Loading…
A Chaotic Theorectical Approach to ECG-Based Identity Recognition [Application Notes]
Sophisticated technologies realized from applying the idea of biometric identification are increasingly applied in the entrance security management system, private document protection, and security access control. Common biometric identification involves voice, attitude, keystroke, signature, iris,...
Saved in:
Published in: | IEEE computational intelligence magazine 2014-02, Vol.9 (1), p.53 |
---|---|
Main Authors: | , , , , |
Format: | Magazinearticle |
Language: | English |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Sophisticated technologies realized from applying the idea of biometric identification are increasingly applied in the entrance security management system, private document protection, and security access control. Common biometric identification involves voice, attitude, keystroke, signature, iris, face, palm or finger prints, etc. Still, there are novel identification technologies based on the individual's biometric features under development [1-4]. |
---|---|
ISSN: | 1556-6048 1556-603X |
DOI: | 10.1109/MCI.2013.2291691 |