amount of data to generate the public key. As long as
the selected prototypes are able to capture the relevant
characteristics of the heartbeats, the biometric system
should be able to maintain its performance.
Another interesting perspective of the proposed
cloud-based biometric system is the change of the pu-
blic key, which can be made by applying another clus-
tering algorithm, or changing the number of prototy-
pes in the clustering algorithms used in this paper. In
this case, it should be highlighted that a simple per-
mutation of the prototypes after training the classifier
shows an error rate higher than 95% for all three spa-
ces. This means that, when the system is attacked,
a mere permutation of the public key is able to sig-
nificantly change the identification process, whereas
a more substantial change should make sure that an
hacker obtaining the remotely-stored user key can no
longer be identified by the system.
6 CONCLUSIONS
This paper proposes a new ECG-based biometric ap-
proach for cloud systems, which locally encrypts the
ECG signal through a dissimilarity representation.
Such representation is obtained by applying a non-
linear and non-invertible transformation, the dissimi-
larity increments, between the public key, stored on
the server, and the real-time acquired ECG signal.
This provides significant advantages, as it does not
require the users’ ECG signals to be stored on the ser-
ver, but only a transformed version of it. In traditio-
nal approaches a hacker might be able to retrieve the
original ECG signal and thus forever compromise the
usage of ECG biometrics for that user. However, in
the proposed system, the hacker will only capture the
public key and a transformed version of the signal.
Accordingly, under such circumstances, a new public
key can be easily generated by simply selecting a new
set of prototypes and by asking the user to perform a
new enrollment.
The experimental results show that the proposed
methodology provides no significant degradation in
the identification error rates, especially when the se-
lected prototypes are generated from a reference da-
taset, independent of the users data, i.e., it is compo-
sed by the ECG signals of independent (unidentified)
users.
ACKNOWLEDGEMENTS
This work was supported by the Portuguese Founda-
tion for Science and Technology, under scholarship
number SFRH/BPD/103127/2014 and grant number
PTDC/EEI-SII/7092/2014.
REFERENCES
Aggarwal, C. C. and Yu, P. S. (2008). Privacy-preserving
data mining: models and algorithms, volume 34 of
Advances in Database Systems. Springer.
Aidos, H. and Fred, A. (2015). A novel data representa-
tion based on dissimilarity increments. In Feragen,
A., Loog, M., and Pelillo, M., editors, Lecture No-
tes in Computer Science (including subseries Lecture
Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), volume 9370, pages 1–14. Springer,
Copenhagen, Denmark.
Alves, A. P., Silva, H., Lourenc¸o, A., and Fred, A. (2013).
BITalino: A Biosignal Acquisition System based on
the Arduino. In Proceedings of the International Con-
ference on Bio-Inspired Systems and Signal Proces-
sing (BIOSIGNALS), pages 261–264.
Barold, S. S. (2003). Willem einthoven and the birth of cli-
nical electrocardiography a hundred years ago. Car-
diac electrophysiology review, 7(1):99–104.
Canento, F., Lourenc¸o, A., Silva, H., and Fred, A. (2013).
Review and Comparison of Real Time Electrocardio-
gram Segmentation Algorithms for Biometric Appli-
cations. In Proceedings of the International Confe-
rence on Health Informatics (HEALTHINF).
Carreiras, C., Lourenc¸o, A., Fred, A., and Ferreira, R.
(2014). ECG Signals for Biometric Applications - Are
we there yet? In Proceedings of the 11th Internati-
onal Conference on Informatics in Control, Automa-
tion and Robotics, pages 765–772, Vienna, Austria.
SCITEPRESS - Science and and Technology Publica-
tions.
Fratini, A., Sansone, M., Bifulco, P., and Cesarelli, M.
(2015). Individual identification via electrocardi-
ogram analysis. Biomedical engineering online,
14(1):78.
Fred, A. L. N. and Leit
˜
ao, J. M. N. (2003). A new cluster
isolation criterion based on dissimilarity increments.
IEEE Transactions on Pattern Analysis and Machine
Intelligence, 25(8):944–958.
Friesen, G. M., Jannett, T. C., Jadallah, M. A., Yates, S. L.,
Quint, S. R., and Nagle, H. T. (1990). A Compari-
son of the Noise Sensitivity of Nine QRS Detection
Algorithms. IEEE Transactions on Biomedical Engi-
neering, 37(1):85–98.
Garc
´
ıa, S., Derrac, J., Cano, J. R., and Herrera, F. (2012).
Prototype Selection for Nearest Neighbor Classifica-
tion: Taxonomy and Empirical Study. IEEE Tran-
sactions on Pattern Analysis and Machine Intelli-
gence, 34(3):417–435.
Hejazi, M., Al-Haddad, S., Singh, Y. P., Hashim, S. J., and
Aziz, A. F. A. (2016). ECG biometric authentication
based on non-fiducial approach using kernel methods.
Digital Signal Processing, 52:72–86.
Protecting the ECG Signal in Cloud-based User Identification System - A Dissimilarity Representation Approach
85