2022
DOI: 10.1109/access.2022.3167667
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of PPG Feature Values Toward Biometric Authentication Against Presentation Attacks

Abstract: Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 37 publications
0
1
0
Order By: Relevance
“…They did not include any MFCCs computed through multiple signal processing methods, such as the Fourier transform, which reflected the personal distinctiveness of PPG frequency characteristics. Meanwhile, our previous study evaluated the feature values that contributed to the initial PPG-based authentication and PA by computing and comparing PIs, which demonstrated the effectiveness of MFCCs in the initial authentication against the PA [46]. Therefore, the result suggested that the feature values as soft biometrics contributing to the proposed countermeasure might be different from the values as the personal distinctiveness contributing to the initial authentication.…”
Section: ) Evaluation Of Measurement Site Identificationmentioning
confidence: 99%
“…They did not include any MFCCs computed through multiple signal processing methods, such as the Fourier transform, which reflected the personal distinctiveness of PPG frequency characteristics. Meanwhile, our previous study evaluated the feature values that contributed to the initial PPG-based authentication and PA by computing and comparing PIs, which demonstrated the effectiveness of MFCCs in the initial authentication against the PA [46]. Therefore, the result suggested that the feature values as soft biometrics contributing to the proposed countermeasure might be different from the values as the personal distinctiveness contributing to the initial authentication.…”
Section: ) Evaluation Of Measurement Site Identificationmentioning
confidence: 99%
“…While PPG-based authentication is still in its early stages [8], various spoofing attacks have been attempted against PPG-based authentication systems. One example is the use of stealthy recording of PPG signals from non-genuine measurement sites (also known as presentation attacks) to deceive PPG-based authentication systems [12]. Another approach is to remotely steal PPG signals from video recordings of the victim, known as remote PPG (rPPG), which can be used to breach the authentication system [13].…”
Section: Introductionmentioning
confidence: 99%
“…While PPG-based authentication is still in its early stages [8], various spoofing attacks have been attempted against PPG-based authentication systems. One example is the use of stealthy recording of PPG signals from non-genuine measurement sites (also known as presentation attacks) to deceive PPG-based authentication systems [12]. Another approach is to remotely steal PPG signals from video recordings of the victim, known as remote PPG (rPPG), which can be used to breach the authentication system [13].…”
Section: Introductionmentioning
confidence: 99%