Biometric Applications of One-Dimensional Physiological Signals – Electrocardiograms
نویسندگان
چکیده
In the last decade, affordable computing power has become available on platforms intended for low-power, mobile applications. For example, Gumstix Overo products integrate WiFi/Bluetooth connectivity, microSD storage, and 600 MHz Texas Instruments OMAP (Open Multimedia Application Platform) 35xx processors with up to 256 MB of flash memory/SDRAM, offering laptop-like resources and performance in a form factor of a stick of gum (Chaoui, et al., 2001). This speaks to the potential for wearable, wireless medical devices based on such products to process signals on-board; functionality that previously required expensive, bulky, benchtop/bedside equipment. These computational capabilities also show promise for smart devices that implement context-based intelligence and ondevice expert systems for clinical decision making. This move toward highly-capable and intelligent mobile medical devices drives the need for verification tools, data integrity checkers, and role-based security mechanisms that can also be implemented at the embedded level, since the potential usage scenarios and associated protection needs are numerous in comparison with legacy medical device applications in controlled hospital and home care settings. For example, many implementations of personal and body area networks have been developed to facilitate ambulatory monitoring of health status, where physiological parameters such as heart rate, heart activity, blood oxygen saturation, and respiration rate can be gathered through the use of mobile, wearable electrocardiographs and pulse oximeters (Jovanov, et al., 2009; Galeottei, et al., 2008; Chuo, et al., 2010). These data need to be authenticated and checked for integrity before they are stored in electronic patient records, which implies the need for “owner-aware” devices that verify user identity as part of the data acquisition process (Warren, et al., 2005; Warren & Jovanov, 2006). Many biometric authentication protocols are computationally intensive and can well-utilize the emerging computational capabilities of low-power mobile devices. A broad range of biomedical data, from physiological signals/images to behavioral traits, has been explored for its biometric authentication and identification potential (Biel, et al., 2001; Chan, et al., 2008; Doi & Yamanaka, 2004; Duc, et al., 1997; Elsherief, et al., 2006; Faundez-Zanuy, 2005; Irvine, et al., 2001; Israel, et al., 2005; Shen, et al., 2002; Sullivan, et al., 2007; Yao & Wan, 2010; G. H. Zhang, et al., 2009). Image-based mechanisms that assess
منابع مشابه
Translation Invariant Approach for Measuring Similarity of Signals
In many signal processing applications, an appropriate measure to compare two signals plays a fundamental role in both implementing the algorithm and evaluating its performance. Several techniques have been introduced in literature as similarity measures. However, the existing measures are often either impractical for some applications or they have unsatisfactory results in some other applicati...
متن کاملTranslation Invariant Approach for Measuring Similarity of Signals
In many signal processing applications, an appropriate measure to compare two signals plays a fundamental role in both implementing the algorithm and evaluating its performance. Several techniques have been introduced in literature as similarity measures. However, the existing measures are often either impractical for some applications or they have unsatisfactory results in some other applicati...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملThree-dimensional reconstruction of New Zealand rabbit antebrachium by multidetector computed tomography
The aim of this study was to reveal biometric peculiarities of New Zealand white rabbit antebrachium (radius and ulna) by means of three-dimensional (3D) reconstruction of multidetector computed tomography (MDCT) images. Under general anesthesia, the antebrachiums of a total of sixteen rabbits of both sexes were scanned with a general diagnostic MDCT. Biometric measurements of the reconstructed...
متن کاملبازشناسی خودکار حالت عاطفی مبتنی بر تغییرات فیزیولوژیک
Recently, automatic affective state recognition has been noteworthy for improving Human Computer Interaction (HCI), clinical researches and other various applications. Little attention has been paid so far to physiological signals for affective state recognition compared to audio-visual methods. Different affective states stimulate the Autonomic Nervous System (ANS) and lead to changes in physi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012