Nonetheless, conventional biometric systems are still vulnerable to attacks, the most common ones being spoofing, i.e., when an individual poses as another person, and subsequently gains illegitimate access
[3]. Examples include the reproduction of anatomical features, such as the acquisition of facial images
[4], or using gummy fingers
[5], as well as the replica of behavioural features, such as the reproduction of voices
[6] or handwritten signature
[7]. Therefore, there is a need to explore other options less vulnerable to eavesdropping (i.e., stealthy trait measurement) or spoofing attacks
[8]. Typically, the liveness information can be used as a countermeasure, since it is capable of detecting signs of life
[3].
2. Biometrics and the Importance of the Bio-Radar
Biometric recognition can be done using two distinct approaches: authentication and identification. Authentication aims to answer the question “Am I who I claim to be?” whereas Identification answers “Who am I?”. The former’s objective is to verify a person’s claimed identity, and is the main focus of this work, whilst the latter seeks to establish a subject’s identity
[2].
Typically, biometric systems are divided into two categories: biological and/or behavioural. Biological biometrics are based on data taken from a direct part of the human body, whereas behavioural characteristics are based on an action taken by a person. Examples of the first include the use of the ears, face, fingerprints, irises, palms, or even physiological signals such as the Electrocardiogram (ECG), whereas the second includes gait, keystroke dynamics, as well as signature and voice recognition. These can be collected through specialised image or video capturing devices, or by contact sensors
[2].
Recently, research on biosignal-based approaches has been pursued to address the limitations of conventional biometric systems, as introduced in
Section 1, within which the ECG has shown promising results
[8]. Its nature makes it hard to capture, and the inherent liveness makes it useful for spoofing purposes
[3][8][10]. Moreover, it has been shown to possess high inter-subject variability and low intra-subject variability
[8]. Regardless, ECG-based biometrics require contact with the body, which may be unpractical and disruptive to the users. To mitigate these limitations, alternatives have been explored, paving the way towards
invisible approaches, which can be integrated on the topic of “smart homes”, where sensors are incorporated into day-to-day objects, allowing data acquisition during the subject’s daily activities
[11]. BR systems, due to their unobtrusive nature, are particularly interesting. They send a continuous electromagnetic signal towards a subject; when the subject’s chest moves as a consequence of the cardiorespiratory activity, there is a modulation resulting from the vital signals
[12].
The use of such systems can lead to innovative applications. They have shown several employments with examples ranging from the ability to detect signals through barriers such as clothes, as well as insensibility to environment factors, to identifying sudden events, and contributing to lifestyle improvement, through continuous monitoring
[9][13][14]. BR systems have proved to be able of being integrated into custom objects to meet market needs. Furthermore, in such applications, these frameworks may be shared among multiple people within the household, and consequently, the ability to match the recorded data to the individual that provided it is a necessary feature. For instance, regarding the topic of “smart homes”, a possible multimodal approach in sanitary installations alongside the ECG
[15] may also be pursued. It is also important to take into consideration that, in these circumstances, there is a reduced number of subjects within the household. Furthermore, considering the integration of a BR system in a car seat
[16][17], it may allow the personalisation of a car’s settings, or even car-sharing, all of which require the ability to know the driver’s identity
[18].
3. The Bio-Radar System
Radar stands for “Radio Detection And Ranging”, and it consists of a transmitter, a receiver, an antenna, and signal processing software
[9][19]. The BR system uses the principles of radar technology;
Figure 1a presents a schema of a general BR system.
3.1. Doppler Radar
Based on the Doppler radar, the BR system allows the cardiorespiratory motion sensing, with precision and with no direct contact with the subject
[9].
As an object undergoes motion, the radar signal reflected off the object experiences frequency shifts due to the Doppler effect
[20]. Additionally, micro-Doppler analysis centres on extracting further information from the Doppler signature past the primary motion of the entire target. It investigates the smaller, modulated variations within the Doppler signature caused by the motion of internal body parts or other vibrating components within the target. For instance, in vital signs monitoring, micro-Doppler analysis can distinguish and analyse small Doppler shifts caused by chest wall movements amid breathing or heartbeats. By considering these micro-Doppler signatures, it is conceivable to estimate vital signs such as respiratory rate and heart rate
[21]. Such detection depends on changes in the travelled path of the transmitted signal, which causes a phase modulation on the received signal, when reflected by the human body, more specifically due to displacements caused by both respiratory and cardiac mechanical activity
[20].
There are several radar architectures based on the Doppler effect. The chosen architecture for this work is the Continuous Wave (CW) radar, a relatively simple architecture to implement. A CW radar constantly transmits and receives signals with a very narrow bandwidth
[22], enabling the detection of the Doppler shift. It senses phase changes when a target is moving, allowing the target’s velocity to be calculated and even distinguish between stationary and moving objects
[23].
3.2. Implications of Real-World Applications
As shown in
Figure 1a, a sinusoidal signal is continuously transmitted towards the subject’s chest wall. In an ideal scenario, with no parasitic reflections, the physiological signals are perceived as an arc in the complex plane. This is shown in
Figure 1b, where
𝐴0 represents the received signal amplitude, and
𝑎𝑟 the phase variation, which is proportional to the amplitude of the motion of the chest wall
[9].
Nonetheless, ideal scenarios do not exist. As such, it is important to consider the surrounding conditions. The received signal is the sum of the intended signal with parasitic reflections that occur in the surrounding objects, as depicted in
Figure 2a. Parasitic reflections are addressed as Complex Direct Current (CDC) offsets since they cause a misalignment of the signal in respect to the origin, increasing the spectral component magnitude. These are depicted in
Figure 2b, where
𝐴1 is the parasitic component amplitude
[9]. Researchers refer the reader to the work by Gouveia et al.
[9][24] for a more detailed description.
4. ECG-Based Biometric Recognition
Fiducial methods are those that typically rely on the use of landmarks in the time domain
[8]. As such, it is dependent on the exact detection of points of interest. Initially, pioneering research used predefined medical features as the feature space
[25], however it was later proved that this feature space lacked the ability to fully characterise the waveform for biometric purposes, and so revisions were made
[26]. Furthermore, to accommodate the users’ needs, it was necessary to turn towards
off-the-person/
invisible approaches
[27].
Nonetheless, this accurate fiducial detection is a difficult task, since there is no universally acknowledged rule, i.e, no way to precisely establish where the limits of the wave lie. Consequently, non-fiducial approaches were created, characterised by the lack of reference detection. Non-fiducial methods are described as those able to extract information without the need of localising fiducial points
[8][28]. Usually, these methods are further divided into transform domain approaches
[29] and other approaches
[30], where the former concerns, as the name implies, feature extraction in the frequency domain.
Even so, the detection of R-peak proved to be desirable, which led to the partially fiducial methods, also addressed as hybrid. These methods make use of the R-peak to segment the waveform, either adopting the full waveform or a subset of it
[27].
5. BR-Based Biometric Recognition
In spite of this, ECG-based biometrics require contact with the body, thus being unpractical and disruptive to users’ regular interaction. Therefore, there was the need to explore a novel invisible approach, namely the use of BR systems. That said, the use of these radars for identity recognition is still in its inception.
The detection of cardiopulmonary signals using a radar system has already been made possible
[31]; moreover, in 2004 it has been demonstrated that it is possible to measure the cardiac and respiratory activity through walls
[32]. In 2006, the Doppler effect was used to estimate the amount of individuals in a room
[33]. Additionally, these systems could also be used to study the different stages of the heart contraction cycle
[34]. Furthermore, in the last few years, research has turned to the use of cardiopulmonary signals as a biometric modality.
Table 1 shows a summary of these approaches and their performance.
In 2015, the first use of the cardiac radar signal as a biometric modality was described
[13]. Shortly after, a continuous authentication system, the Cardiac Scan, was introduced. This system was based on the acquisition of geometric features of the cardiac motion, introducing the notion of “fiducial-based” identity descriptors in BR biometrics
[36]. Moreover, “partially fiducial-based” features have also been pursued to establish a reproducible approach in the time domain
[37]. Finally, a “non-fiducial” approach has also been described using spectrograms
[38].
Unlike the former studies, other works have focused on the breathing patterns, instead of the cardiac signal
[35]. These typically used “fiducial” descriptors to describe the breathing cycle
[39], having been proved successful in identifying individuals under different conditions, as well as with obstructive sleep apnoea
[40][41]. Nevertheless, the adopted algorithm produced false classifications, and so “non-fiducial approaches” have also been described, using the Fast Fourier Transform (FFT)
[12].