Broken Heart: Privacy Leakage Analysis on ECG-Based Authentication Schemes
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Noh, Seungil | - |
dc.contributor.author | Kim, Jaehan | - |
dc.contributor.author | Lee, Seokmin | - |
dc.contributor.author | Kang, Youngshin | - |
dc.contributor.author | Park, Cheolsoo | - |
dc.contributor.author | Shin, Youngjoo | - |
dc.date.accessioned | 2022-11-15T23:40:34Z | - |
dc.date.available | 2022-11-15T23:40:34Z | - |
dc.date.created | 2022-11-15 | - |
dc.date.issued | 2022-09-29 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/145531 | - |
dc.description.abstract | Authentications using biometrics, such as fingerprint recognition and electrocardiogram (ECG), have been actively used in various applications. Unlike traditional authentication methods, such as passwords or PINs, biometric-based authentication has an advantage in terms of security owing to its capability of liveness detection. Among the various types of biometrics, ECG-based authentication is widely utilized in many fields. Because of the inherent characteristics of ECG, however, the incautious design of ECG-based authentication may result in serious leakage of personal private information. In this paper, we extensively investigate ECG-based authentication schemes previously proposed in the literature and analyze possible privacy leakages by employing machine learning and deep learning techniques. We found that most schemes suffer from vulnerabilities that lead to the leakage of personal information, such as gender, age, and even diseases. We also identified some privacy-insensitive ECG fiducial points by utilizing feature selection algorithms. Based on these features, we present a privacy-preserving ECG-based authentication scheme. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.subject | INTERINDIVIDUAL VARIABILITY | - |
dc.subject | BIOMETRIC AUTHENTICATION | - |
dc.subject | PROTOCOL | - |
dc.subject | IDENTIFICATION | - |
dc.subject | ALGORITHM | - |
dc.subject | INTERVAL | - |
dc.title | Broken Heart: Privacy Leakage Analysis on ECG-Based Authentication Schemes | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Shin, Youngjoo | - |
dc.identifier.doi | 10.1155/2022/7997509 | - |
dc.identifier.scopusid | 2-s2.0-85139755670 | - |
dc.identifier.wosid | 000868599400005 | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, v.2022 | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.volume | 2022 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | INTERINDIVIDUAL VARIABILITY | - |
dc.subject.keywordPlus | BIOMETRIC AUTHENTICATION | - |
dc.subject.keywordPlus | PROTOCOL | - |
dc.subject.keywordPlus | IDENTIFICATION | - |
dc.subject.keywordPlus | ALGORITHM | - |
dc.subject.keywordPlus | INTERVAL | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.