Content area

Abstract

In the face of the mounting challenges posed by cybersecurity threats, there is an imperative for the development of robust identity authentication systems to safeguard sensitive user data. Conventional biometric authentication methods, such as fingerprinting and facial recognition, are vulnerable to spoofing attacks. In contrast, electrocardiogram (ECG) signals offer distinct advantages as dynamic, “liveness”‐assured biomarkers, exhibiting individual specificity. This study proposes a novel fusion network model, the convolutional neural network (CNN)‐transformer fusion network (CTFN), to achieve high‐precision ECG‐based identity authentication by synergizing local feature extraction and global signal correlation analysis. The proposed framework integrates a multistage enhanced CNN to capture fine‐grained local patterns in ECG morphology and a transformer encoder to model long‐range dependencies in heartbeat sequences. An adaptive weighting mechanism dynamically optimizes the contributions of both modules during feature fusion. The efficacy of CTFN was evaluated in three critical real‐world scenarios: single/multi‐heartbeat authentication, cross‐temporal consistency, and emotional variability resistance. The evaluation was conducted on 283 subjects from four public ECG databases: CYBHi, PTB, ECG‐ID, and MIT‐BIH. The CYBHi dataset revealed that CTFN exhibited a state‐of‐the‐art recognition accuracy of 98.46%, 80.95%, and 90.76%, respectively, signifying its remarkable performance. Notably, the model attained a 100% authentication accuracy rate using only six heartbeats. This represents a 25% decrease in input requirements when compared to prior works, while concurrently maintaining its robust performance against physiological variations induced by emotional states or temporal gaps. These results demonstrate that CTFN significantly advances the practicality of ECG biometrics by balancing high accuracy with minimal data acquisition demands, offering a scalable and spoof‐resistant solution for secure authentication systems.

Full text

Turn on search term navigation

© 2025. This work is published under http://creativecommons.org/licenses/by/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.