Transparent authentication: utilising heart rate for user authentication

Timibloudi S. Enamamu , Nathan Clarke, Paul Haskell-Dowland, Fudong Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

200 Downloads (Pure)

Abstract

There has been exponential growth in the use of wearable technologies in the last decade with smart watches having a large share of the market. Smart watches were primarily used for health and fitness purposes but recent years have seen a rise in their deployment in other areas. Recent smart watches are fitted with sensors with enhanced functionality and capabilities. For example, some function as standalone device with the ability to create activity logs and transmit data to a secondary device. The capability has contributed to their increased usage in recent years with researchers focusing on their potential. This paper explores the ability to extract physiological data from smart watch technology to achieve user authentication. The approach is suitable not only because of the capacity for data capture but also easy connectivity with other devices - principally the Smartphone. For the purpose of this study, heart rate data is captured and extracted from 30 subjects continually over an hour. While security is the ultimate goal, usability should also be key consideration. Most bioelectrical signals like heart rate are non-stationary time-dependent signals therefore Discrete Wavelet Transform (DWT) is employed. DWT decomposes the bioelectrical signal into n level sub-bands of detail coefficients and approximation coefficients. Biorthogonal Wavelet (bior 4.4) is applied to extract features from the four levels of detail coefficents. Ten statistical features are extracted from each level of the coffecient sub-band. Classification of each sub-band levels are done using a Feedforward neural Network (FF-NN). The 1st, 2nd, 3rd and 4th levels had an Equal Error Rate (EER) of 17.20%, 18.17%, 20.93% and 21.83% respectively. To improve the EER, fusion of the four level sub-band is applied at the feature level. The proposed fusion showed an improved result over the initial result with an EER of 11.25% As a one-off authentication decision, an 11% EER is not ideal, its use on a continuous basis makes this more than feasible in practice.
Original languageEnglish
Title of host publication12th International Conference for Internet Technology and Secured Transactions
Subtitle of host publicationICITST 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages283-289
ISBN (Electronic)978-1-908320-93-3
ISBN (Print)978-1-5386-0598-1
DOIs
Publication statusPublished - 10 May 2018
Event12th International Conference for Internet Technology and Secured Transactions - Cambridge, United Kingdom
Duration: 10 Dec 201714 Dec 2017

Conference

Conference12th International Conference for Internet Technology and Secured Transactions
Abbreviated titleICITST 2017
Country/TerritoryUnited Kingdom
CityCambridge
Period10/12/1714/12/17

Fingerprint

Dive into the research topics of 'Transparent authentication: utilising heart rate for user authentication'. Together they form a unique fingerprint.

Cite this