2022
DOI: 10.1016/j.bbe.2022.08.004
|View full text |Cite
|
Sign up to set email alerts
|

BAED: A secured biometric authentication system using ECG signal based on deep learning techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
21
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(21 citation statements)
references
References 52 publications
0
21
0
Order By: Relevance
“…To verify the effectiveness of the proposed method in this paper, the mainstream image style transfer methods AdaIn [ 22 ], WCT [ 10 ], AAMS [ 25 ] and model stroke pyramid [ 24 ] are used for effect comparison. The purpose of this method is to keep the content expression of the subject as much as possible when dealing with shallow depth of field images so that it does not integrate with the texture generated by the background.…”
Section: Resultsmentioning
confidence: 99%
“…To verify the effectiveness of the proposed method in this paper, the mainstream image style transfer methods AdaIn [ 22 ], WCT [ 10 ], AAMS [ 25 ] and model stroke pyramid [ 24 ] are used for effect comparison. The purpose of this method is to keep the content expression of the subject as much as possible when dealing with shallow depth of field images so that it does not integrate with the texture generated by the background.…”
Section: Resultsmentioning
confidence: 99%
“…A wavelet scattering filter bank is constructed giving the length of the signal, sampling frequency, quality factor of [ 8 , 1 ], and default invariance scale. We extracted the features from Fig 15 , using the function feature matrix, reducing down to a feature set of 499 by 8, which is a 95% reduction in the size of features.…”
Section: Resultsmentioning
confidence: 99%
“…Physiological signals such as the electrocardiogram (ECG) carry information on the human heart’s electrical activity, and its analysis helps in understanding the cardiovascular health of the patient [ 4 – 7 ]. Recently, a biometric authentication system has been developed based on a person’s ECG to make it more secure [ 8 ]. The recording is performed by conventionally attaching leads to the surface of the human body over specific areas.…”
Section: Introductionmentioning
confidence: 99%
“…Independent research proves the authenticity of ECG signals [ 8 , 11 , 12 , 13 ]. Guglielmi et al [ 11 ] collected ECG signals from various sensor nodes on the individual’s body and used them to develop a new key agreement protocol that exploits the randomness of ECG signals.…”
Section: Introductionmentioning
confidence: 99%