2012
DOI: 10.1016/j.patrec.2012.03.010
|View full text |Cite
|
Sign up to set email alerts
|

Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 69 publications
(28 citation statements)
references
References 9 publications
0
28
0
Order By: Relevance
“…However, the ECG signal can be combined with other biometric (e.g., face and fingerprint) and provide an excellent source of supplementary information in a multibiometric framework. Singh et al [27] have proposed a multibiometric system that fuses the ECG signal with face and fingerprint biometrics, effectively. Transformation-based score fusion technique is used to evaluate the effectiveness of the aforementioned system.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the ECG signal can be combined with other biometric (e.g., face and fingerprint) and provide an excellent source of supplementary information in a multibiometric framework. Singh et al [27] have proposed a multibiometric system that fuses the ECG signal with face and fingerprint biometrics, effectively. Transformation-based score fusion technique is used to evaluate the effectiveness of the aforementioned system.…”
Section: Resultsmentioning
confidence: 99%
“…Although, the methods using the ECG as a biometric may not offer adequate accuracy [26,27], the ECG information can assist in improving the security of the system with other biometrics in a multibiometric framework. Singh et al [27] have proposed a multibiometric system which is obtained from the fusion of the ECG signal with, the face and the fingerprint biometrics for robust persons authentication.…”
Section: Supporting Factorsmentioning
confidence: 99%
See 1 more Smart Citation
“…This unattended situation will provoke imposters for spoof attacks with fake biometric samples for obtaining undue access to the genuine users account. Existing biometric modalities, such as fingerprint, iris, and face, are vulnerable [18] in such unattended scenarios, as an imposter will have sufficient opportunity to spoof a target client. For example, it has been shown that it is possible to spoof varieties of fingerprint technology by gummy fingers [19].…”
Section: Introductionmentioning
confidence: 99%
“…The ECG is difficult to mimic and hard to be copied or stolen. Therefore, the ECG has strong credentials to successfully address the security and privacy issues of an individual [8].…”
Section: Introductionmentioning
confidence: 99%