Professional Documents
Culture Documents
ABSTRACT 1.5
A) ECG heart-beats
R R'
Voltage (mV)
feature extraction and matching are performed in Euclidean 0.5
T
P'
T'
P
spaces. However, there are many scenarios (e.g., biometric 0
3010
of these threshold-vectors corresponds to a component of the Algorithm 1 SPEC-Hashing
LDA- feature vectors, and they can have varying lengths (their Inputs : LDA-feature vectors (for training set), Similarity
length is optimally determined by the algorithm). matrix
Once the list of thresholds is obtained from the SPEC- Outputs : an ordered list of thresholds
Hashing algorithm during the training phase, the binarization
of the ECG feature vectors is done as follows : 1: Set L = ∅
Let us first look at the m-th component. Suppose λm = 2: for each component m = 1, 2, · · · , M do
[λm,1 , λm,2 , · · · , λm,n ]. Then, the m-th component xm of 3: Set flag = 0.
a feature vector x is mapped to an n-bit vector bm (xm ) = 4: while flag = 0 do
[bm,1 (xm )bm,2 (xm ) · · · bm,n (xm )] where 5: Find λopt that minimizes ∆(λ).
6: if ∆(λ) < 0 then
0 xm ≤ λm,i Update L = [L, λ]
bm,i (xm ) = (2) 7:
1 xm > λm,i 8: else
Once we have the binary vectors for each component xm , 9: Set flag = 1.
we simply form the binary representation of x by concatena- 10: end if
tion, i.e., b(x) = [b1 (x1 )b2 (x2 ) · · · bM (xM )]. 11: end while
In the enrollment phase, for each feature vector x(i) we 12: end for
compute the corresponding binary representation b x(i) .
Here on, we will denote this as b(i) for simplicity, and refer
collection sessions took place, scheduled a few weeks apart in
to these as the binary feature vectors.
order to evaluate the stability of the signal with time. Every
During the authentication phase, the feature vector y ex-
recording is 3 minutes long and the lead orientation matches
tracted from the user’s ECG reading is mapped to the binary
that of Lead II of the standard 12-lead ECG system. 16 out
vector b = b(y) using the same binary decision stumps b(·).
of 52 volunteers were recorded in both sessions and 36 in just
We now comment briefly on the operation of the SPEC-
one session. The sampling frequency is 200Hz.
Hashing algorithm (a detailed treatment can be found in [9]).
Open-set recognition setup. To simulate an open-set bio-
Suppose we have a list of thresholds L, and the corresponding
metric system the dataset was split between a training and an
binary mappings obtained using Eq.(3). Let dH (i, j) denote
evaluation set. The training set included the 36 subjects for
the Hamming distance between the binary vectors b(i) and
who just one ECG reading is available.The proposed algo-
b(j) (corresponding to the feature vectors x(i) and x(j) ). We
rithm was trained on signals from this set. The evaluation set
can define the matrix T (corresponding to list L )as follows
included signals from the 16 volunteers for which two record-
1 −dH (i,j) ings are available. The earlier recording was used for enroll-
Tij = e (3) ment and the later for testing.
Z
P Closed-set recognition setup. To simulate the closed-set
where Z = i,j e−dH (i,j) . Also, let us denote the normal- biometric system the proposed algorithm was trained on ECG
ized similarity matrix by S̃. We can then view the operation signals from all users i.e., the enrollees of the system. The
of the SPEC-Hashing algorithm as finding an optimum list enrollment data includes the first ECG readings from the 16
of thresholds that minimizes the Kullback-Liebler divergence volunteers and the first half of the ECG reading from the 36
between the distribution T and the target distribution S̃. The volunteers.
closeness of the two distributions represents how closely the The resulting binary vectors, obtained using the list of bi-
similarities are preserved by the mapping from the Euclidean nary decision-stumps learnt by the SPEC-Hashing algorithm
space to the Hamming feature space. were 345 bits long for the open-set setup and 468 bits long for
The SPEC-Hashing algorithm builds the list L in an in- the closed-set setup (we set the maximum number of bits per
cremental fashion. Let L∗ = [L, λ]. Define dimension to be 25 bits). The difference of the bit length be-
tween the two setups is due to the dimensionality after LDA
∆(λ) = KL(S̃||T∗ ) − KL(S̃||T) (4) projection.
Figure 2 shows the histograms for the intra-subject and
If ∆(λ) is negative, then adding λ to the list reduces the di- inter-subject Euclidean and Hamming distances for the
vergence from the target distribution, and the list is updated closed-set recognition setup. For the Euclidean space, the
to include λ. average inter-subject distance is 0.2656 and the average intra-
3. EXPERIMENTAL RESULTS
subject distance is 0.0757. For the Hamming space, the
The proposed system was evaluated over ECG signals from average inter-subject distance is 0.2496 (116 bits) and the
52 different volunteers that were collected at the Biometrics intra-subject 0.0719 (33 bits).
Security Laboratory of the University of Toronto. Two signal Figure 3 shows the performance of three open-set sys-
3011
A) AC/LDA feature space B) SPEC-Hash feature space
50 40
Percentage of Pairs
Percentage of Pairs
40
30
30
20
20
10
10
0 0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7
Euclidean Distance Hamming Distance
EER 5. REFERENCES
40
[1] S. A. Israel, J. M. Irvine, A. Cheng, M. D. Wiederhold, and B. K.
Wiederhold, “ECG to identify individuals,” Pattern Recognition, vol.
30 38, no. 1, pp. 133–142, 2005.
[2] L. Biel, O. Pettersson, L. Philipson, and P. Wide, “ECG analysis: a new
approach in human identification,” IEEE Trans. on Instrumentation and
20
Measurement, vol. 50, no. 3, pp. 808–812, 2001.
[3] S.I. Safie, J.J. Soraghan, and L. Petropoulakis, “Electrocardiogram ECG
10 biometric authentication using pulse active ratio PAR,” Information
10 15 20 25 30 35 40 45 50
Forensics and Security, IEEE Transactions on, vol. 6, no. 4, pp. 1315–
False Rejection Rate (%) 1322, dec. 2011.
[4] G. G. Molina, F. Bruekers, C. Presura, M. Damstra, and M. van der
Fig. 3. ROC: FAR versus FRR for the Euclidean and Ham- Veen, “Morphological synthesis of ECG signals for person authentica-
tion,” in Proceedings of 15th European Signal Proc. Conf., Poland, Sept.
ming (SPEC-Hash and ML) spaces 2-7 2007.
[5] I. Odinaka, Po-Hsiang Lai, A.D. Kaplan, J.A. O’Sullivan, E.J. Sirevaag,
S.D. Kristjansson, A.K. Sheffield, and J.W. Rohrbaugh, “ECG biomet-
tems: the AC/LDA Euclidean-distance classifier (which is rics: A robust short-time frequency analysis,” in Proceedings of IEEE In-
the baseline system), the Max-Lloyd quantization approach ternational Workshop on Information Forensics and Security, Dec. 2010,
pp. 1–6.
(for the sake of completeness), and the proposed Hamming-
[6] F. Agrafioti and D. Hatzinakos, “Fusion of ECG sources for human
distance classifier with binary feature vectors designed using identification,” in Proceedings of 3rd Int. Symp. on Communications
the SPEC-Hashing algorithm. The Max-Lloyd quantization Control and Signal Processing, Malta, March 2008, pp. 1542–1547.
approach does not perform well, because binarization does [7] F. Agrafioti, F. M. Bui, and D. Hatzinakos, “Medical biometrics in mo-
not take into consideration class information. The perfor- bile health monitoring,” Security and Communication Networks, vol. 4,
no. 5, pp. 525–539, July 2010, .
mance of the proposed Hamming-distance classifier using bi-
[8] Foteini Agrafioti and Dimitrios Hatzinakos, “ECG biometric analysis
narization based on SPEC-Hashing outperforms all cases. As
in cardiac irregularity conditions,” Signal, Image and Video Processing,
stated in Table 1, the Equal Error Rate (EER) for the AC/LDA pp. 1863–1703, 2008.
based Euclidean-distance classifier was found to be 18.6% [9] Ruei-Sung Lin, D.A. Ross, and J. Yagnik, “Spec hashing: Similarity
(Open-set), and the EER of the proposed Hamming-distance preserving algorithm for entropy-based coding,” in Computer Vision
classifier is 14.82% (Open-set). The EER in the closed set and Pattern Recognition (CVPR), 2010 IEEE Conference on, june 2010,
pp. 848–854.
setup of the proposed system is 5.5%.
3012