2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applicati 2017
DOI: 10.1109/idaacs.2017.8095063
|View full text |Cite
|
Sign up to set email alerts
|

Biometrie identification from raw ECG signal using deep learning techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(26 citation statements)
references
References 6 publications
0
23
0
3
Order By: Relevance
“…In this regard, different biometrics technologies such as palm vein readers, fingerprint, ECG, and iris scanners [105], and face recognition have great potential to be deployed in healthcare systems. It is very common to use ML/DL techniques for building healthcare biometric systems, which are themselves vulnerable to security and privacy attacks [106], [107], [108]. For example, an adversary can easily evade a face recognition system that is deployed in a restricted area to restrain unintended access for security purposes.…”
Section: B the Security Of Ml: An Overviewmentioning
confidence: 99%
“…In this regard, different biometrics technologies such as palm vein readers, fingerprint, ECG, and iris scanners [105], and face recognition have great potential to be deployed in healthcare systems. It is very common to use ML/DL techniques for building healthcare biometric systems, which are themselves vulnerable to security and privacy attacks [106], [107], [108]. For example, an adversary can easily evade a face recognition system that is deployed in a restricted area to restrain unintended access for security purposes.…”
Section: B the Security Of Ml: An Overviewmentioning
confidence: 99%
“…The extracted features from these time-frequency matrices are fed into a feed-forward network for classification. As for the authors of [ 21 ], the feature extraction module is bypassed, using the template of the ECG cycle as input to a feed-forward network, for both feature extraction and classification. CNN architecture is also used in this context, in the works of [ 22 , 23 ], this architecture is explored in both authentication and authentication biometric processes.…”
Section: Related Workmentioning
confidence: 99%
“…It allows us to start from the most ideal case, due to the precision these devices provide and work towards more complex scenarios. As an alternative, other researchers develop their prototypes, adding more challenges in the system's implementation [13][14][15].…”
Section: Related Workmentioning
confidence: 99%