Multimedia Tools and Applications

, Volume 78, Issue 2, pp 1857–1887 | Cite as

Cancelable biometric authentication system based on ECG

  • Mohamed HammadEmail author
  • Gongning Luo
  • Kuanquan Wang


Biometrics are widely deployed in various security systems; however, they have drawbacks in the form of leakage or stealing, therefore numerous solutions have been proposed to secure biometric template such as cancelable biometric, which is one of the possible solutions for canceling and securing biometric template. However, this problem is still open and to the best of our knowledge, few previous studies have proposed a complete authentic system using the cancelable biometric techniques based on electrocardiogram (ECG). In this paper, we have applied two cancelable biometric techniques for developing a human authentication system based on ECG signals. The first one is an improved Bio-Hashing and the second one is matrix operation technique. The improved Bio-Hash technique solves the problem of accuracy loss, which is the main drawback of basic Bio-Hash technique. The protected feature vector (Bio-Hashed code) is generated from the inner product between the ECG features matrix and tokenize number matrix. While the matrix operation technique is applied on the ECG feature matrix to produce a transformed template which is irreversible to the original features of the ECG. In the authentication stage, Feed-Forward Neural Network (FFNN) is used to verify individuals. After applying the two cancelable techniques on three public available ECG databases, experimental results show that the proposed system performs better regarding authentication and outperforms state-of-the-art techniques considered.


ECG Cancelable biometrics Improved Bio-Hashing Matrix operation FFNN 



The authors would like to thank Dr. Loris Nanni for his helpful advice in implementing the improved Bio-Hash algorithm. This work was supported by the National Nature Science Foundation of China (NSFC) Grant No. 61571165.

Compliance with ethical standards

Conflicts of interest

The authors declare that there is no conflict of interest regarding the publication of this article.


  1. 1.
    Albert A (1972) Regression and the moore-penrose pseudoinverse. Academic Press, New YorkzbMATHGoogle Scholar
  2. 2.
    Ang R, Safavi-Naini R, McAven LF (2005) Cancelable key-based fingerprint templates. In: Boyd C, Gonzalez Nieto JM (eds) Australasian Conference on Information Security and Privacy. Springer, Germany, pp 242–252Google Scholar
  3. 3.
    Bolle RM, Connell JH, Ratha NK (2002) Biometric perils and patches. Pattern Recogn 35(12):2727–2738zbMATHCrossRefGoogle Scholar
  4. 4.
    Connie T, Teoh A, Goh M, Ngo D (2005) Palmhashing: a novel approach for cancelable biometrics. Inf Process Lett 93(1):1–5MathSciNetCrossRefGoogle Scholar
  5. 5.
    Da Silva HP, Lourenço A, Fred A, Raposo N, Aires-de Sousa M (2014) Check your biosignals here: A new dataset for off-the-person ECG biometrics. Comput Methods Prog Biomed 113(2):503–514CrossRefGoogle Scholar
  6. 6.
    Damer N, Opel A, Nouak A (2013). Performance anchored score normalization for multi-biometric fusion. In: International Symposium on Visual Computing, Springer, pp. 68-75Google Scholar
  7. 7.
    Dey N, Nandi B, Dey M, Biswas D, Das A, Chaudhuri SS (2013) BioHash code generation from electrocardiogram features. In: IEEE 3rd International Advance Computing Conference (IACC). IEEE, GhaziabadGoogle Scholar
  8. 8.
    Dey M, Dey N, Mahata SK, Chakraborty S, Acharjee S, Das A (2014) Electrocardiogram feature based inter-human biometric authentication system. In: International Conference on Electronic Systems, Signal Processing and Computing Technologies. IEEE, Nagpur, pp 300–304Google Scholar
  9. 9.
    El-Khamy SE, Korany NO, El-Sherif MH (2017) A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and rsa encryption. Multimedia Tools and Applications 76(22):24091–24106CrossRefGoogle Scholar
  10. 10.
    Goldberger AL, Amaral LAN, Glass L, Hausdorff JM, Ivanov PC, Mark RG et al (2000) Physiobank, physiotoolkit, and physionet components of a new research resource for complex physiologic signals. Circulation 101(23):E215CrossRefGoogle Scholar
  11. 11.
    Islam MS, Alajlan N (2017) Biometric template extraction from a heartbeat signal captured from fingers. Multimedia Tools and Applications 76(10):12709–12733CrossRefGoogle Scholar
  12. 12.
    Islam S, Ammour N, Alajlan N, Abdullah-Al-Wadud M (2017) Selection of heart-biometric templates for fusion. IEEE Access 5:1753–1761CrossRefGoogle Scholar
  13. 13.
    Jain AK, Maltoni D, Miao D, Prabhakar A (2003) Handbook of fingerprint recognition. Springer-Verlag, New YorkGoogle Scholar
  14. 14.
    Jin ATB, Ling DNC, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245–2255CrossRefGoogle Scholar
  15. 15.
    Karegar FP, Fallah A, Rashidi S. (2017). Using recurrence quantification analysis and generalized hurst exponents of ECG for human authentication. In: Swarm Intelligence and Evolutionary Computation. IEEE, Kerman, pp 66–71Google Scholar
  16. 16.
    Kaur H, Khanna P (2016) Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimedia Tools and Applications 75(23):1–29CrossRefGoogle Scholar
  17. 17.
    Kaur H, Khanna P (2017) Cancelable features using log-Gabor filters for biometric authentication. Multimedia Tools and Applications 76(4):4673–4694CrossRefGoogle Scholar
  18. 18.
    Keshishzadeh S, Rashidi S (2015) A system of biometric authentication based on ECG signal segmentation. In: 22nd Iranian Conference on Electrical Engineering (ICEE), vol. 6. IEEE, Tehran, pp 1873–1877Google Scholar
  19. 19.
    Kim H, Nguyen MP, Chun SY (2017) Cancelable ECG biometrics using GLRT and performance improvement using guided filter with irreversible guide signal. In: 39th Annual International Conference of the IEEE Conf Proc IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, Seogwipo, pp 454–457Google Scholar
  20. 20.
    Leng L, Zhang J, Chen G, Khan MK, Alghathbar K (2011) Two-directional two-dimensional random projection and its variations for face and palmprint recognition. In: Murgante B, Gervasi O, Iglesias A, Taniar D, Apduhan BO (eds) Computational Science and Its Applications - ICCSA 2011. ICCSA 2011. Lecture Notes in Computer Science, vol 6786. Springer, BerlinGoogle Scholar
  21. 21.
    Leng L, Zhang J, Chen G, Khan MK, Bai P (2011) Two dimensional palmphasor enhanced by multi-orientation score level fusion. In: Park JJ, Lopez J, Yeo SS, Shon T, Taniar D (eds) Secure and Trust Computing, Data Management and Applications. STA 2011. Communications in Computer and Information Science, vol 186. Springer, Berlin, HeidelbergGoogle Scholar
  22. 22.
    Leng L, Zhang S, Bi X, Khan MK (2012) Two-dimensional cancelable biometric scheme. In: 2012 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR). IEEE, Xian, pp 164–169Google Scholar
  23. 23.
    Leng L, Li M, Teoh ABJ (2013) Conjugate 2DPalmHash code for secure palm-print-vein verification. In: International Congress on Image and Signal Processing, vol. 03. IEEE, Hangzhou, pp 1705–1710Google Scholar
  24. 24.
    Leng L, Teoh ABJ, Li M, Khan MK (2014) Analysis of correlation of 2dpalmhash code and orientation range suitable for transposition. Neurocomputing 131(9):377–387CrossRefGoogle Scholar
  25. 25.
    Leng L, Teoh ABJ, Li M, Khan MK (2015) Orientation range of transposition for vertical correlation suppression of 2dpalmphasor code. Multimedia Tools and Applications 74(24):11683–11701CrossRefGoogle Scholar
  26. 26.
    Li H, Tan J (2010) Heartbeat-driven medium-access control for body sensor networks. IEEE Trans Inf Technol Biomed 14(1):44–51CrossRefGoogle Scholar
  27. 27.
    Li L, Correia PL, Hadid A (2018) Face recognition under spoofing attacks: countermeasures and research directions. IET Biometrics 7(1):3–14CrossRefGoogle Scholar
  28. 28.
    Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recogn 40(3):1057–1065zbMATHCrossRefGoogle Scholar
  29. 29.
    Maio D, Nanni L (2005) Multihashing, human authentication featuring biometrics data and tokenized random number: A case study fvc2004. Neurocomputing 69(1):242–249CrossRefGoogle Scholar
  30. 30.
    Matlab, Neural Networks. [Online] Available from:
  31. 31.
    Mukhaiyar R, Dlay SS, Woo WL (2015) Cancellable biometric using matrix approaches. Newcastle University, Newcastle upon TyneGoogle Scholar
  32. 32.
  33. 33.
    Pan J, Tompkins WJ (1985) A real-time qrs detection algorithm. IEEE Trans Biomed Eng 32(3):230–236CrossRefGoogle Scholar
  34. 34.
    Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis & Machine. Intelligence 29(4):561Google Scholar
  35. 35.
    Sadhya D, Singh SK (2017) Design of a cancelable biometric template protection scheme for fingerprints based on cryptographic hash functions. Multimedia Tools and Applications 77(12):15113–15137Google Scholar
  36. 36.
    Safie SI, Soraghan JJ, Petropoulakis L (2011) Electrocardiogram (ECG) biometric authentication using pulse active ratio (par). IEEE Transactions on Information Forensics and Security 6(4):1315–1322CrossRefGoogle Scholar
  37. 37.
    Salloum R, Kuo CCJ (2017). ECG-based biometrics using recurrent neural networks. In: Acoustics, Speech and Signal Processing (ICASSP), 2017 IEEE International Conference on, IEEE, pp. 2062-2066Google Scholar
  38. 38.
    Singh YN, Singh SK (2012) Evaluation of electrocardiogram for biometric authentication. J Information Security 3(1):39–48CrossRefGoogle Scholar
  39. 39.
    Singla SK, Sharma A (2010) ECG as biometric in the automated world. International Journal of Computer Science and Communication 1(2):281–283Google Scholar
  40. 40.
    Teoh ABJ, Goh A, Ngo DCL (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892–1901CrossRefGoogle Scholar
  41. 41.
    Teoh AB, Kuan YW, Lee S (2008) Cancellable biometrics and annotations on biohash. Pattern Recogn 41(6):2034–2044zbMATHCrossRefGoogle Scholar
  42. 42.
    Teoh ABJ, Yip WK, Toh KA (2010) Cancellable biometrics and user dependent multi-state discretization in biohash. Pattern Anal Applic 13(3):301–307MathSciNetCrossRefGoogle Scholar
  43. 43.
    Van Driest SL, Wells QS, Stallings S, Bush WS, Gordon A, Nickerson DA et al (2016) Association of arrhythmia-related genetic variants with phenotypes documented in electronic medical records. JAMA 315(1):47–57CrossRefGoogle Scholar
  44. 44.
    Wyant RS, Nedjah N, Mourelle LM (2017) Efficient biometric palm-print matching on smart-cards. Multimedia Tools and Applications 8584(21):1–31Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyHarbin Institute of TechnologyHarbinChina
  2. 2.Faculty of Computers and InformationMenoufia UniversityMenoufiaEgypt

Personalised recommendations