2016
DOI: 10.17485/ijst/2016/v9i21/94841
|View full text |Cite
|
Sign up to set email alerts
|

Review of Fiducial and Non-Fiducial Techniques of Feature Extraction in ECG based Biometric Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(22 citation statements)
references
References 22 publications
0
22
0
Order By: Relevance
“…ECG-based biometric authentication systems can likewise be categorized according to the classifier employed to perform the task of recognition [5], such as knearest neighbor (kNN), linear discriminant analysis (LDA), neural networks, generative model, support vector machine (SVM), and match score classifiers. Notably, all classifierbased recognition methods rely on the so-called feature extraction method [1], [25], [26], where they examine the raw ECG signal to extract some significant features to be applied as input to the classifier. However, transforming the raw ECG signal into a proper feature vector for classification has to be thoughtfully performed and requires significant skillful experience [5].…”
Section: Inputs Of Biometric Traitsmentioning
confidence: 99%
See 2 more Smart Citations
“…ECG-based biometric authentication systems can likewise be categorized according to the classifier employed to perform the task of recognition [5], such as knearest neighbor (kNN), linear discriminant analysis (LDA), neural networks, generative model, support vector machine (SVM), and match score classifiers. Notably, all classifierbased recognition methods rely on the so-called feature extraction method [1], [25], [26], where they examine the raw ECG signal to extract some significant features to be applied as input to the classifier. However, transforming the raw ECG signal into a proper feature vector for classification has to be thoughtfully performed and requires significant skillful experience [5].…”
Section: Inputs Of Biometric Traitsmentioning
confidence: 99%
“…Generally, the ECG biometrics process combines the following main components: signal pre-processing and QRS detection, feature extraction, feature selection, feature transformation, and classification [14], [27]. Several methods for ECG-based biometric system for human authentication have been introduced to capture valuable information from the ECG signal [14], [25], [28]. For instance, fiducial methods, non-fiducial methods, and partially fiducial methods [25], [29]- [34].…”
Section: Inputs Of Biometric Traitsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, in databases with higher variability, non-fiducial features work better. They deal more efficiently with the higher chances of noise in a greater number of samples [27].…”
Section: Related Workmentioning
confidence: 99%
“… Performance:according to requirements, accuracy, speed, and robustness.  Circumvention: it should counteract to fraudsters [3].…”
mentioning
confidence: 99%