Cardiac Cycle Biometrics using Photoplethysmography

Size: px
Start display at page:

Download "Cardiac Cycle Biometrics using Photoplethysmography"

Transcription

1 Cardiac Cycle Biometrics using Photoplethysmography Emiel Steerneman University of Twente P.O. Box 217, 7500AE Enschede The Netherlands ABSTRACT A multitude of biometric verification methods exist, based on fingerprints, faces, or other biometric features. These methods can be spoofed with a piece of clay or a photo. This research will explore the viability of measuring a heartbeat using photoplethysmography (PPG) on fingers for biometric verification. A pulse oximeter was used to measure the amount of blood in fingers of individuals under equal conditions, over an interval of ten seconds. For preprocessing, the bias was removed and the measurements were normalized. Using a data set of 60 measurements, and cosine similarity as a classifier, an Equal Error Rate of 22.3% was achieved. The results indicate that verification using these methods cannot meet the performance of current biometric systems. It might however, depending on the application, complement existing systems by introducing a liveness check and an extra level of verification. Keywords Biometrics, Photoplethysmography (PPG), Verification 1. INTRODUCTION Biometrics is the authentication of humans based on their unique biological characteristics. These characteristics can be found all over and in the body. A few example characteristics are fingerprints, DNA, veins, and voice [1]. Biometrics is nothing new [7]. There is evidence that around 500 B.C., fingerprints were used by the Babylonians and the Chinese to identify people. Egyptians used physical descriptors to identify traders. Around 1800, the Bertillon system was implemented, in which a physician measured various body dimensions and stored these on easily sortable cards. Over the last few decades, use of dependable Biometrics systems has been on the rise due to the technological advances of computing. Fingerprint scanners can often be found on laptops and phones, iris scanners are employed by airports, and many devices support voice and facial recognition [4, 5]. Biometric identification methods are generally safer than conventional methods such as passwords and passphrases, since these do not rely on a piece Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. 26 th Twente Student Conference on IT February 3 rd, 2017, Enschede, The Netherlands. Copyright 2017, University of Twente, Faculty of Electrical Engineering, Mathematics and Computer Science. of data that can easily be lost or stolen. Spoofing Still, biometric identification methods are not foolproof [8]. Fingerprints can be faked by something as simple as a piece of clay. Face and eye recognition can be spoofed by using printed pictures. Voices can be recorded. The ability to spoof existing biometric identification methods has led to the search for more robust unique biological characteristics. One of these characteristics might be the heartbeat. Heartbeats have the advantage that they can be measured in many different ways. Also, in contrast to a fingerprint or a piece of clay, the person has to be alive. More important, heartbeats are harder to record unknowingly, and thus harder to duplicate. A well-known measuring method which has been used for years, in many different fields and applications, is the Electrocardiogram (ECG). An ECG is a record of the heart s electrical activity, and can be measured by placing electrodes on different parts of the body. This technique is already used in wearables such as bracelets to measure heart rate. However, getting a reliable reading can be quite cumbersome and intrusive. Other less popular methods to measure heartbeats are Seismocardiograms (SCG) which measure the vibrations of the heart, and Phonocardiograms (PCG) which record the sounds that the heart makes. PPG Another method that is gaining attention is Photoplethysmography (PPG). PPG uses infrared light to measure the amount of blood flowing through a certain area. More blood absorbs more of the emitted infrared light, which is measured by an infrared sensor. Success has been achieved by measuring infrared light shined directly through the heart. However, this method is invasive, can be uncomfortable, and the long term health risks are not clear. Another option is to measure the heartbeat in a finger. When placed on a finger, the sensor measures the amount of blood currently present in the finger. Since the amount of blood in the finger is influenced by the heartbeats, the data reflects these heartbeats. this data can be used for biometric verification. In comparison to other methods, PPG sensors can be relatively small and cheap, and can be manufactured for handheld devices such as smartphones. 1.1 Related work PPG as a verification method does not reach the results achieved by methods that are currently used, such as verification based on fingerprint or face. Gu and Zhang reached a false reject rate of 17% [6]. Another team of researchers managed to achieve an Equal Error Rate of 5.29% [2]. Capelli et al., 2010 [3] rated different fingerprint-based verification systems, and multiple systems manage to reach an Equal Error Rate of 3% or less. The gap in this performance can be partially explained by the emotional state 1

2 having an effect on the heartbeat morphology. Research has been done on this problem, and showed promising results [9]. 1.2 Problem Statement Until the performance of PPG-based biometrics is on par with fingerprint-based biometrics, it is not effective to use it to secure critical applications. It is possible that PPGbased biometrics can accompany fingerprint-based biometrics, thereby enhancing security with an extra layer. PPGbased biometrics add a liveness check to the process, together with making sure that the vital signals are from the same individual that places a finger on a fingerprint scanner. A good application for this would be the unlocking of smartphones. Many smartphones already come with functionality to measure the heartbeat and a fingerprint scanner, and software could simply combine the two. Fingerprint scanners are hardware peripherals with their own processes, whereas analyzing the heartbeat would have to be done on the processor of the mobile phone (or any other handheld device or wearable) itself. To ensure that the performance load on processors is limited, the biometric performance of cosine similarity as a relatively simple and light classification algorithm was analyzed. Cosine similarity also does not need a large data set, which was limited by time constraints. 1.3 Research Question Based on the problem statement, the research addresses the following research questions: 1. What is the Equal Error Rate of cosine similarity as a classifier, given the measurements made using PPG? 2. How does the Equal Error Rate of cosine similarity as a classifier compared to stae-of-the-art biometric systems 3. Does the heart rate have an effect on the morphology of the heartbeat? 2. METHODS 2.1 Data collection To test the possibility of verifying individuals based on the heartbeat in their finger, it is best to have measurements with the least amount of noise as possible. The clearest measurements will give the best performance, and conclusions can be drawn with the assumption that the system will always perform equally or worse. Measurements were taken of six individuals, where each individual made 10 measurements for a total of 60 measurements. each individual was measured within the same hour and placed under the same conditions. Sensor The sensor used was a pulse oximeter. A pulse oximeter can be placed on the finger, and uses infrared light to measure the level of oxygen saturation, which is proportional to the amount of blood. The sensor measured at a rate of 12KHz. The duration of each measurement is 10 seconds, resulting in 12 x 10 4 samples per measurement. The sensor is supposed to be connected to a smartphone using a 3.5mm audio jack, but in this research it is connected to an external audio card, which is connected to a laptop. Because the sensor works with an audio jack, it was made to support frequencies that humans can hear. These frequencies range between around 100 Hz and 20KHz. All other frequencies are filtered out by low-, and high pass filters in the audio card. Since the base frequency of a heart lies around 1 Hz, it is filtered out and cannot be measured. The solution was to modulate the heartbeat onto a carrier signal of 12 KHz which passes through the filters, and then use demodulation to separate the heartbeat from the carrier signal. Unfortunately, modulation and demodulation introduced noise, and possibly removed features that make the heartbeat unique. For unknown reasons, the measurements are upside down, when compared to how saturation is normally represented. A lower value in the measurements means a higher level of saturation. This does not affect the biometric performance as long as all measurements are upside down. Influence of sensor noise The sensor introduced significant noise in the measurements. Measurements that would certainly throw off the classification had to be removed. These measurements had peaks in them that prevented the preprocessing step from correctly identifying individual heart beats. The origin of these peaks is unknown. A possibility is faulty wiring where movement makes wires touch, leading to a short circuit. Another issue with the sensor was that the first few moments of a measurement would consist only of very strong noise. This problem was solved by simply removing the first two seconds of each measurement. Another challenge introduced by the sensor was that individual heartbeats would not be on a horizontal line. This can be seen in figure 6. The amplitude and offset of the signal also fluctuated between different measurements, and sometimes also within the same measurement. Influence of heart rate One measurement was done after an individual ran two laps around the house. When measuring, the individual had a heart rate of 150 bpm. The corresponding signal was clearly different from the 60 other signals that were measured at around 60 bpm. The signal looked like it was flattened out. Out of all the signals, this signal came the closest to looking like a single period of a sine wave. This can be see in figure Preprocessing In the preprocessing phase, a raw measurement like the one in figure 1 is converted into a single, averaged, normalized heartbeat. The preprocessing phase consists of multiple steps, which are described below Detecting heartbeats The first step of preprocessing is detecting heartbeats in a measurements A heartbeat can be detected by finding the two steep descents that mark its start and end. These are found by taking a small interval of a measurement, and calculating its slope. If this slope passed a certain threshold, the x-coordinate of the center of the interval is marked as the start of a new heartbeat. The interval consists out of 500 samples, with a duration of around four milliseconds. The interval was varied between 100 and 2000 samples, and 500 samples was found to work for every measurement made. This interval might be too long for higher heart rates. Because the heart rate is higher, the heartbeats are faster and the interval of heartbeats are shorter. Therefore, the interval of the downwards slope indicating the start of a heartbeat will be shorter. Thus, the interval would also have to be shorter. Picking a single slope threshold which would work for any measurement is not possible. As stated in Data collection, 2

3 the amplitudes of different measurements are not consistent. This causes different heartbeats to have different slopes at their start. If the threshold is too high, the starting point of a heartbeat might not be detected. If the threshold is too low, points will be detected that are not starting points of a heartbeat. As can be seen in figure 2, a heartbeat consists of two bumps, a small one and a larger one. The descent of the small bump is especially prone to being detected if the threshold is too low. The problem is solved by picking a high threshold, and gradually lowering it until three conditions are met. The factors by which the threshold is lowered when a given condition is met were chosen experimentally, and worked well for all the measurements made. Condition one The first condition is that there has to be more than one starting point in the measurement. The duration of a heartbeat is obtained by calculating the distance between the starting point of this heartbeat and the next. If there is only one starting point, then the heartbeat cannot be measured. In this case, the threshold is lowered by a factor of. Condition two The second condition is that the heartbeats share roughly the same interval. For example, if one heartbeat has an interval that was twice the length of the other heartbeats, then this is an indication that this heartbeat is actually two heartbeats, and that these two are not detected because of the threshold being too high. In this case, the threshold is slightly lowered, by a factor of 0.95, because it is already very close to detecting all the heartbeats correctly. Condition three The third condition is that there is not an abnormally high or low beats per minute (bpm) in the measurement. Each measurement used in this research was done while the individuals were at rest, which means that the heart rates of the measurements should lie somewhere within the range of 50 to 80 bpm. Everything outside of this range is considered to be an abnormal bpm. If the bpm is too low, this means that two or more heartbeats were identified as one. This has to occur multiple times in equal intervals for it to pass the second condition, and is therefore highly unlikely. It has not happened in any of the measurements. If the bpm is too high, than this means that each heartbeat is detected as two or more heartbeats. This is reasonable when the threshold is too low. As stated before, a heartbeat has two bumps, where the first small bump can be falsely identified as a starting point of a heartbeat, turning an actual heartbeat into two. This was observed multiple times when the threshold was still fixed. Figure 1: Raw measurement Figure 3: Heartbeats without the vertical bias Figure 4: Blue heartbeats at 60 bmp, Red heartbeat at 150 bpm Removing bias and reducing noise The second step is to remove the bias and noise present in each heartbeat. Removing heartbeat bias The first bias is a vertical offset, which can be seen in figure 2. Looking at all measurements, it seems like there is some sort of low frequency sine wave present. This wave might be an artefact of the modulation and demodulation described in Data collection. The bias is measured simply by drawing a line between the start-, and endpoint of a heartbeat. From each heartbeat, its corresponding bias is subtracted. The entire measurement is then moved, such that the first sample of the measurement has the position x=0, y=0. The result can be seen in figure 3. Reducing noise as stated in section Data collection, the measurements are quite noisy and have more samples than the classifier needs. Also, the biometric performance of the classifier would be severely impacted with this many samples, because small peaks caused by noise could be seen as a unique features. To reduce the noise and the amount of samples, each detected heartbeat is divided into 50 slices, and the samples in a slice are averaged into a single value. The amount of slices was chosen experimentally. With less than 50 slices, the two bumps present in a heartbeat got flattened too much. With more than 50 samples, noise was clearly visible in the measurement Normalizing heartbeats Each heartbeat is normalized so that the results of the classification algorithm can easily be understood and processed. Details and justification can be found in the section Classification. Normalization is done by dividing each of the 50 samples by the Root-Sum-Square value. This value is given by the formula n i=1 y2 i where y i is the value of the i th sample and n is the number of samples, 50 in this case. Each heartbeat is then stretched over the same interval and moved, such that the first sample of the heartbeat has the position x=0, y=0. The result can be seen in figure 5. The stretching of the heartbeats over the interval is irrelevant for the classification algorithm, but it allows for clear visualization of the difference between each heartbeat. Figure 2: Raw measurement, with the detected heartbeats and bias Figure 5: Heartbeats after slicing and normalizing Creating the final heartbeat The normalized heartbeats are added together and aver- 3

4 aged to create a single heartbeat. This heartbeat is once again normalized. This heartbeat is stored and ready to be used by the classification algorithm. Thirty of these final heartbeats can be seen in figure 6. False Accept Rate Figure 6: 30 heartbeats of three individuals. Each individual has a different color. The heartbeats show a distinguishable difference False Reject Rate Figure 8: False Acceptance Rate against the False Rejection Rate 3. CLASSIFICATION Cosine Similarity was chosen to calculate the similarity between two measurements. This method was chosen because it is relatively low-cost to calculate. Also, it does not need to be trained, which is preferable with a small data set. Another advantage is that a measurement is simply a 50-dimensional vector with values between -1 and 1. Comparing two measurements with cosine similarity gives a value in the range [-1, 1], where 1 is returned when the measurement is compared with itself, and where -1 is returned when the signal is compared with the exact opposite of itself. Since the data is normalized, the cosine similarity function turns into a simple dot product of the two measurements. This is the reason that each measurement was normalized using the Root-Sum-Square value, as stated in the section Preprocessing. The data set of 60 measurements was compared with itself, and a the False Acceptance Rates and False Rejection Rates were measured with different thresholds. The thresholds range from 0.5 to 1, with incremental steps of RESULTS The results of the classification with a data set of 6 individuals with 10 measurements each can be seen in figure 7, 8, and 9. Rate FAR FRR EER Threshold Figure 7: False Acceptance Rate and False Rejection Rate against the Threshold. The Equal Error Rate lies at 0.945, with rates of 22.3% True Acceptance Rate False Accept Rate Figure 9: Receiver Operating Characteristic (ROC) 5. DISCUSSION Influence of the heart rate Figure 4 shows that the heart rate has a significant impact on the morphology of the heartbeat. The research done by Sarkar, Abbott, and Doerzaph report the same significance [9]. Unique features Looking at figure 6, each individual clearly has unique features in their heartbeats. However, noise from the sensor, modulation and demodulation, and possibly other factors are too much of an influence on the biometric performance of the system. 6. CONCLUSION Performance of the system Concluding from the Equal Error Rate of 22.3%, the system should not be used anywhere on its own. The chance that someone is correctly rejected is 77.7%. Most mobile devices give the user three attempts to unlock it before locking the user out. Given that an intrudes is trying to access the system, the chance that the system rejects the intruder three times is only 46.9%. The false acceptance rate could be lowered by increasing the threshold, but this will make it even harder for genuine users to access the system. Additionally, this research makes the assumption that all measurements are done under the same circumstances. In reality, users will have different heart rates, different emotional states, and place their finger on the sensor inconsis- 4

5 tently. Performance compared to other systems Compared to other biometric systems, this system performs poorly. One team of researchers managed to reach an Equal Error Rate of 5.29% using PPG-based biometrics [2], and Capelli et al., 2010 [3] indexed fingerprint-based biometric systems with an Equal Error Rate of 3% or less. Further research The system could be used in combination with other biometric systems, such as fingerprint scanners. The other biometric system can verify the user, and the PPG-based system can check for liveness. Possibly, the PPG-based system can also verify if the liveness check is done on the same user that was verified by the other biometric system. This research gives an indication of the performance of a PPG-based biometric system using cosine similarity as a classifier. Due to the small dataset, the results are not conclusive. More research with a larger dataset has to be done to provide more conclusive results. 7. REFERENCES [1] Biometrics Institute Limited. Types of biometrics. types-of-biometrics.html. [2] A. Bonissi, R. D. Labati, L. Perico, R. Sassi, F. Scotti, and L. Sparagino. A preliminary study on continuous authentication methods for photoplethysmographic biometrics. In 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, pages 28 33, Sept [3] R. Cappelli, D. Maio, D. Maltoni, J. L. Wayman, and A. K. Jain. Performance evaluation of fingerprint verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(1):3 18, Jan [4] B. Clark. The history of biometric security, and how it s being used today. the-history-of-biometric-security-and-how-its-being-used-today/, March [5] Find Biometrics. Applications [6] Y. Y. Gu and Y. T. Zhang. Photoplethysmographic authentication through fuzzy logic. In IEEE EMBS Asian-Pacific Conference on Biomedical Engineering, 2003., pages , Oct [7] S. Mayhew. History of biometrics. history-of-biometrics, January [8] C. Roberts. Biometric attack vectors and defences. Computers & Security, 26(1):14 25, [9] A. Sarkar, A. L. Abbott, and Z. Doerzaph. Biometric authentication using photoplethysmography signals. In 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pages 1 7, Sept

FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos

FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering,

More information

IDENTICAL AND FRATERNAL TWIN RECOGNITION USING PHOTOPLETHYSMOGRAM SIGNALS

IDENTICAL AND FRATERNAL TWIN RECOGNITION USING PHOTOPLETHYSMOGRAM SIGNALS IDENTICAL AND FRATERNAL TWIN RECOGNITION USING PHOTOPLETHYSMOGRAM SIGNALS NurIzzati Mohammed Nadzri and Khairul Azami Sidek Department of Electrical and Computer Engineering, Faculty of Engineering, International

More information

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

Low-cost photoplethysmograph solutions using the Raspberry Pi

Low-cost photoplethysmograph solutions using the Raspberry Pi Low-cost photoplethysmograph solutions using the Raspberry Pi Tamás Nagy *, Zoltan Gingl * * Department of Technical Informatics, University of Szeged, Hungary nag.tams@gmail.com, gingl@inf.u-szeged.hu

More information

Wi-Fi Fingerprinting through Active Learning using Smartphones

Wi-Fi Fingerprinting through Active Learning using Smartphones Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,

More information

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,

More information

WRIST BAND PULSE OXIMETER

WRIST BAND PULSE OXIMETER WRIST BAND PULSE OXIMETER Vinay Kadam 1, Shahrukh Shaikh 2 1,2- Department of Biomedical Engineering, D.Y. Patil School of Biotechnology and Bioinformatics, C.B.D Belapur, Navi Mumbai (India) ABSTRACT

More information

Biometric Recognition Techniques

Biometric Recognition Techniques Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,

More information

Segmentation of Fingerprint Images

Segmentation of Fingerprint Images Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands

More information

Design Considerations for Wrist- Wearable Heart Rate Monitors

Design Considerations for Wrist- Wearable Heart Rate Monitors Design Considerations for Wrist- Wearable Heart Rate Monitors Wrist-wearable fitness bands and smart watches are moving from basic accelerometer-based smart pedometers to include biometric sensing such

More information

An Approach to Detect QRS Complex Using Backpropagation Neural Network

An Approach to Detect QRS Complex Using Backpropagation Neural Network An Approach to Detect QRS Complex Using Backpropagation Neural Network MAMUN B.I. REAZ 1, MUHAMMAD I. IBRAHIMY 2 and ROSMINAZUIN A. RAHIM 2 1 Faculty of Engineering, Multimedia University, 63100 Cyberjaya,

More information

Arterial pulse waves measured with EMFi and PPG sensors and comparison of the pulse waveform spectral and decomposition analysis in healthy subjects

Arterial pulse waves measured with EMFi and PPG sensors and comparison of the pulse waveform spectral and decomposition analysis in healthy subjects Arterial pulse waves measured with EMFi and PPG sensors and comparison of the pulse waveform spectral and decomposition analysis in healthy subjects Matti Huotari 1, Antti Vehkaoja 2, Kari Määttä 1, Juha

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

Sensor, Signal and Information Processing (SenSIP) Center and NSF Industry Consortium (I/UCRC)

Sensor, Signal and Information Processing (SenSIP) Center and NSF Industry Consortium (I/UCRC) Sensor, Signal and Information Processing (SenSIP) Center and NSF Industry Consortium (I/UCRC) School of Electrical, Computer and Energy Engineering Ira A. Fulton Schools of Engineering AJDSP interfaces

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

Heart Rate Tracking using Wrist-Type Photoplethysmographic (PPG) Signals during Physical Exercise with Simultaneous Accelerometry

Heart Rate Tracking using Wrist-Type Photoplethysmographic (PPG) Signals during Physical Exercise with Simultaneous Accelerometry Heart Rate Tracking using Wrist-Type Photoplethysmographic (PPG) Signals during Physical Exercise with Simultaneous Accelerometry Mahdi Boloursaz, Ehsan Asadi, Mohsen Eskandari, Shahrzad Kiani, Student

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

6.111 Final Project Proposal HeartAware

6.111 Final Project Proposal HeartAware 6.111 Final Project Proposal HeartAware Michael Holachek and Nalini Singh Massachusetts Institute of Technology 1 Introduction Pulse oximetry is a popular non-invasive method for monitoring a person s

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

DISTINGUISHING USERS WITH CAPACITIVE TOUCH COMMUNICATION VU, BAID, GAO, GRUTESER, HOWARD, LINDQVIST, SPASOJEVIC, WALLING

DISTINGUISHING USERS WITH CAPACITIVE TOUCH COMMUNICATION VU, BAID, GAO, GRUTESER, HOWARD, LINDQVIST, SPASOJEVIC, WALLING DISTINGUISHING USERS WITH CAPACITIVE TOUCH COMMUNICATION VU, BAID, GAO, GRUTESER, HOWARD, LINDQVIST, SPASOJEVIC, WALLING RUTGERS UNIVERSITY MOBICOM 2012 Computer Networking CptS/EE555 Michael Carosino

More information

Automation of Fingerprint Recognition Using OCT Fingerprint Images

Automation of Fingerprint Recognition Using OCT Fingerprint Images Journal of Signal and Information Processing, 2012, 3, 117-121 http://dx.doi.org/10.4236/jsip.2012.31015 Published Online February 2012 (http://www.scirp.org/journal/jsip) 117 Automation of Fingerprint

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

Next Generation Biometric Sensing in Wearable Devices

Next Generation Biometric Sensing in Wearable Devices Next Generation Biometric Sensing in Wearable Devices C O L I N T O M P K I N S D I R E C T O R O F A P P L I C AT I O N S E N G I N E E R I N G S I L I C O N L A B S C O L I N.T O M P K I N S @ S I L

More information

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea

More information

Biosignal Analysis Biosignal Processing Methods. Medical Informatics WS 2007/2008

Biosignal Analysis Biosignal Processing Methods. Medical Informatics WS 2007/2008 Biosignal Analysis Biosignal Processing Methods Medical Informatics WS 2007/2008 JH van Bemmel, MA Musen: Handbook of medical informatics, Springer 1997 Biosignal Analysis 1 Introduction Fig. 8.1: The

More information

Design of Wearable Pulse Oximeter Sensor Module for Capturing PPG Signals

Design of Wearable Pulse Oximeter Sensor Module for Capturing PPG Signals Design of Wearable Pulse Oximeter Sensor Module for Capturing PPG Signals Mr. Vishwas Nagekar 1, Mrs Veena S Murthy 2 and Mr Vishweshwara Mundkur 3 1 Department of ECE, BNMIT, Bangalore 2 Assoc. Professor,

More information

Segmentation of Fingerprint Images Using Linear Classifier

Segmentation of Fingerprint Images Using Linear Classifier EURASIP Journal on Applied Signal Processing 24:4, 48 494 c 24 Hindawi Publishing Corporation Segmentation of Fingerprint Images Using Linear Classifier Xinjian Chen Intelligent Bioinformatics Systems

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

Unlock with Your Heart: Heartbeat-based Authentication on Commercial Mobile Phones

Unlock with Your Heart: Heartbeat-based Authentication on Commercial Mobile Phones Unlock with Your Heart: Heartbeat-based Authentication on Commercial Mobile Phones LEI WANG, State Key Laboratory for Novel Software Technology, Nanjing University, China KANG HUANG, State Key Laboratory

More information

A Prototype Wire Position Monitoring System

A Prototype Wire Position Monitoring System LCLS-TN-05-27 A Prototype Wire Position Monitoring System Wei Wang and Zachary Wolf Metrology Department, SLAC 1. INTRODUCTION ¹ The Wire Position Monitoring System (WPM) will track changes in the transverse

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

DESIGN OF A PHOTOPLETHYSMOGRAPHY BASED PULSE RATE DETECTOR

DESIGN OF A PHOTOPLETHYSMOGRAPHY BASED PULSE RATE DETECTOR DESIGN OF A PHOTOPLETHYSMOGRAPHY BASED PULSE RATE DETECTOR Srijan Banerjee 1, Subhajit Roy 2 1 Department of Electrical Engineering, Siliguri Institute of Technology, 2 Department of Electrical Engineering,

More information

Exploring HowUser Routine Affects the Recognition Performance of alock Pattern

Exploring HowUser Routine Affects the Recognition Performance of alock Pattern Exploring HowUser Routine Affects the Recognition Performance of alock Pattern Lisa de Wilde, Luuk Spreeuwers, Raymond Veldhuis Faculty of Electrical Engineering, Mathematics and Computer Science University

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

An algorithm to estimate the transient ST segment level during 24-hour ambulatory monitoring

An algorithm to estimate the transient ST segment level during 24-hour ambulatory monitoring ELEKTROTEHNIŠKI VESTNIK 78(3): 128 135, 211 ENGLISH EDITION An algorithm to estimate the transient ST segment level during 24-hour ambulatory monitoring Aleš Smrdel Faculty of Computer and Information

More information

Shannon Information theory, coding and biometrics. Han Vinck June 2013

Shannon Information theory, coding and biometrics. Han Vinck June 2013 Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:

More information

Effective and Efficient Fingerprint Image Postprocessing

Effective and Efficient Fingerprint Image Postprocessing Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg

More information

Iris Recognition using Hamming Distance and Fragile Bit Distance

Iris Recognition using Hamming Distance and Fragile Bit Distance IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik

More information

Real time verification of Offline handwritten signatures using K-means clustering

Real time verification of Offline handwritten signatures using K-means clustering Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India

More information

Iris Recognition-based Security System with Canny Filter

Iris Recognition-based Security System with Canny Filter Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role

More information

Authenticated Automated Teller Machine Using Raspberry Pi

Authenticated Automated Teller Machine Using Raspberry Pi Authenticated Automated Teller Machine Using Raspberry Pi 1 P. Jegadeeshwari, 2 K.M. Haripriya, 3 P. Kalpana, 4 K. Santhini Department of Electronics and Communication, C K college of Engineering and Technology.

More information

MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES

MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES -2018 S.NO PROJECT CODE 1 ITIMP01 2 ITIMP02 3 ITIMP03 4 ITIMP04 5 ITIMP05 6 ITIMP06 7 ITIMP07 8 ITIMP08 9 ITIMP09 `10 ITIMP10 11 ITIMP11 12 ITIMP12 13 ITIMP13

More information

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,

More information

Title Goes Here Algorithms for Biometric Authentication

Title Goes Here Algorithms for Biometric Authentication Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing

More information

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC.

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. Minutiae Manipulation for Biometric Attacks 1 INTRODUCTION

More information

A comparison of a genetic algorithm and a depth first search algorithm applied to Japanese nonograms

A comparison of a genetic algorithm and a depth first search algorithm applied to Japanese nonograms A comparison of a genetic algorithm and a depth first search algorithm applied to Japanese nonograms Wouter Wiggers Faculty of EECMS, University of Twente w.a.wiggers@student.utwente.nl ABSTRACT In this

More information

Signals and Systems Lecture 9 Communication Systems Frequency-Division Multiplexing and Frequency Modulation (FM)

Signals and Systems Lecture 9 Communication Systems Frequency-Division Multiplexing and Frequency Modulation (FM) Signals and Systems Lecture 9 Communication Systems Frequency-Division Multiplexing and Frequency Modulation (FM) April 11, 2008 Today s Topics 1. Frequency-division multiplexing 2. Frequency modulation

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

Sensors. CSE 666 Lecture Slides SUNY at Buffalo

Sensors. CSE 666 Lecture Slides SUNY at Buffalo Sensors CSE 666 Lecture Slides SUNY at Buffalo Overview Optical Fingerprint Imaging Ultrasound Fingerprint Imaging Multispectral Fingerprint Imaging Palm Vein Sensors References Fingerprint Sensors Various

More information

About user acceptance in hand, face and signature biometric systems

About user acceptance in hand, face and signature biometric systems About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación

More information

Jan Dvorak Department of Circuit Theory Faculty of electrical engineering Czech Technical University in Prague Technicka 2, Prague, Czech Republic

Jan Dvorak Department of Circuit Theory Faculty of electrical engineering Czech Technical University in Prague Technicka 2, Prague, Czech Republic Device for Long Term Measurement of Heart Rate Jakub Parak parakjak@fel.cvut.cz Jan Dvorak dvoraj45@fel.cvut.cz Jan Havlik xhavlikj@fel.cvut.cz ABSTRACT In this contribution, a device for long term measurement

More information

City, University of London Institutional Repository

City, University of London Institutional Repository City Research Online City, University of London Institutional Repository Citation: Rybynok, V., May, J.M., Budidha, K. and Kyriacou, P. A. (2013). Design and Development of a novel Multi-channel Photoplethysmographic

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS Evren Terzi, Hasan B. Celebi, and Huseyin Arslan Department of Electrical Engineering, University of South Florida

More information

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using

More information

Simple Heartbeat Monitor for Analog Enthusiasts

Simple Heartbeat Monitor for Analog Enthusiasts Abigail C Rice, Jelimo B Maswan 6.101: Project Proposal Date: 18/4/2014 Introduction Simple Heartbeat Monitor for Analog Enthusiasts An electrocardiogram (ECG or EKG) is a simple, non-invasive way of measuring

More information

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment.

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment. Title: Biometric Security and Privacy Handout for classes: Class schedule: Contact information and office hours: Prof. Bon Sy, Queens College (NSB A104) Phone: 718-997-3477, or 718-997-3566 to leave a

More information

TRANSFORMS / WAVELETS

TRANSFORMS / WAVELETS RANSFORMS / WAVELES ransform Analysis Signal processing using a transform analysis for calculations is a technique used to simplify or accelerate problem solution. For example, instead of dividing two

More information

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS 1 OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS RESULTS OF PRACTICAL EXPERIMENTS CONCLUSION 2 ABSTRACT IDENTITY VERIFICATION

More information

Distinguishing Identical Twins by Face Recognition

Distinguishing Identical Twins by Face Recognition Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The

More information

FEASIBILITY OF SINGLE-ARM SINGLE-LEAD ECG BIOMETRICS. Peter Sam Raj, Dimitrios Hatzinakos

FEASIBILITY OF SINGLE-ARM SINGLE-LEAD ECG BIOMETRICS. Peter Sam Raj, Dimitrios Hatzinakos FEASIBILITY OF SINGLE-ARM SINGLE-LEAD ECG BIOMETRICS Peter Sam Raj, Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of Toronto, King s College

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

Intelligent Identification System Research

Intelligent Identification System Research 2016 International Conference on Manufacturing Construction and Energy Engineering (MCEE) ISBN: 978-1-60595-374-8 Intelligent Identification System Research Zi-Min Wang and Bai-Qing He Abstract: From the

More information

A New Fake Iris Detection Method

A New Fake Iris Detection Method A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn

More information

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM Tanya Shree 1, Ashwini Raykar 2, Pooja Jadhav 3 Dr. D.Y. Patil Institute of Engineering and Technology, Pimpri, Pune-411018 Department of Electronics and

More information

Heart Rate Monitoring using Adaptive Noise Cancellation

Heart Rate Monitoring using Adaptive Noise Cancellation Heart Rate Monitoring using Adaptive Noise Cancellation 2015-2016 Q4 Bachelor Thesis by Bas Generowicz, 4029542 and Xenia Wesdijk, 4144074 Supervisors: R.C. Hendriks and S. Khademi at Delft University

More information

An Enhanced Biometric System for Personal Authentication

An Enhanced Biometric System for Personal Authentication IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 6, Issue 3 (May. - Jun. 2013), PP 63-69 An Enhanced Biometric System for Personal Authentication

More information

Automated Signature Detection from Hand Movement ¹

Automated Signature Detection from Hand Movement ¹ Automated Signature Detection from Hand Movement ¹ Mladen Savov, Georgi Gluhchev Abstract: The problem of analyzing hand movements of an individual placing a signature has been studied in order to identify

More information

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,

More information

RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS

RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS Ming XING and Wushan CHENG College of Mechanical Engineering, Shanghai University of Engineering Science,

More information

VivoSense. User Manual - Equivital Import Module. Vivonoetics, Inc. San Diego, CA, USA Tel. (858) , Fax. (248)

VivoSense. User Manual - Equivital Import Module. Vivonoetics, Inc. San Diego, CA, USA Tel. (858) , Fax. (248) VivoSense User Manual - VivoSense Version 3.0 Vivonoetics, Inc. San Diego, CA, USA Tel. (858) 876-8486, Fax. (248) 692-0980 Email: info@vivonoetics.com; Web: www.vivonoetics.com Cautions and disclaimer

More information

E-health Project Examination: Introduction of an Applicable Pulse Oximeter

E-health Project Examination: Introduction of an Applicable Pulse Oximeter E-health Project Examination: Introduction of an Applicable Pulse Oximeter Mona asseri & Seyedeh Fatemeh Khatami Firoozabadi Electrical Department, Central Tehran Branch, Islamic Azad University, Tehran,

More information

International Journal of Engineering and Emerging Technology, Vol. 2, No. 1, January June 2017

International Journal of Engineering and Emerging Technology, Vol. 2, No. 1, January June 2017 Measurement of Face Detection Accuracy Using Intensity Normalization Method and Homomorphic Filtering I Nyoman Gede Arya Astawa [1]*, I Ketut Gede Darma Putra [2], I Made Sudarma [3], and Rukmi Sari Hartati

More information

PALM VEIN TECHNOLOGY

PALM VEIN TECHNOLOGY PALM VEIN TECHNOLOGY K. R. Deepti 1, Dr. R. V. Krishnaiah 2 1 MTech-CSE, D.R.K. Institute of science and technology, Hyderabad, India 2 Principal, Dept of CSE, DRKIST, Hyderabad, India ABSTRACT With the

More information

License Plate Localisation based on Morphological Operations

License Plate Localisation based on Morphological Operations License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract

More information

Introduction. Physics 1CL WAVES AND SOUND FALL 2009

Introduction. Physics 1CL WAVES AND SOUND FALL 2009 Introduction This lab and the next are based on the physics of waves and sound. In this lab, transverse waves on a string and both transverse and longitudinal waves on a slinky are studied. To describe

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha

More information

Principle of Pulse Oximeter. SpO2 = HbO2/ (HbO2+ Hb)*100% (1)

Principle of Pulse Oximeter. SpO2 = HbO2/ (HbO2+ Hb)*100% (1) Design of Pulse Oximeter Simulator Calibration Equipment Pu Zhang, Jing Chen, Yuandi Yang National Institute of Metrology, East of North Third Ring Road, Beijing, China,100013 Abstract -Saturation of peripheral

More information

Security and Privacy for Health Care Applications

Security and Privacy for Health Care Applications Security and Privacy for Health Care Applications Yih-Chun Hu University of Illinois at Urbana-Champaign May 7, 203 Story Time Who is the adversary? NSFNet The power grid Maps provided by geni.org and

More information

EE 230 Experiment 10 ECG Measurements Spring 2010

EE 230 Experiment 10 ECG Measurements Spring 2010 EE 230 Experiment 10 ECG Measurements Spring 2010 Note: If for any reason the students are uncomfortable with doing this experiment, please talk to the instructor for the course and an alternative experiment

More information

Amplitude Modulation Effects in Cardiac Signals

Amplitude Modulation Effects in Cardiac Signals Abstract Amplitude Modulation Effects in Cardiac Signals Randall Peters 1, Erskine James 2 & Michael Russell 3 1 Physics Department and 2 Medical School, Department of Internal Medicine Mercer University,

More information

A Novel Region Based Liveness Detection Approach for Fingerprint Scanners

A Novel Region Based Liveness Detection Approach for Fingerprint Scanners A Novel Region Based Liveness Detection Approach for Fingerprint Scanners Brian DeCann, Bozhao Tan, and Stephanie Schuckers Clarkson University, Potsdam, NY 13699 USA {decannbm,tanb,sschucke}@clarkson.edu

More information

A New Social Emotion Estimating Method by Measuring Micro-movement of Human Bust

A New Social Emotion Estimating Method by Measuring Micro-movement of Human Bust A New Social Emotion Estimating Method by Measuring Micro-movement of Human Bust Eui Chul Lee, Mincheol Whang, Deajune Ko, Sangin Park and Sung-Teac Hwang Abstract In this study, we propose a new micro-movement

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

Patterns and Graphing Year 10

Patterns and Graphing Year 10 Patterns and Graphing Year 10 While students may be shown various different types of patterns in the classroom, they will be tested on simple ones, with each term of the pattern an equal difference from

More information

Biomedical Signal Processing and Applications

Biomedical Signal Processing and Applications Proceedings of the 2010 International Conference on Industrial Engineering and Operations Management Dhaka, Bangladesh, January 9 10, 2010 Biomedical Signal Processing and Applications Muhammad Ibn Ibrahimy

More information

Testing Properties of E-health System Based on Arduino

Testing Properties of E-health System Based on Arduino Journal of Automation and Control, 2015, Vol. 3, No. 3, 122-126 Available online at http://pubs.sciepub.com/automation/3/3/17 Science and Education Publishing DOI:10.12691/automation-3-3-17 Testing Properties

More information

Fingerprint Image Quality Parameters

Fingerprint Image Quality Parameters Fingerprint Image Quality Parameters Muskan Sahi #1, Kapil Arora #2 12 Department of Electronics and Communication 12 RPIIT, Bastara Haryana, India Abstract The quality of fingerprint image determines

More information

ABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA

ABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA ISSN: 0976-3104 SUPPLEMENT ISSUE ARTICLE TOWARDS UTILIZATION OF A LEAN CANVAS IN THE BIOMETRIC SOFTWARE TESTING Padmaraj Nidagundi 1, Leonids Novickis 2 1 Faculty of Computer Science and Information Technology,

More information

A Machine Learning Technique for Person Identification using ECG Signals

A Machine Learning Technique for Person Identification using ECG Signals A Machine Learning Technique for Person Identification using ECG Signals M. BASSIOUNI*, W.KHALEFA**, E.A. El-DAHSHAN* and ABDEL-BADEEH. M. SALEM** **Faculty of Computer and Information Science, Ain shams

More information

Performance Analysis of a 1-bit Feedback Beamforming Algorithm

Performance Analysis of a 1-bit Feedback Beamforming Algorithm Performance Analysis of a 1-bit Feedback Beamforming Algorithm Sherman Ng Mark Johnson Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2009-161

More information

Modern Digital Communication Techniques Prof. Suvra Sekhar Das G. S. Sanyal School of Telecommunication Indian Institute of Technology, Kharagpur

Modern Digital Communication Techniques Prof. Suvra Sekhar Das G. S. Sanyal School of Telecommunication Indian Institute of Technology, Kharagpur Modern Digital Communication Techniques Prof. Suvra Sekhar Das G. S. Sanyal School of Telecommunication Indian Institute of Technology, Kharagpur Lecture - 01 Introduction to Digital Communication System

More information

UNIT I FUNDAMENTALS OF ANALOG COMMUNICATION Introduction In the Microbroadcasting services, a reliable radio communication system is of vital importance. The swiftly moving operations of modern communities

More information

Noise Reduction on the Raw Signal of Emotiv EEG Neuroheadset

Noise Reduction on the Raw Signal of Emotiv EEG Neuroheadset Noise Reduction on the Raw Signal of Emotiv EEG Neuroheadset Raimond-Hendrik Tunnel Institute of Computer Science, University of Tartu Liivi 2 Tartu, Estonia jee7@ut.ee ABSTRACT In this paper, we describe

More information