**1. Fingerprinting**

This identification method is widely used by the FBI.

The FBI has managed the nation's collection of fingerprints since 1924, but it went fully electronic in 1999 when launched the Integrated Automated Fingerprint Identification System, or IAFIS. This national repository of fingerprints and criminal histories enables law enforcement at every level to quickly match up criminal evidence with criminal identities [1].

On the other hand, the Department of Homeland Security's IDENT—the Automated Biometric Identification System that houses fingerprint records and limited biographic information—was created in 1994 to help U.S. border and immigration officials keep criminals and terrorists from crossing US borders.

In this post-9/11, globalized world, the Department of Justice (DOJ) and FBI, the Department of Homeland Security (DHS), and the Department of State have worked hard in recent years to establish interoperability between these two fingerprint databases.

### **2. Retina recognition**

Retina recognition is a biometric technique that uses the unique patterns on a person's retina for person identification. The retina is the layer of blood vessels situated at the back of an eye. The eye is positioned in front of the system at a capture distance ranging from 8 cm to 1 m. The person must look at a series of markers, viewed through the eyepiece, and line them up. The eye is optically focused for the scanner to capture the retina pattern. The retina is scanned with the near infrared (NIR 890 nm) irradiation, and the unique pattern of the blood vessels is captured. Retina recognition makes use of the individuality of the patterns of the blood vessels. It has been developed commercially since the mid-1970s. Sandia Laboratory reported a false rejection rate of lower than 1.0% [2].

#### **3. Voice recognition**

Voice biometrics is the science of using a person's voice as a uniquely identifying biological characteristic in order to authenticate them. Also referred to as voice verification or speaker recognition, voice biometrics enables fast, frictionless, and highly secure access for a range of use cases from call center, mobile, and online applications to chatbots, IoT devices, and physical access.

Like other biometric modalities, voice offers significant security advantages over authentication methods that are based on something you know (like a password or answer to a "secret" question) or something you have (like your mobile phone). Voice biometrics also improves the customer experience by removing frustration associated cumbersome login processes and lost and stolen credentials [3].

Many banks use the voice recognition technologies for person identification.

Unfortunately, the above biometric identification technologies are not free from some disadvantages. In particular, there are methods to fake fingerprints [4], retina [5], and voice [6].

Currently, biometric identification technologies such as ECG, EEG, and DNA are considered resistant to hacking.

In this chapter, we would like to talk about biometric identification using ECG and related problems.

### **4. What is an ECG?**

There are several scenarios for using biometric identification using ECG.

#### 1.Contact ECG

2.Remote ECG sensing

For contact ECG, you can use medical electrocardiographs or sensors installed in smartphones or, for example, in the steering wheel of a car. An interesting direction

**23**

**Figure 2.**

**Figure 1.**

*Xaver 800. Wall-through 3D imagine system.*

*Biometric Authentication Based on Electrocardiogram DOI: http://dx.doi.org/10.5772/intechopen.91172*

can identify the patient.

the rubble of buildings.

gender, and age (**Figure 1**) [7].

in the development of computer technology is wireless sensor networks. A special case of this technology is Body Area Networks (BAN), which include one or more sensors that record the medical parameters of the human body. BANs are Internet of Medical Things (IoMT). ECG sensors in this case are mounted on the patient's body. Medical parameters are transmitted to the server for analysis and storage. An ECG

Remote ECG sensing is carried out using ultra-wideband radars. An example is the instrument of the Israeli military company XAVER, which allows special forces to detect living people through a brick wall, as well as determine their location,

More advanced is the technology of WAVD Technology, Arizona. Its ultrawideband radar allows not only to detect, but also to identify people buried under

*The use of ultra-wideband radars for biometric identification. Left: banking sector; right: security systems.*

#### *Biometric Authentication Based on Electrocardiogram DOI: http://dx.doi.org/10.5772/intechopen.91172*

*Biometric Systems*

fingerprint databases.

**2. Retina recognition**

**3. Voice recognition**

credentials [3].

[5], and voice [6].

and related problems.

**4. What is an ECG?**

1.Contact ECG

2.Remote ECG sensing

are considered resistant to hacking.

reported a false rejection rate of lower than 1.0% [2].

applications to chatbots, IoT devices, and physical access.

In this post-9/11, globalized world, the Department of Justice (DOJ) and FBI, the Department of Homeland Security (DHS), and the Department of State have worked hard in recent years to establish interoperability between these two

Retina recognition is a biometric technique that uses the unique patterns on a person's retina for person identification. The retina is the layer of blood vessels situated at the back of an eye. The eye is positioned in front of the system at a capture distance ranging from 8 cm to 1 m. The person must look at a series of markers, viewed through the eyepiece, and line them up. The eye is optically focused for the scanner to capture the retina pattern. The retina is scanned with the near infrared (NIR 890 nm) irradiation, and the unique pattern of the blood vessels is captured. Retina recognition makes use of the individuality of the patterns of the blood vessels. It has been developed commercially since the mid-1970s. Sandia Laboratory

Voice biometrics is the science of using a person's voice as a uniquely identifying biological characteristic in order to authenticate them. Also referred to as voice verification or speaker recognition, voice biometrics enables fast, frictionless, and highly secure access for a range of use cases from call center, mobile, and online

Like other biometric modalities, voice offers significant security advantages

Many banks use the voice recognition technologies for person identification. Unfortunately, the above biometric identification technologies are not free from some disadvantages. In particular, there are methods to fake fingerprints [4], retina

Currently, biometric identification technologies such as ECG, EEG, and DNA

In this chapter, we would like to talk about biometric identification using ECG

There are several scenarios for using biometric identification using ECG.

For contact ECG, you can use medical electrocardiographs or sensors installed in smartphones or, for example, in the steering wheel of a car. An interesting direction

over authentication methods that are based on something you know (like a password or answer to a "secret" question) or something you have (like your mobile phone). Voice biometrics also improves the customer experience by removing frustration associated cumbersome login processes and lost and stolen

**22**

in the development of computer technology is wireless sensor networks. A special case of this technology is Body Area Networks (BAN), which include one or more sensors that record the medical parameters of the human body. BANs are Internet of Medical Things (IoMT). ECG sensors in this case are mounted on the patient's body. Medical parameters are transmitted to the server for analysis and storage. An ECG can identify the patient.

Remote ECG sensing is carried out using ultra-wideband radars. An example is the instrument of the Israeli military company XAVER, which allows special forces to detect living people through a brick wall, as well as determine their location, gender, and age (**Figure 1**) [7].

More advanced is the technology of WAVD Technology, Arizona. Its ultrawideband radar allows not only to detect, but also to identify people buried under the rubble of buildings.

**Figure 1.**

*Xaver 800. Wall-through 3D imagine system.*

Several patents have been published that propose the use of ultra-wideband radars for conducting banking operations without a credit card, as well as for controlling premises during confidential meetings (**Figure 2**). As it turned out, with the help of ultra-wideband radars, it is possible to restore not only the ECG, but also speech.

Xiaolin et al. described using of ultra wide band radars for detecting of vital signs [8, 9].
