2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM) 2014
DOI: 10.1109/cibim.2014.7015440
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive ECG biometric recognition: a study on re-enrollment methods for QRS signals

Abstract: Abstract-The diffusion of wearable and mobile devices for the acquisition and analysis of cardiac signals drastically increased the possible applicative scenarios of biometric systems based on electrocardiography (ECG). Moreover, such devices allow for comfortable and unconstrained acquisitions of ECG signals for relevant time spans of tens of hours, thus making these physiological signals particularly attractive biometric traits for continuous authentication applications. In this context, recent studies showe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(21 citation statements)
references
References 36 publications
0
21
0
Order By: Relevance
“…It is relevant here to mention that varying levels of physical, mental, or emotional stimulations are known to affect heart rate. Unfortunately, recordings under these 6 Journal of Sensors stimulations are not available in PTB dataset. Therefore, the robustness of the proposed identification method under the effect of these stimulations will be a research point to consider in our future work.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is relevant here to mention that varying levels of physical, mental, or emotional stimulations are known to affect heart rate. Unfortunately, recordings under these 6 Journal of Sensors stimulations are not available in PTB dataset. Therefore, the robustness of the proposed identification method under the effect of these stimulations will be a research point to consider in our future work.…”
Section: Resultsmentioning
confidence: 99%
“…Biometric recognition aims at uniquely identifying the individuals based on their physiological and/or behavior characteristics such as fingerprint, face, retina, palm print, gait, or speech [1]. Today, subject identification is vital for many applications including financial transactions, e-commerce, data protection, access control, entertainment, voting, and health [2][3][4][5][6][7][8][9]. However, the various biometrics that are currently being adopted exhibit different issues related to performance, measurability, robustness, and liveness detection [10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…In order to perform classification, half of each of the subjects of the NSR, PTB, and QT DB are set as the training data, and the remaining data is set as test. Euclidean distance, as a method of obtaining the distance between two points, is defined as Equation (7) and SVM, as a method of determining the optimal classification plane with minimum error, is defined as Equation (8). Furthermore, LDA, which involves determining the W that maximizes the rate between classes and minimizes the rate within each class is defined as Equations (10)- (12).…”
Section: Window Removal and Identification Methodsmentioning
confidence: 99%
“…Such signals provide strong protection against forgery [5]. However, in biometric recognition using ECG, signal irregularities may exist due to the individual's illness, and the procedure could be hampered by difficulties, such as a long waiting time for data collection [6][7][8]. Nevertheless, studies on ECG biometrics can be used in extensive fields, such as commercial environments, security, health management, and systems like smart cards [9].…”
Section: Introductionmentioning
confidence: 99%
“…Face images can also be used to infer a wide set of soft biometric characteristics, such as the emotional state, ethnicity, gender, and age. Among this set of characteristics, the automatic age estimation can be particularly important in different scenarios [3], such as security and defense applications [4], surveillance [5], health-care systems [6], [7], entertainment [8], automated…”
Section: Introductionmentioning
confidence: 99%