sensors Article

An Approach to Biometric Verification Based on Human Body Communication in Wearable Devices Jingzhen Li, Yuhang Liu, Zedong Nie *, Wenjian Qin, Zengyao Pang and Lei Wang Shenzhen Institutes of Advanced Technology, Chinese Academy of Science, Shenzhen 518055, China; [email protected] (J.L.); [email protected] (Y.L.); [email protected] (W.Q.); [email protected] (Z.P.); [email protected] (L.W.) * Correspondence: [email protected]; Tel.: +86-755-8639-2295; Fax: +86-755-8639-2299 Academic Editors: Giancarlo Fortino, Hassan Ghasemzadeh, Wenfeng Li, Yin Zhang and Luca Benini Received: 13 October 2016; Accepted: 4 January 2017; Published: 10 January 2017

Abstract: In this paper, an approach to biometric verification based on human body communication (HBC) is presented for wearable devices. For this purpose, the transmission gain S21 of volunteer’s forearm is measured by vector network analyzer (VNA). Specifically, in order to determine the chosen frequency for biometric verification, 1800 groups of data are acquired from 10 volunteers in the frequency range 0.3 MHz to 1500 MHz, and each group includes 1601 sample data. In addition, to achieve the rapid verification, 30 groups of data for each volunteer are acquired at the chosen frequency, and each group contains only 21 sample data. Furthermore, a threshold-adaptive template matching (TATM) algorithm based on weighted Euclidean distance is proposed for rapid verification in this work. The results indicate that the chosen frequency for biometric verification is from 650 MHz to 750 MHz. The false acceptance rate (FAR) and false rejection rate (FRR) based on TATM are approximately 5.79% and 6.74%, respectively. In contrast, the FAR and FRR were 4.17% and 37.5%, 3.37% and 33.33%, and 3.80% and 34.17% using K-nearest neighbor (KNN) classification, support vector machines (SVM), and naive Bayesian method (NBM) classification, respectively. In addition, the running time of TATM is 0.019 s, whereas the running times of KNN, SVM and NBM are 0.310 s, 0.0385 s, and 0.168 s, respectively. Therefore, TATM is suggested to be appropriate for rapid verification use in wearable devices. Keywords: biometric verification; human body communication; threshold-adaptive template matching; weighted Euclidean distance; transmission gain S21; wearable device

1. Introduction Body sensor networks (BSNs), which also referred to as body area networks (BANs), are wireless networks for interconnecting wearable nodes/devices centered on an individual person’s workspace [1,2]. With the rapid development of microprocessor technologies and wireless communication, BSNs have emerged as a revolutionary technology and have demonstrated great potential in healthcare monitoring (blood pressure monitoring [3], blood glucose monitoring [4], etc.), emotion recognition (negative emotional state of fear [5], etc.), sport performance monitoring [6], physical/virtual social interactions [7], and so on [8–10]. However, because wearable devices usually carry user’s personal information, information leakage from wearable devices in BSNs is regarded as a challenge, which may bring about an immeasurable loss [11]. Therefore, the information security of wearable devices should be strictly considered [12]. Biometric verification, which uses the human physiological or behavioral trait to achieve personal verification, is widely used in information security [13,14]. Compared with conventional verifications, such as digital password, personal identification number and IC card, biometric verification has the advantages of being much more difficult to forget, lose, steal, copy or forge [15]. Thus far, biometric Sensors 2017, 17, 125; doi:10.3390/s17010125

www.mdpi.com/journal/sensors

Sensors 2017, 17, 125

2 of 18

verification using fingerprint, face, iris, vein, voice, electroencephalograph (EEG), electrocardiogram (ECG) and gait, among others, has been an active research topic in recent years [16–19]. Mathur et al. demonstrated the methodology of fingerprint verification in a wearable system [20]. However, the identification performance will be reduced when the finger is moist. Klonovs et al. introduced a mobile biometric verification system utilizing EEG recordings headset [21]. However, the EEG recordings headset is not suitable to wear for a long time. Peter et al. proposed an ECG-based authentication protocol to identify sensor nodes attached to the same human body [22]. Choudhary et al. presented a biometric verification approach based on the photoplethysmographic (PPG) signal for BSNs [23]. Derawi et al. collected the user’s gait as biometric trait through a wireless monitor [24]. However, the wireless monitor is so complicated that it is difficult to wear. Kim et al. presented a multimodal verification approach that uses face, teeth and voice modalities as biometric traits for mobile device [25]. However, the power of multimodal verification is too large to be used in wearable devices. Other biometric verifications, such as iris, hand and vein verification, are difficult to integrate into wearable devices due to the limitation of wearable devices’ size [26–28]. Therefore, a new approach to biometric verification is necessary in wearable devices [29]. Human body communication (HBC), which uses the human body itself as a transmission medium, provides a potential personal verification solution for wearable devices [30]. Specifically, due to the thickness differences of biological tissues in human body, the transmission gain S21, which reflects the variation of transmission characteristics at different frequencies, are different while the signal is coupled into the human body. Therefore, the transmission gain S21 may be used as a biometric trait to achieve personal verification. This is the theoretical foundation of biometric verification based on HBC. Considering that the location of a specified wearable device is usually fixed (e.g., a wristband is worn on the forearm), the HBC sensor, which is attached to the wearable device, can collect the biometric trait in the fixed location. In other words, the biometric verification based on HBC is readily integrated into different wearable devices. Thus, biometric verification based on HBC may be a promising technology in wearable devices [31]. Thus far, few investigations have characterized the biometric verification based on HBC. Nakanishi et al. presented a verification approach that uses a pseudo white noise as an input signal to acquire human biometric trait [32]. However, the identification performance is low due to the influence of randomness from white noise. Rasmussen et al. proposed a biometric based on the human body’s response to an electric square pulse signal, and used the pulse-response biometric as an additional verification mechanism [33]. However, all sample data are used in both learning and verification by the researchers, which may lead to a higher risk of confidence level. The authors of this article also made a preliminary research on biometric verification based on HBC [34]. However, the amount of computation in [34] is so large that it is inappropriate for rapid verification in wearable devices. In this work, we aim to study the biometric verification based on HBC for wearable devices. The contribution and originality of this paper is summarized as follows. Firstly, the transmission gain S21 is proposed as the biometric trait for different individuals. Secondly, to achieve the rapid verification, a threshold-adaptive template matching (TATM) algorithm based on weighted Euclidean distance is employed. Furthermore, in order to evaluate TATM algorithm, the identification performance of TATM is compared with K-nearest neighbor (KNN) classification [35], support vector machines (SVM) [36], and naive Bayesian method (NBM) classification [37]. The remainder of this paper is organized as follows. In Section 2, we will demonstrate the validity of biometric verification method based on HBC through numerical simulation. In Section 3, the experimental setup will be introduced. Section 4 is about measurement result and analysis. TATM algorithm will be reported in Section 5. Section 6 gives a detailed analysis of identification performance. Finally, the conclusions are drawn in Section 7.

Sensors 2017, 17, 125

3 of 18

Sensors 2017, 17, 125 2. Modeling Biometric Verification Based on HBC

3 of 18

2. Modeling Biometric Verification Based on HBC 2.1. Forearm Modeling 2.1.demonstrated Forearm Modeling As in Figure 1, in order to evaluate the feasibility of biometric verification based on HBC, As three different namely, Model Model of B biometric and Model C, are established. demonstratedforearm in Figuremodels, 1, in order to evaluate the A, feasibility verification based Theseonmodels are abstracted as cylinders. The length and diameter of all models 300 mm and HBC, three different forearm models, namely, Model A, Model B and Model C, areare established. 56 mm, respectively. Furthermore, each model includes, from outside inside, fat,and muscle, These models are abstracted as cylinders. The length and diameter of all to models are skin, 300 mm 56 mm, Furthermore, each thicknesses model includes, from outside to inside, skin, fat, muscle, cortical bonerespectively. and bone marrow [38]. The of tissue layers for different models are listed cortical bone and bone marrow [38]. The of tissue layers for different models listed in mm, in Table 1. Specifically, the thicknesses ofthicknesses fat and muscle for Model A are 2.30 mmare and 17.86 Table 1. Specifically, the thicknesses of fat and muscle for Model A are 2.30 mm and 17.86 mm, respectively. Compared with Model A, the thickness of fat in Model B is increased, whereas the respectively. Compared with Model A, the thickness of fat in Model B is increased, whereas the thickness of muscle is decreased. In addition, the thickness of fat in Model C is 7.60 mm, and the thickness of muscle is decreased. In addition, the thickness of fat in Model C is 7.60 mm, and the thickness of muscle is about 12.56 mm. Details of simulation setup are as follows. A transmitting thickness of muscle is about 12.56 mm. Details of simulation setup are as follows. A transmitting electrode and a receiving electrode are attached on the surface of model. A voltage source with an electrode and a receiving electrode are attached on the surface of model. A voltage source with an output impedance of 50ofΩ50isΩfed to the transmitting electrode. InInorder output impedance is fed to the transmitting electrode. ordertotoacquire acquirethe thetransmission transmission gain S21 ingain theS21 frequency range 0.3 MHz 1500toMHz conveniently, a Gaussian signal, of of which in the frequency range 0.3toMHz 1500 MHz conveniently, a Gaussian signal, whichthe thepulse widthpulse waswidth 0.25 ns, adopted in the simulation. In addition, there is aisload with impedance wasis0.25 ns, is adopted in the simulation. In addition, there a load with impedanceof of 50 Ω 50 Ω in receiving electrode. The simulations are performed using commercial electromagnetic in receiving electrode. The simulations are performed using commercial electromagnetic modeling modeling software on the finite-difference time-domain (FDTD) method. software XFDTD basedXFDTD on thebased finite-difference time-domain (FDTD) method. skin fat muscle cortical bone bone marrow

skin

skin

fat

fat

muscle

muscle

cortical bone

cortical bone bone marrow

bone marrow

(b)

(a) Transmitting electrode

(c) Forearm model

56 mm Receiving electrode (d)

300 mm

Figure 1. (a)1.The cross-section ofofModel cross-sectionofofModel Model B; (c) cross-section Figure (a) The cross-section ModelA; A; (b) (b) the the cross-section B; (c) the the cross-section of of Model C; and (d) transmitting electrodeand andreceiving receiving electrode. Model C; and (d) transmitting electrode electrode. Table Thicknessesof of difference difference tissue (mm). Table 1. 1. Thicknesses tissuelayers layers (mm).

Model A Model Skin 0.84A Fat 2.30 Skin 0.84 Fat 2.30 Muscle 17.86 Muscle bone 17.86 Cortical 3.36 Cortical bone 3.36 Bone marrow 3.64 Bone marrow 3.64

Model B Model C Model Model 0.84 B 0.84 C 4.76 7.60 0.84 0.84 4.76 7.60 15.4 12.56 15.4 12.56 3.36 3.36 3.36 3.36 3.64 3.64 3.64 3.64

2.2. Simulation Result

2.2. Simulation Result

Figure 2 shows the transmission gain S21 (in dB) of three forearm models. The gains of three

forearm2models somewhat different when is below 200 MHz. The gain ModelofAthree Figure showsare the transmission gain S21the (infrequency dB) of three forearm models. Theofgains is about −3 dB at 150 MHz, whereas the gain of Model C is −5.3 dB. The gains of all models forearm models are somewhat different when the frequency is below 200 MHz. The gain ofare Model similar in the frequency range 200 MHz to 530 MHz. However, the gains are quite different when the A is about −3 dB at 150 MHz, whereas the gain of Model C is −5.3 dB. The gains of all models are similar in the frequency range 200 MHz to 530 MHz. However, the gains are quite different when the frequency is 530 MHz to 750 MHz and 900 MHz to 1500 MHz. For instance, the gain of Model C

Sensors 2017, 17, 125

4 of 18

Sensors 2017, 17,530 125 4 of 18 frequency Sensors 2017,is 17, 125 MHz to 750 MHz and 900 MHz to 1500 MHz. For instance, the gain of Model 4Cofis 18 the smallest at 630 MHz, about −28 dB, whereas the gain of Model A is approximately −23 dB at frequency is 530 MHz to 750 MHz and 900 MHz to 1500 MHz. For instance, the gain of Model C is 630 MHz. In addition, the gain of Model C is more than −26.5 dB at 1000 MHz, whereas the gain of the smallest atat630 −23 is the smallest 630MHz, MHz,about about−28 −28dB, dB,whereas whereasthe thegain gainof of Model Model A A is approximately − 23 dB dB at Model A is about −30 dB. From Figure 2, it can be revealed that the transmission gain S21 of each 630 MHz. In addition, the gain of Model C is more more than than − −26.5 26.5 dB dB at at 1000 1000 MHz, MHz, whereas the gain of forearm model is different, which is related with the thicknesses of tissue layers, as demonstrated in Model A is about − −30 30 dB. dB. From From Figure Figure 2, 2, itit can can be be revealed revealed that the transmission transmission gain S21 of each Figure 1. Thus, considering the difference of biological tissues for each individual, the transmission forearm model is different, which is related with the thicknesses of tissue layers, as demonstrated in gain S21 is an optional biometric trait to achieve personal verification. Figure 1. Thus, considering the difference of biological tissues for each individual, the transmission gain S21 is an optional biometric trait to achieve personal verification. verification.

Figure 2. Transmission gain S21 of different models in FDTD simulations. Figure models in in FDTD FDTD simulations. simulations. Figure 2. 2. Transmission Transmission gain gain S21 S21 of of different different models 3. Experimental Setup

3. Setup 3.1. Experimental Equipment 3. Experimental Experimental Setup The experimental equipment includes a vector network analyzer (VNA, Agilent E5061A), a 3.1. Equipment 3.1. Experimental Experimental Equipment transmitting electrode and a receiving electrode. In order to ensure that the electrodes are in close The experimental equipment includes aavector network analyzer (VNA, Agilent E5061A), a The experimental includes vector network analyzer (VNA, contact with the skin, theequipment electrodes are attached on a plastic clip, as shown in FigureAgilent 3a. TheE5061A), VNA is transmitting electrode and a receiving electrode. In order to ensure that the electrodes are in close a transmitting electrode and a receiving In order to ensure the electrodes are in close adopted to acquire the transmission gainelectrode. S21 of volunteer. Figure 3bthat illustrates the measurement contact with the skin, the electrodes are attached on aaplastic clip, asasshown ininFigure 3a.3a. The VNA is contact with the skin, the electrodes are attached on plastic clip, shown Figure location of volunteer. The transmitting electrode and receiving electrode are placedThe on VNA the adopted to acquire the transmission gain S21 of volunteer. Figure 3b illustrates the measurement is adopted to acquire the transmission gain S21 of volunteer. Figure 3b illustrates the measurement volunteer’s forearm. The distance between electrode and wrist is 6 cm. The transmitting electrode is location volunteer. The transmitting electrode and receiving are placed on the location ofof transmitting electrode and receiving electrodeelectrode are placed the volunteer’s connected tovolunteer. the Port 1The of VNA through cable. Similarly, the receiving electrode is on connected to the volunteer’s distance between electrode is 6 cm. The transmitting electrode to is forearm. Theforearm. distanceThe between electrode and wrist is 6and cm.wrist The transmitting electrode is connected Port 2 of VNA. connected to the Port 1 of VNA through cable. Similarly, the receiving electrode is connected to the the Port 1 of VNA through cable. Similarly, the receiving electrode is connected to the Port 2 of VNA. Port 2 of VNA. Transmitting electrode Transmitting electrode

Receiving electrode

(a)electrode Receiving

(b)

(a) (b)location. Figure3.3.(a) (a)Electrodes Electrodesand andplastic plasticclip; clip;and and(b) (b)measurement measurement location. Figure Figure 3. (a) Electrodes and plastic clip; and (b) measurement location.

Sensors 2017, 17, 125 Sensors 2017, 17, 125

5 of 18 5 of 18

3.2. Experimental Setup 3.2. Experimental In our study,Setup ten volunteers (average age of 24 years) with body weights of 50 kg to 80 kg and bodyInheights of 165 to 180 cm were selected. Written obtained all our study, tencm volunteers (average age of 24 years) informed with bodyconsent weightswas of 50 kg to 80from kg and volunteers. shows Two experiments were carriedfrom out all in body heightsFigure of 165 4cm to 180the cm experimental were selected.scenario. Written informed consent was obtained this work. volunteers. Figure 4 shows the experimental scenario. Two experiments were carried out in this work.

Figure Figure 4. 4. Experimental scenario.

Table 22 lists lists the the detailed detailed setup setup for for Experiments Experiments 11 and and 2. 2. In In Experiment Experiment 1, we aimed aimed to find the the Table 1, we to find chosen frequency for biometric verification based on HBC. For this purpose, the transmission gain chosen frequency for biometric verification based on HBC. For this purpose, the transmission gain S21 S21the in frequency the frequency 0.3 MHz to 1500 was investigated. The measurement was 60 done 60 in rangerange 0.3 MHz to 1500 MHzMHz was investigated. The measurement was done times times (groups) each volunteer and repeated forSpecifically, 3 days. Specifically, the measurement (groups) per dayper forday eachfor volunteer and repeated for 3 days. the measurement was done was done 10 times per hour for 6 hours each day. Moreover, 1601 sample data are acquired each 10 times per hour for 6 hours each day. Moreover, 1601 sample data are acquired in each time.inThus, time. Thus, 2,881,800 data are acquired in Experiment 1. 2,881,800 sample datasample are acquired in Experiment 1. According to Experiment 1, it can be known that the chosen According to Experiment 1, it can be known that the chosen frequency frequency for for biometric biometric verification verification is from 650 MHz to 750 MHz. In Experiment 2, we aimed to obtain the sample data is from 650 MHz to 750 MHz. In Experiment 2, we aimed to obtain the sample data used used for for learning learning and verification verificationatatthe the chosen frequency. In Experiment the measurement was6 times done (groups) 6 times and chosen frequency. In Experiment 2, the2,measurement was done (groups) per day for each volunteer and was repeated for 5 days. Furthermore, 21 sample data are per day for each volunteer and was repeated for 5 days. Furthermore, 21 sample data are acquired acquired each time. Therefore, 6300 sample data are acquired in Experiment 2. each time. Therefore, 6300 sample data are acquired in Experiment 2. Table 2. Experimental Experimental setup. setup. Table 2. Frequency BandsBands Volunteers Days Frequency Volunteers Experiment 1

0.3 MHz–1500 MHz

10

Times Times Daysper Day

per Day

3

60

Experiment 21 6500.3 MHz–750 MHz MHz10 Experiment MHz–1500 10 5 Experiment 2 650 MHz–750 MHz 10 4. Measurement Results and Analysis 4. Measurement Results and Analysis 4.1. Feasibility of Biometric Verification Based on HBC

3 6 5

60 6

Sample

Sample Data Data per Time

Total Total

per Time 2,881,800 1601 21 1601 6300 2,881,800 21

6300

4.1. Feasibility Biometric Based HBC Figure 5aofdepicts the Verification transmission gainon S21 (in dB) of five volunteers at the same time. As shown in Figure 5a,5a it isdepicts interesting to observe thatgain there is a(in significantly among five volunteers in Figure the transmission S21 dB) of fivedifference volunteers at the same time. As the frequency range 500 MHz to 1500 MHz. Moreover, as the frequency increases, the difference is shown in Figure 5a, it is interesting to observe that there is a significantly difference among five become more Therefore, it can betoinferred that the biometric based on HBCthe is volunteers in discernible. the frequency range 500 MHz 1500 MHz. Moreover, as verification the frequency increases, feasible due the difference of transmission gain S21 between individuals. 5b describes the difference is to become more discernible. Therefore, it can be inferred that theFigure biometric verification transmission gainisS21 of onedue volunteer four different times. It can begain observed that the transmission based on HBC feasible to theatdifference of transmission S21 between individuals. gain S215bis describes almost thethe same when the frequency MHz toat1000 whichtimes. meansItthat Figure transmission gain S21 is offrom one 0.3 volunteer fourMHz, different can the be transmission gain S21 of the same individual is steady over a period of time. observed that the transmission gain S21 is almost the same when the frequency is from 0.3 MHz to 1000 MHz, which means that the transmission gain S21 of the same individual is steady over a period of time.

Sensors 2017, 17, 125 Sensors 2017, 17, 125

6 of 18 6 of 18

Figure Transmission gain S21 frequency range MHz 1500 MHz:(a) (a)five fivevolunteers volunteersatatthe Figure 5. 5. Transmission gain S21 in in thethe frequency range 0.30.3 MHz toto 1500 MHz: the same time; and (b) Volunteer 4 at four different times. same time; and (b) Volunteer 4 at four different times.

4.2. Chosen Frequency for Biometric Verification 4.2. Chosen Frequency for Biometric Verification In order to decrease the number of sample data, it is critical to determine the HBC frequency for In orderverification, to decrease the number ofbenefit sampletodata, it israpid critical to determine the HBC frequency biometric which is of great achieve verification in wearable devices. For forthis biometric verification, which is of great benefit to achieve rapid verification in wearable devices. purpose, the standard deviation of transmission gain S21 for ten volunteers in the frequency Forrange this purpose, standard of transmission gainIn S21 for ten volunteers indeviation the frequency 0.3 MHz the to 1500 MHz deviation is investigated in this section. addition, the standard of range 0.3 MHz to 1500 MHz is investigated in this section. In addition, the standard transmission gain S21 for one volunteer at nine different times is also studied. Thedeviation standard of transmission gain S21 for one volunteer at nine deviation calculation is shown as Equation (1). different times is also studied. The standard deviation calculation is shown as Equation (1). ∑ ( − ) (1) = !1 2 2 − 1 n ∑ i =1 ( x i − x ) si = (1) n − 1of i-th sample data, is the average value of where s is the standard deviation, x is the value sample data, and n is the sample times; n is 10 in the former calculation and n is 9 in the latter where si is the standard deviation, xi is the value of i-th sample data, x is the average value of sample calculation. data, and n is the sample times; n is 10 indeviation the former and n isS21 9 inwhen the latter calculation.is Figure 6 illustrates the standard of calculation transmission gain the frequency 6 illustrates deviation of transmission S21 when the ten frequency is 0.3and MHz 0.3Figure MHz to 1500 MHz.the Thestandard black curve represents the standardgain deviation among volunteers, the red curve shows the standard deviation of a volunteer at nine different times. As demonstrated to 1500 MHz. The black curve represents the standard deviation among ten volunteers, and the red in Figure standard deviation ten at volunteers is equal to As or less than 0.9 when the 6, curve shows 6, thethe standard deviation of aamong volunteer nine different times. demonstrated in Figure is below 600 MHz. standard is greater than 1.3 when the thefrequency standard deviation among ten However, volunteersthe is equal to ordeviation less than 0.9 when the frequency is below frequency is 650 MHz to 750 MHz and 950 MHz to 1050 MHz. furthermore, the standard deviation is to 600 MHz. However, the standard deviation is greater than 1.3 when the frequency is 650 MHz up to 2.1 at 700 MHz. Thus, it is indicated that there is a distinguishable difference among volunteers 750 MHz and 950 MHz to 1050 MHz. furthermore, the standard deviation is up to 2.1 at 700 MHz. Thus, aforementioned frequency range. On difference the other hand, standardindeviation of a volunteer it isinindicated that there is a distinguishable amongthe volunteers aforementioned frequency (Volunteer 4) at nine different times is less than 0.6 in the frequency range 290 MHz to 950 MHz. As is range. On the other hand, the standard deviation of a volunteer (Volunteer 4) at nine different times the frequency increases, the standard deviation is become larger. Thus, it can be deduced that the less than 0.6 in the frequency range 290 MHz to 950 MHz. As the frequency increases, the standard chosen frequency for biometric verification based on HBC should be from 650 MHz to 750 MHz, in deviation is become larger. Thus, it can be deduced that the chosen frequency for biometric verification which the standard deviation of ten volunteers is more than 1.3, but the standard deviation of a based on HBC should be from 650 MHz to 750 MHz, in which the standard deviation of ten volunteers volunteer at nine different times is approximately 0.4. is more than 1.3, but the standard deviation of a volunteer at nine different times is approximately 0.4. In order to better understand the statistic characteristics of biometric verification based on HBC In order to better understand the statistic characteristics of biometric verification based on HBC in the frequency range 650 MHz to 750 MHz, the coefficient of variation, which can reflect the in the frequency rangeof650 MHz to 750 MHz, thesection. coefficient variation,ofwhich can reflect the relative relative dispersion data, is adopted in this The of calculation coefficient of variation is dispersion of data, is adopted in this section. The calculation of coefficient of variation is shown as shown as Equation (2). Equation (2). CV = = | si | × (2) (2) CV ×100% 100% x where is the coefficient of variation, is the standard deviation of sample the where CV is the coefficient of variation, si is the standard deviation of sample data,data, and xand is the is average average value data. of sample data. value of sample

Sensors 2017, 17, 125 Sensors 2017, 17, 125 Sensors 2017, 17, 125

7 of 18 7 of 18 7 of 18

Figure 6. Standard deviation of transmission gain S21 in the frequency range 0.3 MHz to 1500 MHz. Figure Standarddeviation deviationof oftransmission transmission gain MHz to to 1500 MHz. Figure 6.6.Standard gain S21 S21in inthe thefrequency frequencyrange range0.3 0.3 MHz 1500 MHz.

As shown in Figure 7, the coefficient of variation of ten volunteers is more than 8% when the As shown in Figure 7, the the frequency coefficient of variation the of ten volunteers more than 8%awhen the of frequency is 664 coefficient of isvariation has As shown in MHz. FigureAs 7, the coefficient ofincreases, variation of ten volunteers is more than 8% feature when the frequency is 664 MHz. As the frequency increases, the coefficient of variation has a feature of sustained is rise inMHz. the frequency range 665 MHz tothe 715coefficient MHz. In of addition, the coefficient of sustained variation frequency 664 As the frequency increases, variation has a feature of sustained rise in the frequency range 665 MHz to 715 MHz. In addition, the coefficient of variation is 12.5% at frequency 715 MHz and is 9.5% at 750toMHz. However, the coefficient of variation of one volunteer rise in the range 665 MHz 715 MHz. In addition, the coefficient of variation is 12.5% is 12.5% at 715 MHz and is 9.5% at 750 MHz. However, the coefficient of variation of one volunteer at 715 nineMHz different times isat approximately 2.5% when the frequency is 650 MHz to 750 MHz. Thus, it at and is 9.5% 750 MHz. However, the coefficient of variation of one volunteer at nine at nine different times is approximately 2.5% when the frequency is 650 MHz to 750 MHz. Thus, it is indicated that the frequency 650 MHz to 750 MHz may be appropriate for biometric verification different times that is approximately whento the frequency is 650 MHz to 750for MHz. Thus, verification it is indicated is indicated the frequency2.5% 650 MHz 750 MHz may be appropriate biometric based onfrequency HBC. that the 650 MHz to 750 MHz may be appropriate for biometric verification based on HBC. based on HBC.

Figure 7. The coefficient of variation of transmission gain S21 in the frequency range 650 MHz to Figure 7. 7. The frequency range 650 MHz MHz to to Figure The coefficient coefficient of of variation variation of of transmission transmission gain gain S21 S21 in in the the frequency range 650 750 MHz. 750 MHz. 750 MHz.

4.3. Transmission Gain S21 at Chosen Frequency 4.3. Transmission Gain S21 S21 at at Chosen Chosen Frequency Frequency 4.3. Transmission Gain To achieve rapid verification, the number of sample data for human biometric trait should not To achieve rapid verification, thenumber number ofsample sample data human biometric should achieve the data forfor human trait should notnot be beTo too high. rapid In thisverification, paper, 21 sample dataofare acquired in each timebiometric (group) viatrait VNA when be too high. In this paper, 21 sample data are acquired in each time (group) via VNA when is from 650 21 MHz to 750data MHz. frequency interval sample datafrequency is 5 MHz. toofrequency high. In this paper, sample areThe acquired in each timebetween (group)each via VNA when is frequency from 650 MHz to 750 MHz. frequency interval between each data is 85shows MHz. Figure 8isshows theMHz. transmission gain The S21 (21 sample data) the frequency range Figure 650 MHz to from 650 MHz to 750 The frequency interval between eachinsample data is 5sample MHz. Figure 8 shows the transmission gain S21 (21 data) in 650 the frequency 650 MHz in to 750 MHz. As shown in Figure 8, there is ainsignificantly difference among volunteers at the chosen the transmission gain S21 (21 sample data) the sample frequency range MHz to 750 range MHz. As shown 750 MHz. As shown in Figure 8, there is a significantly difference among volunteers at the chosen frequency. the difference of among one volunteer at four times is small. Therefore, those 21the Figure 8, thereIniscontrast, a significantly difference volunteers at the chosen frequency. In contrast, frequency. contrast, the at difference ofbiometric volunteer is small. those 21 sample data canvolunteer be regarded as human trait. at four difference ofInone four times isone small. Therefore, thosetimes 21 sample dataTherefore, can be regarded as sample data can be regarded as human biometric trait. human biometric trait.

Sensors 2017, 17, 125 Sensors 2017, 17, 125

8 of 18 8 of 18

(a)

(b)

Figure 8. Transmission gain S21 in the frequency range 650 MHz to 750 MHz: (a) five volunteers at Figure 8. Transmission gain S21 in the frequency range 650 MHz to 750 MHz: (a) five volunteers at the the same time; and (b) Volunteer 4 at four different times. same time; and (b) Volunteer 4 at four different times.

5. TATM Algorithm Proposed 5. TATM Algorithm Proposed 5.1. Template Building 5.1. Template Building In this paper, a threshold adaptive template matching (TATM) algorithm based on weighted In this paper, a is threshold (TATM) on weighted Euclidean distance proposedadaptive to achievetemplate personal matching verification. Figure 9algorithm illustratesbased the process of the Euclidean distance is proposed to achieve personal verification. Figure 9 illustrates the process TATM algorithm. In general, the personal verification is divided into two steps: learning and of theverification TATM algorithm. In first general, personal is divided two steps: learning and [39]. In the step, the the error data verification need to be cleaned frominto the template library before verification [39].template In the first step,The thesecond error data to be cleaned from the template library data before the matching is built. step need is to determine the correlation between sample theand matching template is built. The second to data determine thematching correlation between sample data matching template. It is worth notingstep thatisthe used for template building and and matching are template. It is noting that the data used for matching and verification obtained viaworth Experiment 2. Specifically, 18 groups of datatemplate for eachbuilding volunteer, obtained during the first three days, are 2. used as template template, and verification are obtained via Experiment Specifically, 18library groupstoofbuild datathe formatching each volunteer, obtained the remaining groups (12 are groups) used to verification. Moreover, each group includes during the first three days, used are as template library to build the matching template, and21the sample data. remaining groups (12 groups) are used to verification. Moreover, each group includes 21 sample data. However, thesample sampledata dataare areunsteady unsteady in in aa certain certain range ofof VNA and However, the rangeowing owingtotothe theinfluence influence VNA and ambient environment. Moreover, the change of experimental condition sometimes has a great ambient environment. Moreover, the change of experimental condition sometimes has a great impact sample data. Therefore, databeshould be removed the template library. In onimpact sampleon data. Therefore, the error the dataerror should removed from the from template library. In this paper, this paper, a simple and effective method is adopted to remove the error data from template library. a simple and effective method is adopted to remove the error data from template library. Firstly, the Firstly, the sample data of 18 groups for each volunteer are taken as the initial template library lib1, sample data of 18 groups for each volunteer are taken as the initial template library lib1, as shown in as shown in Equation (3). Equation (3).    x11 x12 ·⋯· · x1n    ⋯    x22 ·⋱· · x⋮ 2n  1 = x21⋮    ⋮   lib1 =   .. .. . .   .. ..  ⋯  . ×  .  (3) (3) xm11 xm2 · · · xmn m×n   = m ,1 ≤ ≤    y j = m1 ∑ xij , 1 ≤ j ≤ n    ⋯   ) × = ( i =1    M1 = y1 y2 · · · yn 1×ntemplate library and the value of where represents the number of feature vectors in each initial is 18. represents the number of feature points in each feature vector,library and the value of isof21. where m represents the number of feature vectors in each initial template and the value m is is the initial matching template which consists of 21 feature points. 18. n represents the number of feature points in each feature vector, and the value of n is 21. M1 is the initial matching template which consists of 21 feature points.

Sensors 2017, 17, 125

9 of 18

Sensors 2017, 17, 125

9 of 18

Learning

Verification

Train Data Obtain

Test Data Obtain

Data Clean

Template Matching

HBC Feature Database

Estimated Value

Template Build

Yes

Individual Model

Allow

Decide

No Refuse

Figure 9. Flow diagram of TATM algorithm. Figure 9. Flow diagram of TATM algorithm.

Secondly, the Euclidean distance between the initial matching template

and each feature

vector that belongs to the template library is calculated. The feature vectortemplate will be excluded when Secondly, the Euclidean distance between the initial matching M1 and each feature the Euclidean distance is greater than the threshold . The calculation of Euclidean distance is when the vector that belongs to the template library is calculated. The feature vector will be excluded represented in Equation (4). Euclidean distance is greater than the threshold T1 . The calculation of Euclidean distance is represented ⋯ )× =( in Equation (4).  ∈ 1, 1 ≤ ≤    S = x x · · · x i  i1 i2 in  = | − | = ( − ) ( − 1×)n (4)     S ∈ lib1, 1 ≤ i ≤ m , ≥ i  q = ≤ , (4) D = S − M || = (Si − M1 )T (Si − M1 ) || 1 1 2( i    is the feature vector of initial template library 1, is the Euclidean distance between where   ≥ T , delete and , and is the threshold. 1The value of threshold can be set to 2 in  D1 = Euclidean distance ≤ T1 , save this paper. A new template library lib2 is obtained after the error data are removed from lib1. Subsequently,

where Si is the feature vector of initial template library lib1, D1 is the Euclidean distance between the matching template 2 is generated according to Equation (5). This template is the final feature M1 and S , and T1 is the Euclidean distance threshold. The value of threshold T1 can be set to 2 in vectori of individual, which represents individual’s behavioral trait. this paper. ⋯ ⋯ error data are removed from lib1. Subsequently, A new template library lib2 is obtained after the 2= ⋮ ⋮ ⋱ ⋮ the matching template M2 is generated according to (5). This template is the final feature ⋯ Equation ( ) ( ) ( ) ( )× (5) vector of individual, which represents individual’s behavioral trait. 1

= ,1 ≤ ≤   −  x x · · · x  11 12 1n    x = ( x ⋯ · ·)· × x      22 2n 21  ) ×lib2Matrix, where lib2 is ( −  number of feature vectors which  r is the  have been cleaned, and = . . .  .   .. .. .. ..  is the matching  template used  for verification.   x(m−r)1 x(m−r)2 · · · x(m−r)n (m−r)×n  5.2. Verification   m −r  1   , 1 ≤ j in ≤anfeature vector, TATM based on y0j = mpoints ∑arexij0different Considering that the weights of feature  − r   i =1  with classical Euclidean distance weighted Euclidean distance is proposed in this work. Compared   0 0 0 M = y · · · y y 2 n 2 The calculation 1 calculation method, the calculations are more precise. of TATM based on weighted

(5)

1× n

Euclidean distance is performed as follows. The difference between maximum

1

and minimum

where lib2 is (m − r ) × n Matrix, r is the number of feature vectors which have been cleaned, and M2 is the matching template used for verification. 5.2. Verification Considering that the weights of feature points are different in a feature vector, TATM based on weighted Euclidean distance is proposed in this work. Compared with classical Euclidean distance

Sensors 2017, 17, 125

10 of 18

calculation method, the calculations are more precise. The calculation of TATM based on weighted Euclidean distance is performed as follows. The difference between maximum max1i and minimum min1i of sample data, which belong to template library lib2 at the same frequency, is calculated. The reciprocal of difference is used as the corresponding feature point weight Ci , as shown in Equation (6).      max1j = max x1j , x2j , · · · , x(m−r) j , 0 ≤ j ≤ n    (6) min = min x , x , · · · , x , 0≤j≤n 1j 1j 2j ( m − r ) j     Cj = 1/ max1j − min1j According to the value of matching template M2 , the distance between the feature vector in template library lib2 and matching template M2 is calculated. Then, the maximal value of distance max2 is set to threshold T2 , as shown in Equation (7). s  n 2    D = ∑ Cj xij − M2j , 0 ≤ i ≤ m − r   2i j =1     max2 = max D21 , D22 , D23 , . . . , D2(m−r)    T2 = max2

(7)

where j is the j-th feature point in a feature vector, and D2i is the value of Euclidean distance between matching template M2 and i-th feature vector in lib2. In terms of Equation (7), it is revealed that the threshold and weight are defined by matching template. The advantage of this method is that it does not required many experiments to find the suitable value. T2 is utilized as the verification threshold in TATM algorithm to confirm whether the user is the authorized person. In verification mode, the test sample will be divided into two classes: the I-related and the I-non-related. Under the premise of the acceptable false acceptance rate (FAR), this method can get the smallest false rejection rate (FRR). The final determination condition is shown as Equation (8).  s n 2    Fdata − M D = C ∑  j 2j j  j =1 ( (8)  ≥ T , I − non − related  2  D   < T2 , I − related where Fdata j is the j-th sample data in test feature vector, and D is the distance between test data and matching template M2 . 6. Algorithm Evaluation 6.1. Effect of Data Cleaning Figure 10 demonstrates the variance of 21 feature points in the frequency range 650 MHz to 750 MHz. As demonstrated in Figure 10, the variance of feature points is reduced after data cleaning. The maximum and minimum values are 0.23 and 0.05 before data cleaning, and 0.1736 and 0.0365 after data cleaning, respectively. Therefore, the data cleaning method adopted in this paper is effective at removing error data from template library. On the other hand, the variance of feature points is different at different frequencies after data cleaning. Specifically, the variances of these feature points are 0.0365, 0.1401, 0.1266, 0.1395, 0.1736, and 0.1289, respectively, at frequencies 650 MHz, 665 MHz, 670 MHz, 705 MHz, 740 MHz, and 750 MHz. It is revealed that feature points are not invariable values. A smaller variance of feature point means that the biometric trait is more stable, which is of great help to improve the accuracy of personal verification. Therefore, the weight of feature point of which the variance is relatively small should be

Sensors 2017, 17, 125

11 of 18

set to a higher value to highlight its importance. In contrast, the weight should be decreased if the Sensors 2017, 17, 125 11 of 18 variance of feature point is large.

Figure Figure10. 10.The Thevariance varianceofoffeature featurepoints pointsafter afterdata datacleaning. cleaning.

To thethe influence of Euclidean distance threshold T1 on data the false Tobetter betterunderstand understand influence of Euclidean distance threshold data cleaning, the on cleaning, acceptance rate (FAR) and false rate (FRR) acquired at different threshold T1 . FAR reflects false acceptance rate (FAR) andrejection false rejection rate are (FRR) are acquired at different threshold . FAR the rate at which thewhich imposters are accepted the system, and FRR reflects thereflects rate at which theat reflects the rate at the imposters are into accepted into the system, and FRR the rate authorized users are denied into the system. Thesystem. calculations of FAR andofFRR shown as which the authorized users entry are denied entry into the The calculations FARare and FRR are Equations (9) and (10). Table 3 lists the FAR and FRR at different Euclidean distance threshold T . shown as Equations (9) and (10). Table 3 lists the FAR and FRR at different Euclidean distance 1 threshold . f alse acceptance samples FAR = × 100% (9) total acceptance samples × 100% FAR = (9) f alse rejection samples FRR 100% FRR = = total acceptance samples ××100%

(10) (10)

As listed in Table 3, the Euclidean distance threshold T1 has a great impact on data cleaning As listed in Table 3, the Euclidean distance threshold has a great impact on data cleaning when it is less than 5. Furthermore, the FAR is 5.79% and the FRR is 6.74% when the Euclidean when it is less than 5. Furthermore, the FAR is 5.79% and the FRR is 6.74% when the Euclidean distance threshold T1 is equal to 2. However, the FRR is up to 36.8% and 13.3%, respectively, when the distance threshold is equal to 2. However, the FRR is up to 36.8% and 13.3%, respectively, when Euclidean distance threshold T1 is 1.5 and 2.5. Therefore, considering the relatively low FAR and FRR, the Euclidean distance threshold is 1.5 and 2.5. Therefore, considering the relatively low FAR the Euclidean distance threshold T1 can be set to 2 in this paper. and FRR, the Euclidean distance threshold T can be set to 2 in this paper. Table 3. Influence of Euclidean distance threshold T1 . Table 3. Influence of Euclidean distance threshold . Threshold T1 Threshold FAR FAR FRR

FRR



11

1.51.5

2 2

2.52.5

3 3

3.53.5

4 4

5 5

6 6

7 7

1.09% 5.24% 5.79% 8.26% 15.2% 14.5% 17.6% 17.4% 17.4% 17.4% 1.09% 5.24% 5.79% 8.26% 15.2% 14.5% 17.6% 17.4% 17.4% 17.4% 77.7% 36.8% 6.74% 13.3% 3.33% 4.17% 4.17% 5.0% 5.0% 5.0%

77.7%

36.8%

6.74%

13.3%

3.33%

4.17%

4.17%

5.0%

5.0%

5.0%

6.2. The EER 6.2. The EER In this section, 120 groups of data obtained during Days 4 and 5 in Experiment 2 are adopted to In this section, 120 groups of data obtained during Days 4 and 5 in Experiment 2 are adopted to calculate the FAR, FRR and equal error rate (EER). Figure 11 shows the values of FAR and FRR when calculate the FAR, FRR and equal error rate (EER). Figure 11 shows the values of FAR and FRR when the verification threshold T2 is from 0.8 to 2.8. As shown in Figure 11, the range of FRR is from 80% to the verification threshold is from 0.8 to 2.8. As shown in Figure 11, the range of FRR is from 80% 0.5%, and the range of FAR is from 0.1% to 18%. Furthermore, the EER is 7.06% when the FAR is equal to 0.5%, and the range of FAR is from 0.1% to 18%. Furthermore, the EER is 7.06% when the FAR is to FRR at verification threshold T2 = 1.91. equal to FRR at verification threshold = 1.91.

Sensors 2017, 17, 125 Sensors 2017, 17, 125

12 of 18 12 of 18

Error rate(%)

FRR

EER FAR=FRR=7.06% at T2=1.91

FAR Verification threshold T2 Figure11. 11.FAR FARand andFRR FRRfor fordifferent differentverification verificationthreshold thresholdT . . Figure 2

6.3. Algorithm Comparison 6.3. Algorithm Comparison In this paper, the TATM based on weighted Euclidean distance is compared with K-nearest In this paper, the TATM based on weighted Euclidean distance is compared with K-nearest neighbor (KNN) classification, support vector machines (SVM) and naive Bayesian method (NBM). neighbor (KNN) classification, support vector machines (SVM) and naive Bayesian method (NBM). All algorithms are implemented by MATLAB on a personal computer. Furthermore, the SVM is All algorithms are implemented by MATLAB on a personal computer. Furthermore, the SVM is achieved by the LIBSVM which is a library designed by Taiwan University [40], and the KNN and achieved by the LIBSVM which is a library designed by Taiwan University [40], and the KNN and NBM are acquired from MATLAB function library. A total of 120 groups of sample data are used as NBM are acquired from MATLAB function library. A total of 120 groups of sample data are used as the test data. The FAR and FRR of different algorithms are listed in Table 4. Additionally, the the test data. The FAR and FRR of different algorithms are listed in Table 4. Additionally, the running running time of algorithm is listed in Table 5. time of algorithm is listed in Table 5. Table 4. FAR and FRR of different algorithms. Table 4. FAR and FRR of different algorithms.

TATM FAR TATM FRR Volunteer FAR FRR 1 0.95% 0 2 1 15.24% 00 0.95% 2 15.24% 0 3 3.81% 25% 3 3.81% 25% 4 1.89% 0 4 1.89% 0 5 5 00 8.33% 8.33% 6 6 13.21% 00 13.21% 6.67% 25% 7 7 6.67% 25% 3.77% 9.09% 8 8 3.77% 9.09% 9 12.38% 0% 9 12.38% 0% 10 0 0 10 0 0 Average 5.79% 6.74% Average 5.79% 6.74%

Volunteer

KNN FAR KNN FRR FAR FRR 7.41% 8.33% 8.33% 33.33% 7.41% 8.33% 8.33% 33.33% 4.63% 66.67% 4.63% 66.67% 3.70% 8.33% 3.70% 8.33% 00 25% 25% 6.48% 50.0% 6.48% 50.0% 0.93% 58.33% 0.93% 58.33% 3.70% 33.33% 3.70% 33.33% 6.48% 91.67% 6.48% 91.67% 0 0 0 0 4.17% 37.5% 4.17% 37.5%

SVM SVM FRR FAR FAR FRR 0 0 7.41% 58.33% 0 0 7.41% 5.56% 58.33% 25.0% 5.56% 2.78% 25.0% 8.33% 2.78% 8.33% 0 33.33% 0 33.33% 5.56% 8.33% 8.33% 5.56% 1.85% 1.85% 91.67% 91.67% 10.19% 10.19% 16.67% 16.67% 3.70% 91.67% 3.70% 91.67% 0 0 0 0 3.37% 33.33% 3.37% 33.33%

NBM NBM FAR FRR FAR0 FRR 16.67% 7.41% 41.67% 0 16.67% 7.41% 41.67% 10.19% 41.67% 10.19% 3.70% 41.67% 8.33% 3.70% 8.33% 0 41.67% 0 41.67% 4.63% 25.0% 25.0% 4.63% 0.93% 0.93% 25.0% 25.0% 3.70% 3.70% 41.67% 41.67% 7.41% 100% 7.41% 100% 0 0 0 3.80% 34.17% 0 3.80% 34.17%

Table 5. Running time of different algorithms Table 5. Running time of different algorithms Algorithm TATM TATM Algorithm Running 0.019 Running time time (s) (s) 0.019

KNN KNN

SVM SVM NBMNBM

0.310 0.310

0.0385 0.0385 0.168 0.168

Asillustrated illustratedininTable Table Volunteers 4, and 10, KNN shows a good performance low As 4, 4, forfor Volunteers 1, 4,1,and 10, KNN shows a good performance of lowofFAR FARFRR. andHowever, FRR. However, KNN has a disappointing for other volunteers. TheisFRR is more than and KNN has a disappointing result result for other volunteers. The FRR more than 50% 50% for Volunteers 3, 6, 7, and 9. Thus, the KNN is unsuitable for biometric verification based on for Volunteers 3, 6, 7, and 9. Thus, the KNN is unsuitable for biometric verification based on HBC. HBC. The FRR obtained byisSVM more10% thanfor 10% for Volunteers 7, 8,9.and 9. Moreover, the The FRR obtained by SVM moreisthan Volunteers 2, 3, 5,2, 6,3,7,5,8,6,and Moreover, the FRR FRR of Volunteers 7 and 9 is 91.67%. The FRR of SVM is so large that it is inappropriate for verification. Similarly, the NBM also shows a bad performance, and the FRR is greater than 10% for

Sensors 2017, 17, 125

13 of 18

2017, 17,7125 13 of 18 of Sensors Volunteers and 9 is 91.67%. The FRR of SVM is so large that it is inappropriate for verification. Similarly, the NBM also shows a bad performance, and the FRR is greater than 10% for eight volunteers volunteers in On the the measurement. othershows hand,athe TATM shows a good performance for in eight the measurement. other hand,On thethe TATM good performance for different volunteers different volunteers (Table 4). The average values of FAR and FRR are 5.79% and 6.74%, (Table 4). The average values of FAR and FRR are 5.79% and 6.74%, respectively. Furthermore, as listed respectively. Furthermore, as listed in Table 5, the running time of TATM is the shortest (0.019 s), in Table 5, the running time of TATM is the shortest (0.019 s), whereas the running time of KNN is whereas the running time of KNN is up to 0.310 s, while the running times of SVM and NBM are up to 0.310 s, while the running times of SVM and NBM are 0.0385 s and 0.168 s, respectively. Thus, 0.0385 s and 0.168 s, respectively. Thus, it can be concluded that the TATM is more suitable for rapid it can be concluded that the TATM is more suitable for rapid verification owing to it has lower FRR verification owing to it has lower FRR and shorter running time. and shorter running time. The influence of the number of feature vectors on FAR and FRR is investigated next. Figure 12 The influence of the number of feature vectors on FAR and FRR is investigated next. Figure 12 describes the FAR and FRR with different numbers of feature vectors. In Figure 12a, it can be describes thethat FAR FRR with different numbers of feature vectors. In Figure 12a, it can be observed observed theand FAR of three algorithms is less than 6% when the number of feature vectors is 18. that the FAR of three algorithms is less than 6% when the number of feature vectors is 18. Additionally, Additionally, as demonstrated in Figure 12b, the FRR is sensitive to the numbers of feature vectors. as The demonstrated Figure 12b, FRR is sensitive to the FRRs FRRs of allin algorithms arethe greater than 50% when thenumbers numbersofoffeature featurevectors. vectors The is equal toof 3. all algorithms are greater than 50% when the numbers of feature vectors is equal to 3. However, the FRR However, the FRR of SVM and NBM is approximately 25%, and the FRR of TATM is only 6.74% of when SVM and NBM isofapproximately thecompared FRR of TATM is only thepresents numbera of the number feature vectors25%, is 18.and Thus, with SVM and6.74% NBM,when TATM feature lowervectors FRR. is 18. Thus, compared with SVM and NBM, TATM presents a lower FRR.

The number of feature vectors

The number of feature vectors (a)

(b)

Figure 12. The influence of the number of feature vectors: (a) FAR; and (b) FRR. Figure 12. The influence of the number of feature vectors: (a) FAR; and (b) FRR.

Table 6 lists the EER, running time, and computational memory of biometric verification based Table the EER, running time, memory biometric verification based on HBC 6inlists previous works. In [34], theand EERcomputational of 0.56% is achieved byof SVM. However, the number of on HBC in previous works. In [34], the EER of 0.56% is achieved by SVM. However, the number of feature feature vectors is 160, and the number of feature points for each feature vector is up to 1600. vectors is 160, and numbertime of feature points for eachmemory feature vector is up 1600. Furthermore, Furthermore, thethe running and computational of SVM in to Reference [34] are s and 91 MB. In Reference [31], in theReference EER of 25% obtained by SVM 9.941 when s40 theapproximately running time 9.941 and computational memory of SVM [34]isare approximately and feature vectors and each feature vector includes 100 feature points are adopted. In our paper, the 91 MB. In Reference [31], the EER of 25% is obtained by SVM when 40 feature vectors and each feature EER includes of 7.06% is achieved TATM when 18 feature vectors arethe utilized. the number of vector 100 featureby points are adopted. In our paper, EER ofFurthermore, 7.06% is achieved by TATM feature points vectors in each are feature vectorFurthermore, is only 21. Additionally, thefeature running time in and computational when 18 feature utilized. the number of points each feature vector memory TATM in thisthe article are 0.019 and 2computational MB, respectively. Thus, itofisTATM concluded thatarticle TATMare is only 21. of Additionally, running times and memory in this can provide a rapid verification with a relatively low running time and computational memory. 0.019 s and 2 MB, respectively. Thus, it is concluded that TATM can provide a rapid verification with a

relatively low running time and computational memory.

Table 6. Comparison with previous works.

Table 6. Comparison with[34] previous works. [31]

The number of feature vectors Feature point in each feature vector TheAlgorithm number of feature vectors Feature point in each feature vector EER Algorithm Running time EER Running time Computational memory Computational memory

160 [34] 1600 160 SVM 1600 0.56% SVM 9.941 0.56% s 9.941 s 91 MB 91 MB

[31] 40 100 SVM 25% -

This Article 40 18 This Article 100 21 SVM 18 TATM 21 25% TATM 7.06% 7.06% 0.019 s - 0.019 s 2 MB 2 MB

Sensors 2017, 17, 125

14 of 18

6.4. Discussion As listed in Table 4, it is worth noting that both the FAR and FRR of Volunteer 10 are equal to zero, which may be associated with the volunteer herself. Specifically, the forearm of Volunteer 10 is thinner than the other volunteers, which led to her transmission gain S21 being quite different. On the whole, as listed in Table 4, The FRR of KNN, SVM, and NBM is high even when the parameters of algorithms were varied, which may be related with the number of training data [27]. In the learning groups, the training data for each volunteer (18 groups of data) are fewer than those of others (162 groups of data), so a volunteer’s classification area is narrower and might overlap with those of other volunteers, which leads to a high FRR. However, the FRR of TATM is relatively low, which is associated with the verification threshold T2 . The verification threshold T2 is threshold-adaptive in this paper, namely, the verification threshold T2 of each volunteer is mainly dependent on the number of each volunteer’s own training data rather than those of others. Thus, the TATM shows low FRR. 7. Conclusions This paper proposes a rapid biometric verification for application in wearable devices. The transmission gain S21 of individual is measured in the frequency range 0.3 MHz to 1500 MHz. The results indicate that there is significantly different transmission gain S21 among individuals, and the transmission gain S21 for the same individual is steady over a period of time. Furthermore, it is also revealed that the chosen frequency for biometric verification based on HBC is 650 MHz to 750 MHz. In addition, a threshold-adaptive template matching (TATM) algorithm based on weighted Euclidean distance is proposed in this paper. In order to achieve rapid verification, 18 groups of data, each group including 21 sample data, are used as the template library. In terms of template library, the matching template used for personal verification is built after the data cleaning. Meanwhile, the weights of feature points are calculated. The results show that the TATM algorithm presents a good performance with relative lower FAR and FRR, 5.79% and 6.74%, respectively. In contrast, the FAR and FRR were 4.17% and 37.5%, 3.37% and 33.33%, and 3.80% and 34.17%, respectively, using KNN, SVM, and NBM. In addition, the running time of TATM is the shortest (0.019 s), while the running times of KNN, SVM and NBM are 0.310 s, 0.0385 s, and 0.168 s, respectively. Compared with other algorithms, the TATM based on weighted Euclidean distance has lower FRR and shorter running time. Therefore, the TATM proposed in this paper may be a potential solution for rapid verification for wearable devices. In the near future, the biometric verification based on HBC and the TATM algorithm will be achieved in a wearable prototype. Acknowledgments: This work was supported by the National Natural Science Foundation of China under Grant No. 61403366 and No. U1505251; Guangdong Science and Technology Plan Project under Grant No. 2015A020214018 and No. 2015B020233004; Shenzhen Basic Research Project Fund under Grant No. JCYJ20150401150223630; Shenzhen Technology Development Project Fund under Grant No. CXZZ20150505093829778 and Shenzhen Public Technology Service Platform Improvement Project of Biomedical Electronics. Author Contributions: Jingzhen Li and Zengyao Pang performed the experiments and wrote the paper; Zedong Nie provided the initial idea of this research and provided many useful comments; Yuhang Liu and Wenjian Qin worked for the data collection and analysis; and Lei Wang modified the grammar. Conflicts of Interest: The authors declare no conflict of interest.

Appendix A The algorithms of KNN, NBM and SVM are introduced as follows. A.1. KNN KNN is usually used for clustering with the advantage of simple principle and fast running speed for large datasets. The main idea of KNN is that the datasets are divided into different categories by the iterative process. The detailed steps for KNN are as follows.

Sensors 2017, 17, 125

(1) (2) (3) (4)

15 of 18

The dataset X and the number of clustering N (N > 1) are set at initialization time. N objects are randomly selected as the initial cluster centers in dataset X. The Euclidean distance between each object and the cluster centers is calculated. According to the principle of minimum distance, datasets will be divided into N classes again. The average value of each class is used as a new clustering center. If the new clustering center is equal to the cluster center, the iterative process stops; otherwise, repeat Step 2 and Step 3.

A.2. NBM NBM, which is based on the probability density function, is an efficient and simple classification algorithm. NBM can be used to describe the relation between conditional probability and classification in the system, as shown in Equation (A1). P(B|A) =

P(A|B)P(B) P(A)

(A1)

Compared with the other classification methods, NBM has lower time complexity and higher accuracy. As a well-developed classification method, NBM has been widely used in classification. The steps of NBM are as follows. (1) (2)

X = { a1 , a2 , . . . , am } and C = {y1 , y2 , . . . , yn } are set as a sorting item and collection of categories, respectively. C is trained in advance. The Conditional probability P(yi |X) for the sorting item X is calculated by Equation (A2). P( y i |X) =

(3)

P ( X | yi ) , 0 0 is Lagrange multiplier. The solution of the optimization problem is determined by the saddle point of the Lagrange function. This solution’s partial derivatives of b and ω are 0 at the saddle point. The quadratic programming (QP) problem is transformed into a dual problem.  l     maxQ(a) = ∑ a j − j =1

1 2

l

l

∑ ∑ ai a j yi y j xi · x j



i =1 j =1

(A9)

l

   

s.t. ∑ a j y j = 0 i, j = 1, 2, . . . , l a j ≥ 0 j =1

The solution is obtained by Equations (A8) and (A9).       

a∗ = a1∗ , a2∗ , . . . , a∗l

T

l

ω ∗ = ∑ a∗j y j x j

(A10)

j =1   l      b∗ = yi − ∑ y j a∗j x j · xi . j =1

Finally, the optimal classification function is obtained according to Equation (A5) and (A10). ( f(x) = sgn{(w∗ · x ) + b∗ } = sgn

∑ a∗j y j

)

!

l

x j · xi



+ b∗

(A11)

j =1

References 1. 2.

3.

4.

5. 6. 7.

Gravina, R.; Alinia, P.; Ghasemzadeh, H.; Fortino, G. Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges. Inf. Fusion 2016, 35, 68–80. [CrossRef] Fortino, G.; Giannantonio, R.; Gravina, R.; Kuryloski, P.; Jafari, R. Enabling Effective Programming and Flexible Management of Efficient Body Sensor Network Applications. IEEE Trans. Hum. Mach. Syst. 2013, 43, 115–133. [CrossRef] Fortino, G.; Giampa, V. PPG-based methods for non invasive and continuous blood pressure measurement: An overview and development issues in body sensor networks. In Proceedings of the IEEE International Workshop on Medical Measurements and Applications Proceedings, Ottawa, ON, Canada, 30 April–1 May 2010; pp. 10–13. Choi, H.; Naylon, J.; Luzio, S.; Beutler, J.; Birchall, J.; Martin, C.; Porch, A. Design and in Vitro Interference Test of Microwave Noninvasive Blood Glucose Monitoring Sensor. IEEE Trans. Microw. Theory Tech. 2015, 63, 3016–3025. [CrossRef] [PubMed] Gravina, R.; Fortino, G. Automatic Methods for the Detection of Accelerative Cardiac Defense Response. IEEE Trans. Affect. Comput. 2016, 7, 286–298. [CrossRef] Ghasemzadeh, H.; Jafari, R. Coordination Analysis of Human Movements With Body Sensor Networks: A Signal Processing Model to Evaluate Baseball Swings. IEEE Sens. J. 2011, 11, 603–610. [CrossRef] Fortino, G.; Galzarano, S.; Gravina, R.; Li, W. A framework for collaborative computing and multi-sensor data fusion in body sensor networks. Inf. Fusion 2015, 22, 50–70. [CrossRef]

Sensors 2017, 17, 125

8.

9. 10. 11. 12. 13. 14. 15. 16. 17.

18. 19. 20.

21. 22. 23.

24.

25. 26. 27. 28.

29. 30.

17 of 18

Friedman, N.; Rowe, J.B.; Reinkensmeyer, D.J.; Bachman, M. The manumeter: A wearable device for monitoring daily use of the wrist and fingers. IEEE J. Biomed. Health Inform. 2014, 18, 1804–1812. [CrossRef] [PubMed] Su, S.W.; Hsieh, Y.T. Integrated Metal-Frame Antenna for Smartwatch Wearable Device. IEEE Trans. Antennas Propag. 2015, 63, 3301–3305. [CrossRef] Wannenburg, J.; Malekian, R. Body Sensor Network for Mobile Health Monitoring, a Diagnosis and Anticipating System. IEEE Sens. J. 2015, 15, 6839–6852. [CrossRef] Ignatenko, T.; Willems, F.M.J. Biometric Systems: Privacy and Secrecy Aspects. IEEE Trans. Inf. Forensic Secur. 2009, 4, 956–973. [CrossRef] Zhang, K.; Yang, K.; Liang, X.; Su, Z. Security and privacy for mobile healthcare networks: From a quality of protection perspective. IEEE Wirel. Commun. 2015, 22, 104–112. [CrossRef] Lim, M.H.; Yuen, P.C. Entropy Measurement for Biometric Verification Systems. IEEE Trans. Cybern. 2015, 46, 1065–1077. [CrossRef] [PubMed] Zareen, F.J.; Jabin, S. Authentic mobile-biometric signature verification system. IET Biom. 2016, 5, 13–19. [CrossRef] He, D.; Wang, D. Robust Biometrics-Based Authentication Scheme for Multiserver Environment. IEEE Syst. J. 2014, 9, 816–823. [CrossRef] Jain, A.K.; Ross, A.; Prabhakar, S. An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 2004, 14, 4–20. [CrossRef] Hsieh, S.H.; Li, Y.H.; Tien, C.H.; Chang, C.C. Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution. IEEE Trans. Cybern. 2016, 46, 3342–3350. [CrossRef] [PubMed] Chih-Lung, L.; Kuo-Chin, F. Biometric verification using thermal images of palm-dorsa vein patterns. IEEE Trans. Circuits Syst. Video Technol. 2004, 14, 199–213. Odinaka, I.; Lai, P.H.; Kaplan, A.D.; O’Sullivan, J.A.; Sirevaag, E.J.; Rohrbaugh, J.W. ECG Biometric Recognition: A Comparative Analysis. IEEE Trans. Inf. Forensic Secur. 2012, 7, 1812–1824. [CrossRef] Mathur, S.; Vjay, A.; Shah, J.; Das, S.; Malla, A. Methodology for partial fingerprint enrollment and authentication on mobile devices. In Proceedings of the 2016 International Conference on Biometrics (ICB), Halmstad, Sweden, 13–16 June 2016; pp. 1–8. Klonovs, J.; Petersen, C.K.; Olesen, H.; Hammershoj, A. ID Proof on the Go: Development of a Mobile EEG-Based Biometric Authentication System. IEEE Veh. Technol. Mag. 2013, 8, 81–89. [CrossRef] Peter, S.; Reddy, B.P.; Momtaz, F.; Givargis, T. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks. Sensors 2016, 16, 570. [CrossRef] [PubMed] Choudhary, T.; Manikandan, M.S. Robust Photoplethysmographic (PPG) Based Biometric Authentication for Wireless Body Area Networks and m-Health Applications. In Proceedings of the National Conference on Communication, Guwahati, Assam, India, 4–6 March 2016; pp. 1–6. Derawi, M.; Voitenko, I. Fusion of gait and ECG for biometric user authentication. In Proceedings of the 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 10–12 September 2014; pp. 1–4. Kim, D.J.; Chung, K.W.; Hong, K.S. Person Authentication using Face, Teeth and Voice Modalities for Mobile Device Security. IEEE Trans. Consum. Electron. 2010, 56, 2678–2685. [CrossRef] Sun, Z.; Zhang, H.; Tan, T.; Wang, J. Iris Image Classification Based on Hierarchical Visual Codebook. IEEE Trans. Pattern Anal. Mach. Intell. 2013, 36, 1120–1133. [CrossRef] [PubMed] Farmanbar, M.; Toygar, Ö. A Hybrid Approach for Person Identification Using Palmprint and Face Biometrics. Int. J. Pattern Recognit. Artif. Intell. 2015, 29, 671–682. [CrossRef] Guzman, A.M.; Goryawala, M.; Wang, J.; Barreto, A.; Andrian, J.; Rishe, N.; Adjouadi, M. Thermal Imaging as a Biometrics Approach to Facial Signature Authentication. IEEE J. Biomed. Health Inform. 2013, 17, 214–222. [CrossRef] [PubMed] Mayron, L.M. Biometric Authentication on Mobile Devices. IEEE Secur. Priv. 2015, 13, 70–73. [CrossRef] Nakanishi, I.; Yorikane, Y.; Itoh, Y.; Fukui, Y. Biometric Identity Verification Using Intra-Body Propagation Signal. In Proceedings of the 2007 Biometrics Symposium, Baltimore, MD, USA, 11–13 September 2007; pp. 1–6.

Sensors 2017, 17, 125

31.

32.

33.

34.

35.

36. 37.

38.

39.

40.

18 of 18

Nakanishi, I.; Inada, T.; Sodani, Y.; Shigang, L. Performance Evaluation of Intra-palm Propagation Signals as Biometrics. In Proceedings of the International Conference on Biometrics and Kansei Engineering, Tokyo, Japan, 5–7 July 2013; pp. 91–94. Nakanishi, I.; Sodani, Y. SVM-Based Biometric Authentication Using Intra-Body Propagation Signals. In Proceedings of the IEEE International Conference on Advanced Video and Signal Based Surveillance, Boston, MA, USA, 29 August–1 September 2010; pp. 561–566. Rasmussen, K.B.; Roeschlin, M.; Martinovic, I.; Tsudik, G. Authentication using pulse-response biometrics. In Proceedings of the Proceedings of the Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, USA, 23–26 February 2014; pp. 1–14. Xia, M.; Ma, J.; Li, J.; Liu, Y.; Zeng, Y.; Nie, Z. Gradient and SVM based biometric identification using human body communication. In Proceedings of the 2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS), Chongqing, China, 28–29 May 2016; pp. 61–65. Wu, J.; Cai, Z.; Gao, Z. Dynamic K-Nearest-Neighbor with Distance and attribute weighted for classification. In Proceedings of the 2010 International Conference on Electronics and Information Engineering (ICEIE), Kyoto, Japan, 1–3 August 2010; pp. V1-356–V1-360. Shilton, A.; Palaniswami, M.; Ralph, D.; Tsoi, A.C. Incremental training of support vector machines. IEEE Trans. Neural Netw. 2005, 16, 114–131. [CrossRef] [PubMed] Zhang, C.; Wang, J. Attribute weighted Naive Bayesian classification algorithm. In Proceedings of the 2010 5th International Conference on Computer Science and Education (ICCSE), Hefei, China, 24–27 August 2010; pp. 27–30. Wegmueller, M.S.; Kuhn, A.; Froehlich, J.; Oberle, M.; Felber, N.; Kuster, N.; Fichtner, W. An attempt to model the human body as a communication channel. IEEE Trans. Biomed. Eng. 2007, 54, 1851–1857. [CrossRef] [PubMed] Biggio, B.; Fumera, G.; Russu, P.; Didaci, L. Adversarial Biometric Recognition: A review on biometric system security from the adversarial machine-learning perspective. IEEE Signal Process. Mag. 2015, 32, 31–41. [CrossRef] Chang, C.C.; Lin, C.J. Training v-support vector classifiers: Theory and algorithms. Neural Comput. 2001, 13, 2119–2147. [CrossRef] [PubMed] © 2017 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).

An Approach to Biometric Verification Based on Human Body Communication in Wearable Devices.

In this paper, an approach to biometric verification based on human body communication (HBC) is presented for wearable devices. For this purpose, the ...
3MB Sizes 0 Downloads 13 Views