2011 6th IEEE Conference on Industrial Electronics and Applications 2011
DOI: 10.1109/iciea.2011.5975879
|View full text |Cite
|
Sign up to set email alerts
|

Individual identification based on chaotic electrocardiogram signals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
30
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(31 citation statements)
references
References 9 publications
0
30
0
1
Order By: Relevance
“…Sophisticated technologies can be successfully implemented for many biometric authentication applications such as protection of private documents and reliable access to restricted areas [1]. Recent advances in biomedical and clinical engineering areas not only improve the recognition performance of biometric authentication systems but also provide feasible implementations [2].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Sophisticated technologies can be successfully implemented for many biometric authentication applications such as protection of private documents and reliable access to restricted areas [1]. Recent advances in biomedical and clinical engineering areas not only improve the recognition performance of biometric authentication systems but also provide feasible implementations [2].…”
Section: Introductionmentioning
confidence: 99%
“…One of the most popular methods is to use the distance measure [2], [4], [10], [12], [14] , [21]. Nearest neighbor classifier was also widely used for this purpose [1], [15], [20], [22], [23], [24]. Neural Network [6], and Decision Based Neural Network [13], [14] were effectively applied for person identification as well.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is promising that security is enhanced by using the biometric information transmitted to loT. Studies of 978-1-4799-680 1-5/14/$3l.00 ©20 14 IEEE personal authentication [3][4] [5] using the electrocardiographic wavefonn as one of the biometric authentication methods have been reported. Since electrocardiogram is time variant biologi cal information, spoofing is more difficult than face or finger print based authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Then, different features can be extracted from the ECG, giving rise to different classification techniques, that can be broadly distinguished into two main categories [7]: those based on fiducial points [6,9] or not [8,12,14] (e.g., using the Short Time Fourier Transform [16], Wavelet Transform [17], chaos extractor [18], Pulse Active Width [19]). The extracted features can be further processed to reduce their redundant information, e.g., by principal components analysis (PCA, [13]) or independent component analysis (ICA, [15]).…”
mentioning
confidence: 99%