methods
○ Partially fiducial methods i.e R-peak detection
Figure 2: Representation of the QRS complex [Wikipedia]
● Existing Deep Learning implementations [5]
○ Generic and Temporal CNN
○ RNN
○ Autoencoders
System Structure

Stages of Biometric System


● Enrolment
○ Saving user details on database
○ Creating templates
● Recognition
○ Verification and or Authentication
○ Compare test samples to templates and
output a match
System Structure

Figure 3: a) System flow structure with verification and authentication


System Structure

Figure 3: b) System flow structure with verification


Data processing

Data Sources

● MIT-BIH Physionet
Figure 4: a) Shows the BMD device used to extract signals; b)
● ECG-ID Physionet Demonstrate live signal Acquisition

● BMD101 Sensor Chip


○ Non-intrusive
○ Subject to hold the two dry
metal electrodes with each
thumb

Figure 5: BMD Windows-OS Graphical User Interface


Data processing

ECG Segmentation

● No filters applied
Figure 6: Unsegmented ECG wave section
● R-peak segmentation using
Christov algorithm [6]
● Resampled to 256

Figure 7: One ECG segment of size 256


Data processing

Data Augmentation

● Gaussian Noise
● Time Shifting
● Pitch Shifting

Figure 8: One ECG segment of size 256


Neural Network Architectures
Block
Convolution Neural Network

● 4 block structure inherited from


VGG19 [7] architecture
● 256-size 1D signal input
Figure 9: Block structure used in
the CNN

Figure 10: Convolution Neural Network


Architecture
Neural Network Architectures
Block
Siamese Neural Network

● 5 block structure also inherited


from VGG19 [7] architecture
● 256-size 1D signal pair input
○ Positive and Negative pairs
Uses Euclidean Distance for
Figure 11: Block structure used in
● SNN

similarity score

Figure 12: Siamese Neural Network Architecture


Results
SNN CNN

● Data from MIT-BIH and two Input Type Segment Pair 1 Segment

classes from BMD101 Sensor Sample size 400 000 397 740
● ECG-ID dataset failed to produce Training time 13 min 54 min
materialistic results due to Valid Acc - 0.9993
limited data.
Valid Loss 0.4969 0.0029

Threshold, 0.000999 0.99


Decision Margin

Figure 10: Convolution Neural Network Architecture


Results

● SNN Training

Figure 13: a) Training results for the SNN. In Blue is the Training loss
Figure 13: b) Predicted test samples from the SNN model
and Red is Validation Loss:
Results
● CNN Training

Figure 14: a) Training results for the CNN. In Blue is the Training loss
Figure 14: b) Predicted test samples from the CNN model
and Red is Validation Loss:
Challenges
● Closed-set vs Open-set classification
● Binary Classification vs Multi-class
classification
● Subjects with cardiac diseases have non-
uniform ECGs
● ECGs are susceptible to noise
Conclusions
● Increased efforts for better authentication
system and overcoming their limitations.
● 3D face recognition used to counteract 2D
limitations, but 3D models are also
vulnerable to attacks [8].
References
[1] Cappelli et al (2006, December). Can Fingerprints be reconstructed from
ISO Templates?.
[2] Venugopalan et al (2013). Iris spoofing: Reverse engineering the daugman
feature encoding scheme.
[3] Mai et al. (2018). On the reconstruction of face images from deep face
templates.
[4] Hassan et al. Review of Fiducial and Non-Fiducial Techniques of Feature
Extraction in ECG based Biometric Systems
[5] Eduardo et al. ECG-based biometrics using a deep autoencoder for feature
learning-an empirical study on transferability.
[6] Christov, I. I. (2004). Real time electrocardiogram QRS detection using
combined adaptive threshold.
[7] Simonyan et al (2014). Very deep convolutional networks for large-scale
image recognition.
[8] Jia et al (2019). A database for face presentation attack using wax figure
faces.
The End Q & As

You might also like