Preliminary Study of Novel Bio-Crypto Key Generation Using Clustering-Based Binarization of ECG Features
Abstract
:1. Introduction
2. Materials and Methods
2.1. Dataset
2.1.1. ECG-ID Dataset
2.1.2. Experimental Dataset
2.2. Basic Process
2.2.1. Noise Removal and Fiducial Point Detection
2.2.2. Normalization
2.2.3. Heartbeat Outlier Detection and Removal
- We generated an ECG template () using the entire ECG beat () extracted from the ECG record through Equation (1).
- Outliers () were detected using Equation (2).
- Following removal of the detected ECG beats, we selected three ECG beats and applied Equation (3). Subsequently, the resulting ensemble beat () was used in the feature extraction process.
2.2.4. Widely Employed Feature Detection
2.3. Personalized Dynamic Quantization
2.3.1. Proposed Scheme
2.3.2. Feature Selection
- Selecting the subject from the experimental DB as the representative example, we extract the feature data () and the corresponding number of feature sets () (Equation (5)).
- Control group feature data () are randomly extracted from the open ECG-ID DB, corresponding to (Equation (6)).Here, is the feature set extracted from a single heartbeat.
- Subsequently, the two feature data sets from the previous steps are combined and furnished as input () to the ReliefF algorithm (Equation (7)).
- Within the ReliefF algorithm (, the weight assigned to each feature is iteratively updated. This involves identifying the nearest neighbor within the same class and the closest neighbor from the other classes for each data instance.
- The most distinguishing features for each individual are selected based on these recalibrated weights. The top 10 features () are chosen and designated as the individual’s unique feature set (Equation (8)).
- These top feature indexes for each participant are securely stored within their ID to be subsequently accessed during the registration and authentication phases and employed in reconstructing the encryption key.
2.3.3. Clustering Model
2.3.4. Bit Quantization
2.4. Bio-Key Generation
2.4.1. Fuzzy Extractor-Based Key Generation
2.4.2. Enrollment Process
2.4.3. Authentication Process
2.4.4. Performance Assessment
3. Results
3.1. Assessment of Dynamic Quantization Effectiveness
3.1.1. Binarization Performance Indicators
3.1.2. Comparative Analysis of Clustering-Based Dynamic Quantization
3.2. Evaluation of Bio-Key Randomness as a Cryptograph Key
3.2.1. Randomness Indicators
3.2.2. Results of Randomness for a Bio-Key
3.3. Personal Authentication Performance of the Bio-Key
3.3.1. Authentication Performance Indicators
3.3.2. Bio-Key-Based Authentication Results
- For k = 2, k = 4, and k = [2, 4], the average accuracies were 72%, 89%, and 88%, respectively. Among these, k = [2, 4] exhibited a balanced performance in FAR and FRR compared to other k values and is optimal.
- With k = [2, 4] fixed, evaluation under optimal cluster selection conditions revealed that outperformed by an average of 11% in accuracy, 14% in FAR, and 2% in FRR, indicating that is optimal.
- As increases, FRR performance improves, but ACC performance decreases. Considering the balance across all three indicators, = 0.05 is optimal.
4. Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Huhn, S.; Axt, M.; Gunga, H.-C.; Maggioni, M.A.; Munga, S.; Obor, D.; Sié, A.; Boudo, V.; Bunker, A.; Sauerborn, R. The impact of wearable technologies in health research: Scoping review. JMIR Mhealth Uhealth 2022, 10, e34384. [Google Scholar] [CrossRef] [PubMed]
- Vijayan, V.; Connolly, J.P.; Condell, J.; McKelvey, N.; Gardiner, P. Review of wearable devices and data collection considerations for connected health. Sensors 2021, 21, 5589. [Google Scholar] [CrossRef] [PubMed]
- Ankur; Bharti, M.R. ECG Biometric Recognition by Convolutional Neural Networks with Transfer Learning Using Random Forest Approach. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications, Aizawl, India, 18–19 June 2022; pp. 177–189. [Google Scholar]
- Hwang, H.B.; Kwon, H.; Chung, B.; Lee, J.; Kim, I.Y. ECG authentication based on non-linear normalization under various physiological conditions. Sensors 2021, 21, 6966. [Google Scholar] [CrossRef]
- Moosavi, S.R. PPG-KeyGen: Using photoplethysmogram for key generation in wearable devices. Procedia Comput. Sci. 2021, 184, 291–298. [Google Scholar] [CrossRef]
- Zhang, J.; Zheng, Y.; Xu, W.; Chen, Y. H2K: A heartbeat-based key generation framework for ECG and PPG signals. IEEE Trans. Mob. Comput. 2021, 22, 923–934. [Google Scholar] [CrossRef]
- Dantcheva, A.; Elia, P.; Ross, A. What else does your biometric data reveal? A survey on soft biometrics. IEEE Trans. Inf. Forensics Secur. 2015, 11, 441–467. [Google Scholar] [CrossRef]
- Boulkenafet, Z.; Komulainen, J.; Hadid, A. Face Spoofing Detection Using Colour Texture Analysis. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1818–1830. [Google Scholar] [CrossRef]
- Chugh, T.; Cao, K.; Jain, A.K. Fingerprint Spoof Buster: Use of Minutiae-Centered Patches. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2190–2202. [Google Scholar] [CrossRef]
- Gupta, P.; Behera, S.; Vatsa, M.; Singh, R. On Iris Spoofing Using Print Attack. In Proceedings of the 2014 22nd International Conference on Pattern Recognition, Stockholm, Sweden, 24–28 August 2014; pp. 1681–1686. [Google Scholar]
- Cho, K.; Chung, B. Lightweight biometric key agreement scheme for secure body sensor networks. Int. J. Commun. 2016, 1, 218–222. [Google Scholar]
- Lin, Q.; Xu, W.; Liu, J.; Khamis, A.; Hu, W.; Hassan, M.; Seneviratne, A. H2B: Heartbeat-based secret key generation using piezo vibration sensors. In Proceedings of the 18th International Conference on Information Processing in Sensor Networks, Montreal, QC, Canada, 16–18 April 2019; pp. 265–276. [Google Scholar]
- Karimian, N.; Guo, Z.; Tehranipoor, M.; Forte, D. Highly reliable key generation from electrocardiogram (ECG). IEEE Trans. Biomed. Eng. 2016, 64, 1400–1411. [Google Scholar] [CrossRef]
- Bellare, M.; Yee, B. Forward-security in private-key cryptography. In Proceedings of the Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA Conference 2003, San Francisco, CA, USA, 13–17 April 2003; pp. 1–18. [Google Scholar]
- Moosavi, S.R.; Nigussie, E.; Levorato, M.; Virtanen, S.; Isoaho, J. Low-latency approach for secure ECG feature based cryptographic key generation. IEEE Access 2017, 6, 428–442. [Google Scholar] [CrossRef]
- Goldberger, A.L.; Amaral, L.A.; Glass, L.; Hausdorff, J.M.; Ivanov, P.C.; Mark, R.G.; Mietus, J.E.; Moody, G.B.; Peng, C.-K.; Stanley, H.E. PhysioBank, PhysioToolkit, and PhysioNet: Components of a new research resource for complex physiologic signals. Circulation 2000, 101, e215–e220. [Google Scholar] [CrossRef]
- Lugovaya, T.S. Biometric Human Identification Based on Electrocardiogram. Master’s Thesis, Faculty of Computing Technologies and Informatics, Electrotechnical University ‘LETI’, Saint-Petersburg, Russia, 2005. [Google Scholar]
- Martínez, J.P.; Almeida, R.; Olmos, S.; Rocha, A.P.; Laguna, P. A wavelet-based ECG delineator: Evaluation on standard databases. IEEE Trans. Biomed. Eng. 2004, 51, 570–581. [Google Scholar] [CrossRef]
- Tan, R.; Perkowski, M. Toward improving electrocardiogram (ECG) biometric verification using mobile sensors: A two-stage classifier approach. Sensors 2017, 17, 410. [Google Scholar] [CrossRef]
- Kononenko, I.; Šimec, E.; Robnik-Šikonja, M. Overcoming the myopia of inductive learning algorithms with RELIEFF. Appl. Intell. 1997, 7, 39–55. [Google Scholar] [CrossRef]
- Rousseeuw, P.J. Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 1987, 20, 53–65. [Google Scholar] [CrossRef]
- Dodis, Y.; Ostrovsky, R.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 2008, 38, 97–139. [Google Scholar] [CrossRef]
- Camara, C.; Peris-Lopez, P.; Martín, H.; Aldalaien, M.a. ECG-RNG: A random number generator based on ECG signals and suitable for securing wireless sensor networks. Sensors 2018, 18, 2747. [Google Scholar] [CrossRef] [PubMed]
- Labati, R.D.; Piuri, V.; Sassi, R.; Scotti, F.; Sforza, G. Adaptive ECG biometric recognition: A study on re-enrollment methods for QRS signals. In Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Orlando, FL, USA, 9–12 December 2014; pp. 30–37. [Google Scholar]
- Labati, R.D.; Sassi, R.; Scotti, F. ECG biometric recognition: Permanence analysis of QRS signals for 24 hours continuous authentication. In Proceedings of the 2013 IEEE International Workshop On information Forensics and Security (WIFS), Guangzhou, China, 18–21 November 2013; pp. 31–36. [Google Scholar]
- Zhang, X.; Parhi, K.K. High-speed VLSI architectures for the AES algorithm. IEEE Trans. Very Large Scale Integr. VLSI Syst. 2004, 12, 957–967. [Google Scholar] [CrossRef]
- Gilbert, H.; Handschuh, H. Security analysis of SHA-256 and sisters. In Proceedings of the International Workshop on Selected Areas in Cryptography, Ottawa, ON, Canada, 14–15 August 2003; pp. 175–193. [Google Scholar]
- Moriarty, K.; Kaliski, B.; Rusch, A. PKCS# 5: Password-Based Cryptography Specification Version 2.1; Technical Report; IETF: Fremont, CA, USA, 2017. [Google Scholar]
- Almuzaini, K.K.; Sinhal, A.K.; Ranjan, R.; Goel, V.; Shrivastava, R.; Halifa, A. Key Aggregation Cryptosystem and Double Encryption Method for Cloud-Based Intelligent Machine Learning Techniques-Based Health Monitoring Systems. Comput. Intell. Neurosci. 2022, 2022, 3767912. [Google Scholar] [CrossRef] [PubMed]
- Thaenkaew, P.; Quoitin, B.; Meddahi, A. Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs. Sensors 2023, 23, 9172. [Google Scholar] [CrossRef] [PubMed]
- Altop, D.K.; Levi, A.; Tuzcu, V. Towards using physiological signals as cryptographic keys in body area networks. In Proceedings of the 2015 9th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth), Istanbul, Turkey, 20–23 May 2015; pp. 92–99. [Google Scholar]
- González-Manzano, L.; de Fuentes, J.M.; Peris-Lopez, P.; Camara, C. Encryption by Heart (EbH)—Using ECG for time-invariant symmetric key generation. Future Gener. Comput. Syst. 2017, 77, 136–148. [Google Scholar] [CrossRef]
- Arteaga-Falconi, J.S.; Al Osman, H.; El Saddik, A. ECG authentication for mobile devices. IEEE Trans. Instrum. Meas. 2015, 65, 591–600. [Google Scholar] [CrossRef]
- Ingale, M.; Cordeiro, R.; Thentu, S.; Park, Y.; Karimian, N. Ecg biometric authentication: A comparative analysis. IEEE Access 2020, 8, 117853–117866. [Google Scholar] [CrossRef]
- Matthews, J.; Kim, J.; Yeo, W.H. Advances in Biosignal Sensing and Signal Processing Methods with Wearable Devices. Anal. Sens. 2023, 3, e202200062. [Google Scholar] [CrossRef]
Category | Features | |||||
---|---|---|---|---|---|---|
Amplitude | 1 | ST amplitude | 2 | RS amplitude | 3 | RQ amplitude |
4 | PQ amplitude | 5 | PR amplitude | 6 | RT amplitude | |
7 | PS amplitude | 8 | PT amplitude | 9 | QT amplitude | |
Duration | 10 | QS interval | 11 | QR interval | 12 | RS interval |
13 | PR interval | 14 | RT interval | 15 | ST interval | |
16 | PQ interval | 17 | PT interval | 18 | QT interval | |
Slope, Distance, and Area | 19 | PR slop | 20 | PQ slop | 21 | QS slop |
22 | ST slop | 23 | RT slop | 24 | PR distance | |
25 | PQ distance | 26 | QS distance | 27 | ST distance | |
28 | RT distance | 29 | QRS area |
Method | Total Seeds | Error Seeds | Error Seed Rate | Error Bits | Error Bit Rate |
---|---|---|---|---|---|
[N] | [N] | [%] | [N] | [%] | |
Camara et al. [23] | 531 | 531 | 100 | 64.53 | 42.45 |
(L = 152 bits) | |||||
Proposed Method | 531 | 34 | 6.4 | 6.03 | 15.04 |
(L = n-bits) |
Method | Min Entropy | Shannon Entropy | F-Test | B-Test | R-Test | L-Test |
---|---|---|---|---|---|---|
[-] | [-] | 0 Bit/1 Bit [%] | [p Value] | [p Value] | [p Value] | |
Camara et al. [23] | 0.53 | 0.89 | 41.95/58.05 | 0.41 | 0.63 | 0.58 |
Proposed Method | 0.77 | 0.96 | 44.77/55.23 | 0.53 | 0.50 | 0.63 |
Proposed Method + Fuzzy Extractor | 0.88 | 0.99 | 51.88/48.12 | 0.56 | 0.70 | 0.63 |
Accuracy | FAR | FRR | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
(Hamming Error Bit Ratio) | ||||||||||||||||
Criteria | k | 0.01 | 0.03 | 0.05 | 0.07 | 0.09 | 0.01 | 0.03 | 0.05 | 0.07 | 0.09 | 0.01 | 0.03 | 0.05 | 0.07 | 0.09 |
(Max Silhouette Score) | 2 | 0.77 | 0.71 | 0.69 | 0.67 | 0.64 | 0.24 | 0.31 | 0.33 | 0.36 | 0.4 | 0.11 | 0.09 | 0.04 | 0.04 | 0.01 |
4 | 0.91 | 0.91 | 0.89 | 0.88 | 0.87 | 0.08 | 0.1 | 0.11 | 0.13 | 0.14 | 0.15 | 0.09 | 0.09 | 0.07 | 0.06 | |
[2, 4] | 0.87 | 0.86 | 0.83 | 0.77 | 0.77 | 0.13 | 0.15 | 0.18 | 0.25 | 0.31 | 0.13 | 0.1 | 0.06 | 0.04 | 0.01 | |
(Uniformity Silhouette Score) | 2 | 0.81 | 0.79 | 0.74 | 0.7 | 0.67 | 0.2 | 0.22 | 0.28 | 0.32 | 0.36 | 0.1 | 0.09 | 0.05 | 0.07 | 0.03 |
4 | 0.91 | 0.89 | 0.88 | 0.86 | 0.85 | 0.08 | 0.09 | 0.12 | 0.14 | 0.15 | 0.14 | 0.23 | 0.1 | 0.1 | 0.07 | |
[2, 4] | 0.96 | 0.96 | 0.95 | 0.92 | 0.9 | 0.03 | 0.04 | 0.05 | 0.07 | 0.1 | 0.08 | 0.08 | 0.02 | 0.03 | 0.02 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hwang, H.B.; Lee, J.; Kwon, H.; Chung, B.; Lee, J.; Kim, I.Y. Preliminary Study of Novel Bio-Crypto Key Generation Using Clustering-Based Binarization of ECG Features. Sensors 2024, 24, 1556. https://doi.org/10.3390/s24051556
Hwang HB, Lee J, Kwon H, Chung B, Lee J, Kim IY. Preliminary Study of Novel Bio-Crypto Key Generation Using Clustering-Based Binarization of ECG Features. Sensors. 2024; 24(5):1556. https://doi.org/10.3390/s24051556
Chicago/Turabian StyleHwang, Ho Bin, Jeyeon Lee, Hyeokchan Kwon, Byungho Chung, Jongshill Lee, and In Young Kim. 2024. "Preliminary Study of Novel Bio-Crypto Key Generation Using Clustering-Based Binarization of ECG Features" Sensors 24, no. 5: 1556. https://doi.org/10.3390/s24051556
APA StyleHwang, H. B., Lee, J., Kwon, H., Chung, B., Lee, J., & Kim, I. Y. (2024). Preliminary Study of Novel Bio-Crypto Key Generation Using Clustering-Based Binarization of ECG Features. Sensors, 24(5), 1556. https://doi.org/10.3390/s24051556