ECG-Based Authentication
نویسندگان
چکیده
17.6 Open Issues of ECG Based Biometrics Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 17.6.1 Lack of Standardization of ECG Fiducial Points . . . . . . . . . . . . . . 323 17.6.2 Time Variant Nature of ECG . . . . . . . . . 324 17.6.3 Pertinence of Random Abnormality in ECG. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 17.6.4 Longer Duration for ECGWave Acquisition . . . . . . . . . . . 325 17.6.5 Lack of Portability and Higher Computational Cost for ECG File Processing . . . . . . . . . . . . . . . . . . . . . . . . . . 325 17.6.6 Lack of Experimental Data for Verification . . . . . . . . . . . . . . . . . . . . . . 325
منابع مشابه
An IoT Real-Time Biometric Authentication System Based on ECG Fiducial Extracted Features Using Discrete Cosine Transform
The conventional authentication technologies, like RFID tags and authentication cards/badges, suffer from different weaknesses, therefore a prompt replacement to use biometric method of authentication should be applied instead. Biometrics, such as fingerprints, voices, and ECG signals, are unique human characters that can be used for authentication processing. In this work, we present an IoT re...
متن کاملA novel biometric based on ECG signals and images for human authentication
This paper represents a complete system for using Electrocardiogram (ECG) images for human authentication. In this study, the proposed algorithm is divided into three main stages: Pre-processing stage, feature extraction stage and classification stage. A real database is used; it consists of 120 ECG images which are collected from 20 persons. The preprocessing stage is done on the ECG image. Pr...
متن کاملA Review on ECG based Human Authentication
Biometric systems are mostly used for human identification and authentication. Recent developments have shown that for person identification ECG can be used as more powerful tool as it give more reliable and accurate results even in abnormal cases than other biometric characteristics. Credential based authentication methods (e.g., passwords, PINs, certificates) are not well-suited for remote he...
متن کاملECG-based Continuous Authentication System using Adaptive String Matching
Conventional access control systems are typically based on a single time instant authentication. However, for high-security environments, continuous user verification is needed in order to robustly prevent fraudulent or unauthorized access. The electrocardiogram (ECG) is an emerging biometric modality with the following characteristics: (i) it does not require liveliness verification, (ii) ther...
متن کاملECG as Biometric in the Automated World
Biometrics based authentication system provides better security solutions than conventional systems. But, some biological parameters that are used as biometric do not provide the guarantee of the presence and aliveness of the person as voice can be copied through microphone, finger print can be collect on silicon surface and iris can be copied on contact lances. ECG doesn’t have these problems ...
متن کامل