帳號:guest(3.142.174.13)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):梁晉綸
作者(外文):Liang, Chin-Lun
論文名稱(中文):基於通用第二因子模型心電認證系統之實現
論文名稱(外文):An ECG verification system based on Universal second factor model
指導教授(中文):吳順吉
指導教授(外文):Wu, Shun-Chi
口試委員(中文):葉秩光
溫宏斌
口試委員(外文):Yeh, Chih-Kuang
Wen, Hung-Pin
學位類別:碩士
校院名稱:國立清華大學
系所名稱:工程與系統科學系
學號:107011566
出版年(民國):109
畢業學年度:108
語文別:中文
論文頁數:32
中文關鍵詞:生物辨識心電訊號認證系統雙因子
外文關鍵詞:biometricsECGverificationtwo-factors
相關次數:
  • 推薦推薦:0
  • 點閱點閱:749
  • 評分評分:*****
  • 下載下載:0
  • 收藏收藏:0
心電訊號(Electrocadiography,又簡稱為ECG)為心肌細胞進行極化與去極化時於身體表面產生的電位變化圖,原先廣用於心臟疾病的疾病上,但在近幾年生物辨識的需求與發展下,這個有別於臉孔與指紋辨識的生物特徵逐漸被研究者們注意。因為心電訊號平時由體內產生,且必須用特定的儀器才能進行量測,使得它相對於外顯性的指紋與臉孔特徵有著更高的安全性,又因為每個人的心肌結構不盡相同,這使得個體間的心電訊號擁有能與其他生物特徵媲美的辨識能力。在本研究,我們將利用一個基於單導程的心電訊號演算法,創建可刪式模板來進行後續的驗證動作,以形成一個用於識別使用者的認證系統(biometric verification system)。為了增加此系統的安全性,我們將在原本的演算法上,再套上第二因子認證模型上,經此結合的心電訊號雙因子認證系統,不僅可以達到高度的認證正確率,還能夠解決使用者輸入帳號密碼繁瑣的步驟,替使用者免去記憶上的煩惱。
Electrocardiograms (ECGs) are produced by the heart's electrical activity and are usually measured by the electrodes placed on the skin. They are widely used in detecting heart disease for healthcare. Thank the advance of technology, ECGs begin to play an essential role as biometrics. Having a verification rate similar to other biometric characteristics like fingerprints or faces, ECGs have several advantages. For example,they can only be measured by some specific instrument that must contact the human body, and thus, using ECGs to authenticate is safer than other biometrics on the way resisting spoofing from picturing. However, nowadays, the security of a system with only one authentication factor is not enough, so that we try to combine ECGs with the universal second-factor model to build up a system with high security and zero memory effort.
摘要 i
Abstract ii
致謝 iii
目錄 v
表目錄 vii
圖目錄 viii
第一章 緒論 1
1.1研究緣起 1
1.2論文架構 3
第二章 各式認證系統回顧 4
2.1傳統單因子認證與多因子認證系統 4
2.2 FIDO聯盟與通用第二因子認證模型 5
第三章 生物辨識與心電辨識演算法 7
3.1生物辨識與心電訊號 7
3.2心電訊號演算法 9
3.3可刪式生物辨識系統 10
3.4雙矩陣模板匹配演算法 11
第四章 系統架構與結果 13
4.1 系統架構 13
4.2 實體系統建構 17
4.3 演算法成效與壓縮後比較 21
4.4系統優劣比較 25
第五章 結論 28
參考文獻 29

[1] 王文娟, "物聯網概念及應用," 經濟前瞻, no. 168, pp. 29-36, 2016.
[2] C. MOORE. Couple whose baby monitor was hacked has message for other families.
[3] 商業週刊.福澤喬. 7pay遭駭損失3千多萬日圓,為何全家FamiPay卻沒事?日本7-11疏忽了什麼?Available:https://www.businessweekly.com.tw/article.aspx?id=26319&type=Blog.
[4] 孙冬梅 and 裘正定, "生物特征识别技术综述," 电子学报, vol. 29, no. 12A, pp. 1744-1748, 2001.
[5] J. R. Pinto, J. S. Cardoso, and A. Lourenço, "Evolution, Current Challenges, and Future Possibilities in ECG Biometrics," IEEE Access, vol. 6, pp. 34746-34776, 2018.
[6] A. Rattani, W. J. Scheirer, and A. Ross, "Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials," IEEE T. Inf. Foren. Sec., vol. 10, no. 11, pp. 2447-2460, 2015.
[7] D. Wen, H. Han, and A. K. Jain, "Face Spoof Detection With Image Distortion Analysis," IEEE T. Inf. Foren. Sec., vol. 10, no. 4, pp. 746-761, 2015.
[8] L. Biel, O. Pettersson, L. Philipson, and P. Wide, "ECG analysis: a new approach in human identification," IEEE T. Instrum. Meas., vol. 50, no. 3, pp. 808-812, 2001.
[9] J. M. Irvine, S. A. Israel, W. Todd Scruggs, and W. J. Worek, "eigenPulse: Robust human identification from cardiovascular function," Pattern Recogn., vol. 41, no. 11, pp. 3427-3435, 2008/11/01/ 2008.
[10] S.-C. Fang and H.-L. Chan, "Human identification by quantifying similarity and dissimilarity in electrocardiogram phase space," Pattern Recogn., vol. 42, no. 9, pp. 1824-1831, 2009/09/01/ 2009.
[11] J. Wang, M. She, S. Nahavandi, and A. Kouzani, "Human Identification From ECG Signals Via Sparse Representation of Local Segments," IEEE Signal Proc. Let., vol. 20, no. 10, pp. 937-940, 2013.
[12] S. A. Israel, J. M. Irvine, A. Cheng, M. D. Wiederhold, and B. K. Wiederhold, "ECG to identify individuals," Pattern Recogn., vol. 38, no. 1, pp. 133-142, 2005.
[13] R. Hoekema, G. J. Uijen, and A. Van Oosterom, "Geometrical aspects of the interindividual variability of multilead ECG recordings," IEEE T. Bio-Med. Eng., vol. 48, no. 5, pp. 551-559, 2001.
[14] S. Z. Fatemian and D. Hatzinakos, "A new ECG feature extractor for biometric recognition," in 2009 16th international conference on digital signal processing, 2009, pp. 1-6: IEEE.
[15] K. N. Plataniotis, D. Hatzinakos, and J. K. M. Lee, "ECG Biometric Recognition Without Fiducial Detection," in 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, 2006, pp. 1-6.
[16] F. Agrafioti, F. M. Bui, and D. Hatzinakos, "Secure Telemedicine: Biometrics for Remote and Continuous Patient Verification," J. Comput. Netw. Commun., vol. 2012, p. 11, 2012, Art. no. 924791.
[17] S. M. Egelman, S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, and L. F. Cranor, "Of Passwords and People: Measuring the Effect of Password-Composition Policies," in CHI 2011, 2011.
[18] W. Burr, D. Dodson, and W. Polk, "Electronic authentication guideline," National Institute of Standards and Technology2004.
[19] B. Burr, "Estimating password strength," Draft for Comment, Slide Presentation.
[20] F. Aloul, S. Zahidi, and W. El-Hajj, "Two factor authentication using mobile phones," in 2009 IEEE/ACS International Conference on Computer Systems and Applications, 2009, pp. 641-644: IEEE.
[21] Apple ID registration. Available: https://appleid.apple.com/account#!&page=create
[22] F. Alliance. (2017, 11 April 2017). Universal 2nd Factor (U2F) Overview.
[23] A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE T. Circ. Syst. Vid., vol. 14, no. 1, pp. 4-20, 2004.
[24] J. A. Unar, W. C. Seng, and A. Abbasi, "A review of biometric technology along with trends and prospects," Pattern Recogn., vol. 47, no. 8, pp. 2673-2688, 2014/08/01/ 2014.
[25] M. Turk and A. Pentland, "Face recognition using eigenfaces," in Proceedings. 1991 IEEE computer society conference on computer vision and pattern recognition, 1991, pp. 586,587,588,589,590,591-586,587,588,589,590,591.
[26] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of fingerprint recognition. Springer Science & Business Media, 2009.
[27] S.-C. Wu and P.-T. Chen, "Block projection based feature extraction for biometric recognition with multi-lead ECG," Int. J. Pharma Med. Biol. Sci., vol. 4, no. 2, p. 97, 2015.
[28] Y. Wang, F. Agrafioti, D. Hatzinakos, and K. N. Plataniotis, "Analysis of Human Electrocardiogram for Biometric Recognition," EURASIP J. Adv. Sig. Pr., vol. 2008, no. 1, p. 148658, 2007/09/19 2007.
[29] O. Boumbarov, Y. Velchev, and S. Sokolov, "ECG personal identification in subspaces using radial basis neural networks," in Int. Worksh. Int. Data, 2009, pp. 446-451.
[30] M. N. Dar, M. U. Akram, A. Usman, and S. A. Khan, "ECG biometric identification for general population using multiresolution analysis of DWT based features," in Proc. 2nd Int. Conf. Inf. Secur. Cyber Forensics (InfoSec), 2015, pp. 5-10.
[31] A. D. C. Chan, M. M. Hamdy, A. Badre, and V. Badee, "Wavelet Distance Measure for Person Identification Using Electrocardiograms," IEEE T. Instrum. Meas., vol. 57, no. 2, pp. 248-253, 2008.
[32] R. Matta, J. K. H. Lau, F. Agrafioti, and D. Hatzinakos, "Real-time continuous identification system using ECG signals," in Proc. 24th Can. Conf. Elect. Comput. Eng. (CCECE), 2011, pp. 001313-001316.
[33] M. Hejazi, S. A. R. Al-Haddad, S. J. Hashim, A. F. A. Aziz, and Y. P. Singh, "Feature level fusion for biometric verification with two-lead ECG signals," in Proc. IEEE CSPA, 2016, pp. 54-59.
[34] V. M. Patel, N. K. Ratha, and R. Chellappa, "Cancelable Biometrics: A review," IEEE Signal Proc. Mag., vol. 32, no. 5, pp. 54-65, 2015.
[35] C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," Eurasip J. Inf. Secur., vol. 2011, no. 1, p. 3, 2011.
[36] J. K. Pillai, V. M. Patel, R. Chellappa, and N. K. Ratha, "Sectored Random Projections for Cancelable Iris Biometrics," in ICASSP, 2010, pp. 1838-1841.
[37] A. B. J. Teoh, Y. W. Kuan, and S. Lee, "Cancellable biometrics and annotations on BioHash," Pattern Recogn., vol. 41, no. 6, pp. 2034-2044, 2008/06/01/ 2008.
[38] A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of BioHashing and its variants," Pattern Recogn., vol. 39, no. 7, pp. 1359-1368, 2006/07/01/ 2006.
[39] D. L. Donoho, "Compressed sensing," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1289-1306, 2006.
[40] R. C. Merkle, "Protocols for public key cryptosystems," in 1980 IEEE Symposium on Security and Privacy, 1980, pp. 122-122: IEEE.
[41] R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
[42] m. integrated. MAX86150EVSYS Evaluation System for the MAX86150 . Available:https://www.maximintegrated.com/en/products/sensors/MAX86150EVSYS.html/tb_tab0.
[43] Nvidia. Jetson nano開發套件與模組. Available: https://www.nvidia.com/zh-tw/autonomous-machines/embedded-systems/jetson-nano/
[44] m. integrated. MAX86150EVSYS Physical photo. Available:https://datasheets.maximintegrated.com/en/ds/MAX86150EVSYS.pdf.
[45] ARDUINO. Getting Started with Arduino UNO. Available: https://www.arduino.cc/en/Guide/ArduinoUno
[46] R. Bousseljot, D. Kreiseler, and A. Schnabel, "Nutzung der EKG-Signaldatenbank CARDIODAT der PTB über das Internet," Biomed. Tech., vol. 40, no. s1, p. 317, 1995.
[47] J. Bonneau, C. Herley, P. C. Van Oorschot, and F. Stajano, "The quest to replace passwords: A framework for comparative evaluation of web authentication schemes," in 2012 IEEE Symposium on Security and Privacy, 2012, pp. 553-567: IEEE.
[48] R. M. Van Rijswijk and J. Van Dijk, "tiqr: a novel take on two-‐factor authentication," in Proceedings of LISA’11: 25th Large Installation System Administration Conference, 2011, p. 81.

(此全文未開放授權)
電子全文
中英文摘要
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *