The present invention generally relates to biometrics, and more particularly, to systems and methods for performing biometric authentication.
A variety of approaches exist for performing biometric authentication, which is authentication based on images of human biometric features, such as fingerprints, the iris and palm veins, for example. Each of the known approaches has distinct advantages, but also significant defects. Authentication methods based on fingerprint images are the most widely adopted methods of biometric authentication, and are employed in most smart phones. Such methods utilize scanned images of fingerprints, which can be acquired using many different types of equipment, and features that are extracted from the scanned images. The extracted features are encoded into unique sequences for different users.
One problem associated with fingerprint authentication systems is that, because they are based on image recognition, live-tissue verification is a major drawback. In other words, with only a small amount of tampering to the system, one can use an image (e.g., a photograph) of an authorized user's fingerprint for the authentication procedure. There is no way for the system to distinguish between a real fingerprint and an image of the fingerprint. The second problem is that fingerprints are easy to duplicate. Software exists that can extract fingerprints from an image of the finger acquired from a particular viewpoint. This largely undermines the security of the authentication system. Another problem is that the system may not recognize the authorized user's fingerprint if the finger is wet or stained, which can lead to the need for regular submissions of new data.
Iris image authentication systems and methods are very accurate compared to other biometric authentication systems and methods. Such systems and methods involve the use of specific feature extraction algorithms to extract features from images of the iris. During the authentication process, unique patterns in a scanned iris image are compared to features extracted from the authorized user's iris. One of the problems associated with such systems is that the processing time for the comparison is longer than that of other authentication methods due to the complex nature of the image feature patterns. Another problem associated with such systems is that they are very expensive. Yet another problem associated with such systems is the aforementioned live-tissue verification problem, i.e., the system cannot discern the difference between a real iris and an image of an iris.
Palm vein image authentication is a relatively new type of biometric authentication. The image is captured using a near-infrared (NIR) camera. The features are extracted from the acquired images and then compared to the stored features of the authorized users. The main problem with this approach is the aforementioned live-tissue verification problem.
Biometric authentication techniques based on photoplethysmogram (PPG) signals have been proposed for many years. PPG signals are signals acquired using non-invasive methods such as pulse oximetry. A pulse oximeter illuminates the skin and measures a change in light absorption between the emitted light and the reflected light. Compared to the other biometric authentication approaches described above, PPG signals are relatively easy to acquire, relatively difficult to duplicate, and can be adaptively updated. These qualities make PPG signals well suited for biometric authentication. However, most of the proposed PPG authentication techniques utilize fiducial features, which are time-domain-based features, resulting in performance that is less than ideal and not very robust.
A need exists for a biometric authentication system that overcomes the problems associated with the known biometric authentication methods and systems.
The example embodiments are best understood from the following detailed description when read with the accompanying drawing figures. It is emphasized that the various features are not necessarily drawn to scale. In fact, the dimensions may be arbitrarily increased or decreased for clarity of discussion. Wherever applicable and practical, like reference numerals refer to like elements.
Representative embodiments described herein are directed to a biometric authentication system and method that are based on PPG signals acquired using non-invasive methods, such as pulse oximetry, for example. As indicated above, compared to the other biometric authentication approaches described above, PPG signals are relatively easy to acquire, relatively difficult to duplicate, and can be adaptively updated, which are qualities that make them well suited for biometric authentication. However, PPG signals are often corrupted by motion artifacts (MAs) due to the unique measurement technique, i.e., placement of a sensor close to the skin. Embodiments described herein overcome the MA issue to provide a PPG-based biometric authentication solution that is robust and that can be implemented relatively easily and cost effectively.
In accordance with a representative embodiment, PPG signals are acquired, filtered by a relatively simple filtering algorithm and then processed by an MA removal algorithm that tailors the PPG signals to remove MA from the PPG signals prior to using them for authentication.
In accordance with a representative embodiment, after the MA removal algorithm has been performed, a number of templates of the same length are extracted for each individual, or subject, to be authenticated. The extracted templates for each individual are then combined into one single template, which results in one template for each authorized user. Subsequent to generating the templates, a multiwavelet decomposition algorithm is performed on the templates to convert them into a sequence of feature numbers. The feature numbers are used as an input for a machine learning architecture. The training data for each individual is measured in a relatively short period of time, while the testing data is measured in an even shorter period of time, which makes it comparable in authentication speed with other biometric systems and methods.
Experiments were carried out using publicly-available data on forty-two subjects and using data on three subjects measured by the inventors with an oximeter. The overall performance was found to be comparable to other biometric authentication systems and superb (less than 1% of false rejection and false acceptance rate) compared to the existing methods and systems for PPG-based authentication in terms of both the accuracy of the authentication and the length of data required.
Besides the relatively ease of implementation and the robustness of the authentication system and method disclosed herein, PPG signals can be used to simultaneously achieve continuous authentication and health status monitoring. These features are not available with any other biometric authentication systems and methods.
A few representative embodiments of the system and method that provide such an EA solution will now be described with reference to
In the following detailed description, for purposes of explanation and not limitation, exemplary, or representative, embodiments disclosing specific details are set forth in order to provide a thorough understanding of inventive principles and concepts. However, it will be apparent to one of ordinary skill in the art having the benefit of the present disclosure that other embodiments according to the present teachings that are not explicitly described or shown herein are within the scope of the appended claims. Moreover, descriptions of well-known apparatuses and methods may be omitted so as not to obscure the description of the exemplary embodiments. Such methods and apparatuses are clearly within the scope of the present teachings, as will be understood by those of skill in the art. It should also be understood that the word “example,” as used herein, is intended to be non-exclusionary and non-limiting in nature.
The terminology used herein is for purposes of describing particular embodiments only, and is not intended to be limiting. The defined terms are in addition to the technical, scientific, or ordinary meanings of the defined terms as commonly understood and accepted in the relevant context.
The terms “a,” “an” and “the” include both singular and plural referents, unless the context clearly dictates otherwise. Thus, for example, “a device” includes one device and plural devices. The terms “substantial” or “substantially” mean to within acceptable limits or degrees acceptable to those of skill in the art. For example, the term “substantially parallel to” means that a structure or device may not be made perfectly parallel to some other structure or device due to tolerances or imperfections in the process by which the structures or devices are made. The term “approximately” means to within an acceptable limit or amount to one of ordinary skill in the art. Relative terms, such as “over,” “above,” “below,” “top,” “bottom,” “upper” and “lower” may be used to describe the various elements' relationships to one another, as illustrated in the accompanying drawings. These relative terms are intended to encompass different orientations of the device and/or elements in addition to the orientation depicted in the drawings. For example, if the device were inverted with respect to the view in the drawings, an element described as “above” another element, for example, would now be below that element.
Relative terms may be used to describe the various elements' relationships to one another, as illustrated in the accompanying drawings. These relative terms are intended to encompass different orientations of the device and/or elements in addition to the orientation depicted in the drawings.
The term “memory” or “memory device”, as those terms are used herein, are intended to denote a non-transitory computer-readable storage medium that is capable of storing computer instructions, or computer code, for execution by one or more processors. References herein to “memory” or “memory device” should be interpreted as one or more memories or memory devices. The memory may, for example, be multiple memories within the same computer system. The memory may also be multiple memories distributed amongst multiple computer systems or computing devices.
A “processor,” “processing device,” or “processing logic,” as those terms are used herein, encompass at least one electronic device that is configured to perform one or more processing algorithms that process signals. The electronic device(s) may perform the algorithm(s) in hardware, software or firmware, or a combination thereof. References herein to a system comprising “a processor” or “a processing device” or “processing logic” should be interpreted as one or more processors or processing cores. The processor may, for instance, be a multi-core processor. A processor may also refer to a collection of processors within a single computer system or distributed amongst multiple computer systems. The term “computer,” as that term is used herein, should be interpreted as possibly referring to a single computer or computing device or to a collection or network of computers or computing devices, each comprising a processor or processors. Instructions of a computer program can be performed by a single computer or processor or by multiple processors that may be within the same computer or that may be distributed across multiple computers.
Because motion artifacts (MAs) can cause serious problems in PPG signal processing, the detection and elimination (or mitigation) of MAs are important when PPG signals are used to measure biological information. In accordance with a representative embodiment, the method includes an MA detection method having three major stages: (i) optimal window-size determination, (ii) short-time variance extraction, and (iii) transition detection.
Usually the PPG signal waveforms appear to be very different across subjects. Therefore, using a subject-independent window-size (constant short-time window-length) is non-optimal when one needs to subsequently acquire robust variance features. In fact, the optimal window-size should be “subject-dependent,” which means it should depend on the individual subject's signal characteristics. In accordance with a representative embodiment, an unsupervised (no training is necessary) subject-dependent window-size determination technique is used to search for the “optimal” window-size. In accordance with a representative embodiment, a robustness feature, referred to herein as a short-time variance, is utilized for MA detection because the associated computational burden is very light. The transition points (at which there appears to be a change from the regular signal to the motion artifact, or vice versa) can thus be located by comparing the short-time variances with an appropriate threshold.
Once the artifact intervals are spotted accordingly, the corresponding artifact signal data can be tailored (mitigated or eliminated completely from the original (raw) signal waveform by employing the aforementioned MA removal algorithm. In accordance with a representative embodiment, the MA removal algorithm comprises the following. The short-time variance is the underlying feature for motion-artifact detection. The short-time variance, which is a function of window-size, M, can be formulated as the result from a mapping from the original PPG signal sequence x(n), n=0, 1, 2, . . . :
x(n)γμM(m), m=0, 1, 2, . . . , (1)
where
n denotes the original signal sample index, m denotes the sliding-window index, μ denotes the window forward size, and
The manner in which the optimal window size M may be determined will be presented next. According to previous experience of the inventors in ultrasonic signal processing, a nonlinear program can be facilitated to find the optimal window size M. The “smoothness” of the variance sequence γμM(m) is the objective function while the “compact-support” requirement corresponds to the nonlinear constraint. The compact-support requirement implies a steep-transitioned variance sequence γμM(m). A kurtosis function ϰ[γμM(m)] can be used to define such a constrained optimization problem. Define
The kurtosis of the short-time variances γμM(m) can be formulated as:
ϰ[γμM(m)]4/22. (7)
Note that pm sequence in Eq. (4) can satisfy the probability axioms. It has been proved that ϰ[γμM(m)] is μ-multiple-shift invariant. That is, one can start a sliding window to sample data at any time instant and the optimal window-size will remain the same. In other words, the present method is resilient against the onset ambiguity.
Define the kurtosis-sensitivity with respect to M as
According to Eqs. (1)-(8), the optimal window-size M can thus be determined from the following nonlinear program:
M
opt=max(M)
subject to
S(M)<, (9)
where is a pre-set upper-bound for the kurtosis-sensitivity constraint function. After the optimal window-size is determined according to Eq. (9), the detection of motion artifacts can take place thereby. After the detection of segments pertinent to motion artifacts is carried out throughout the entire PPG signal sequence, we denote the collection of the detected transition-points (the occasions of the transitions from the regular signal to a motion artifact and vice versa) by {[t1, τ1], [t2, τ2], . . . , [ti, τi], . . . }. Thus, we can represent the ith detected motion-artifact signal segment Ω(n) by
Note that when Ωi(n)=x(n), the corresponding signal samples carry “useless” information (or no measurement should be taken at the corresponding time instant n). Therefore, the “tailored” signal sequence x′(n) can be expressed as
x′(n)x(n)−ΣiΩi(n). (11)
If we convert (tailor) x(n) to x′(n), the original waveform of the PPG signal can be preserved, but other existing spectrum-based methods fail to do so. When x′(n)=0, the PPG signal is tailored or eliminated, such zero-valued signal samples x′(n) should be thrown out without any further use. That is, one should “stop” sampling the motion-artifact segments because no accurate information can be extracted from those data. Henceforth, the tailored signal sequence x′(n) can be further processed for the fast SpO2 computation in addition to the heart-beat rate tracking and other relevant physiological information-retrieval.
Sub-block 3a of block 3 represents the aforementioned MA removal algorithm. As indicated above, in accordance with this representative embodiment, after the MAs have been removed or at least mitigated in the manner described above, the signal is further processed to extract templates for the machine learning algorithm. In accordance with a representative embodiment, the template extraction process includes five parts, namely, peak detection 3b, outlier elimination 3c, window-size determination 3d, template extraction 3e and template length normalization 3f. It should be noted, however, that a variety of configurations other than what is shown in block 3 may be used to perform MA removal and template extraction, as will be understood by one of skill in the art in view of the description provided herein.
After the template extraction processing has been performed, a multiwavelet decomposition algorithm, represented by block 5, preferably is performed on the extracted templates to obtain extracted multiwavelet coefficients. The extracted multiwavelet coefficients are used as the input feature for an autoencoder, which is a multilayer perceptron (MLP) in accordance with a representative embodiment. It should be noted, however, that autoencoders other than an MLP are suitable for use in the system 1.
Denoting the set of all authorized users as ={1, 2, 3, . . . , k, . . . , K} and the tailored signal for each authorized user as xk(n), the ′ can be dropped from Eq. (11) for the simplicity of expression. In accordance with an embodiment, the peak detection algorithm 3b is performed using the derivative-based method, although a variety of peak detection algorithms may be used for this purpose. A peak for the tailored signal of authorized user k, denoted as pik, i=1, 2, 3, . . . , is defined as the point where the sign of the derivative of the signal changes from positive to negative. The derivative-based method usually performs well when the noise level of the signal is relatively low. Otherwise, many spurious peaks may be found. PPG signals are less noisy compared to other real-life signals because the noise can be easily removed by a bandpass filter with passband frequency from 5 Hz to 40 Hz, which may be employed in the filtering block 2. Thus, derivative-based peak finding fits very well in this situation. Though the employed peak finding is rather accurate, in order to eliminate any possible outliers, an outlier elimination algorithm preferably is carried out by block 3c to remove the undesired peaks caused by various factors. An outlier is a spurious peak having a value that is significantly larger than the median absolute deviation (MAD), which is defined as:
MAD=median(|ρik−median(Pk)|), i=1, 2, 3 . . . , p, (12)
where Pk={ρ1k, ρ2k, . . . , ρpk} and p is the total number of peaks.
After the true peaks are detected, one needs to extract the template, which is the signal segment that contains each pulsatile waveform. The extraction window size for authorized user k, Wk, is calculated as the average of the difference between successive peaks, which can be expressed as follows
where ┌·┐ is the round up operation. Since the window size Δk varies from individual to individual, the templates are normalized by interpolation (sub-block 3f) to have a uniform input for the multiwavelet feature extraction. A linear interpolation strategy preferably is employed here to normalize all the templates to have a length of 512.
Now one can extract many templates for authorized user k, denoted as k={T1k, T2k, . . . , TMk}, from the corresponding tailored signal xk(n). The ensemble average of all the templates is calculated using Eq. (14).
The ensemble averaged template {tilde over (T)}k is used as the final input data for the multiwavelet feature extraction that is input to block 5 of
After the templates are successfully extracted, the multiwavelet decomposition algorithm 5 (
ϕ(t)=ΣkC[k]ϕ(2t−k), (15)
W(t)=ΣkD[k]ϕ(2t−k), (16)
where ϕ(t)=[ϕ1(t), ϕ2(t), . . . , ϕr(t)] are the scaling function, W(t)=[w1(t), . . . , wr(t)] are the wavelet functions, and the r×r matrices C[k] and D[k] are the lowpass and highpass filters coefficients, respectively, for the multiwavelet filter banks, respectively.
The MLP block 9 is used as the machine learning structure in this representative embodiment. It is a static feed forward neural network with one or more hidden layers. The input layer of the MLP block 9 contains the extracted features, which are the multiwavelet decomposition coefficients. The hidden/output layers contain sets of weights and bias and an activation function. The weights are updated by minimizing the cross-entropy.
The dataset used to evaluate the performance of the system 1 shown in
The false rejection rate (FRR), false acceptance rate (FAR) and equal error rate (ERR), which is the point where FRR is equal to FAR, are used as the criterion for evaluating the performance of the authentication system 1. In this experiment, 100 random authorized/unauthorized split is adpoted and the final result is the average of all 100 epochs. The result is compared with the same strategy, but using Daubechies wavelet instead of the GHM multiwavelets.
The system 1 can successfully recognize the authorized user from the unauthorized users. The next step is to identify each authorized user.
Another advantage of the system 1 is that it requires fewer samples for the training set to achieve acceptable identification results.
From the above results, it can be seen that the system 1 and method are superb compared to the existing PPG based method (fiducial features) and is comparable with other biometric authentication systems.
After the ensemble averaged templates have been obtained, a feature extraction algorithm is performed that extracts at least one respective feature from each respective ensemble averaged template, as indicated by block 117. As indicated above, the feature extraction algorithm preferably comprises a multiwavelet decomposition algorithm. As indicated by block 118, an autoencoder algorithm is performed that processes the features to associate each feature with a respective living being to be authenticated. As indicated above, the autoencoder algorithm preferably comprises an MLP algorithm.
It should be noted that many variations may be made to the system and method within the scope of the inventive principles and concepts. For example, although
This application is a U.S. nonprovisional application that claims priority to, and the benefit of the filing date of, U.S provisional application Ser. No. 62/753,581, filed on Oct. 31, 2018, entitled “SYSTEMS AND METHODS FOR PERFORMING BIOMETRIC AUTHENTICATION,” which is hereby incorporated by reference herein in its entirety.
Number | Date | Country | |
---|---|---|---|
62753581 | Oct 2018 | US |