“…In other words, this does not mean that the heart signal is not random. 6 tests [14] Chi-Square [12,91,153] No tests [13,19,140,142,92,149,152,150,154,106,89,90,88,16,158,159] 6. Challenges and Conclusions Challenges and Directions.…”
This article surveys the literature over the period 2003-2021 on heart-based biometric protocols. In particular, we focus on how the heart signal is transformed from a continuous wave to discrete values to be used afterwards in authentication protocols. We explain and classify the surveyed proposals according to three main parameters: i) the dataset they use for testing their results; ii) the delineation algorithms they use to extract the fiducial points, and; iii) the cryptographic tests they run (if any) to validate how random the extracted token is.
“…In other words, this does not mean that the heart signal is not random. 6 tests [14] Chi-Square [12,91,153] No tests [13,19,140,142,92,149,152,150,154,106,89,90,88,16,158,159] 6. Challenges and Conclusions Challenges and Directions.…”
This article surveys the literature over the period 2003-2021 on heart-based biometric protocols. In particular, we focus on how the heart signal is transformed from a continuous wave to discrete values to be used afterwards in authentication protocols. We explain and classify the surveyed proposals according to three main parameters: i) the dataset they use for testing their results; ii) the delineation algorithms they use to extract the fiducial points, and; iii) the cryptographic tests they run (if any) to validate how random the extracted token is.
“…A semisupervised clustering scheme for key generation is developed in [27] that delivers consistent and discriminative keys for handwritten signatures. Zaghouani and others [28] design and assess a secure sketch scheme for ECG templates that preserves performance identification of the unprotected systems and maintains an acceptable identification speed as compared to the slower identification speed in fuzzy commitment scheme. A quantization scheme is used by Anees and Chen [29] which caters to the variations in the face templates along with providing security and reducing the feature size.…”
“…[36] planned to focus on a stronger projection matrix design for their proposed work. [28] considered the incorporation of a secure sketch with a secret key, thereby combining key binding and key generation approaches. Face and fingerprint are the two popular modalities for developing biometric template protection schemes when dealing with deep neural networks, leading to other behavioral biometrics being overlooked.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.