Abstract
AbstractThe rapid development of the Internet and various applications such as the Internet of Medical Things (IoMT) has raised substantial concerns about personal information security. Conventional methods (e.g., passwords) and classic biological features (e.g., fingerprints) are security deficient because of potential information leakage and hacking. Biometrics that express behavioral features suggest a robust approach to achieving information security because of the corresponding uniqueness and complexity. In this paper, we consider identifying human subjects based on their transient neurophysiological signature captured using multichannel upper-limb surface electromyography (sEMG). An explainable artificial intelligence (XAI) approach is proposed to process the internal dynamics of temporal sEMG signals. We propose and prove the suitability of “transient sEMG” as a biomarker that can identify individuals. For this, we utilize the Gradient-weighted Class Activation Mapping (Grad-CAM) analysis to explain the network’s attention. The outcome not only decodes and makes the unique neurophysiological pattern (i.e., motor unit recruitment during the transient phase of contraction) associated with each individual visualizable but also generates an optimizing two-dimensional (2D) spectrotemporal mask used to significantly reduce the size of the model and the trainable parameters. The resulting mask selectively and systematically samples the spectrotemporal characteristics of the users’ neurophysiological responses, discarding 40% of the input space while securing the accuracy of about 74% with much shallower neural network architecture. In the systematic comparative study, we find that our proposed model outperforms several state-of-the-art algorithms. For broader impacts, we anticipate our design of a compact, practical, interpretable, and robust identification system that requires only a minimal number of gestures and sensors (only 7% of the entire data set) to be a starting point for small and portable identification hardware.
Publisher
Cold Spring Harbor Laboratory
Reference39 articles.
1. Integrated security, safety, and privacy risk assessment framework for medical devices;IEEE Journal of Biomedical and Health Informatics,2020
2. A review on the state-of-the-art privacypreserving approaches in the e-health clouds;IEEE Journal of Biomedical and Health Informatics,2014
3. Securemed: Secure medical computation using gpu-accelerated homomorphic encryption scheme;IEEE Journal of Biomedical and Health Informatics,2018
4. Collaborative ehealth meets security: Privacyenhancing patient profile management;IEEE Journal of Biomedical and Health Informatics,2017
5. J. Long , No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing. Syngress, 2011.